Suzette Bailey-Jones - Cyber Defense - The Big Picture — SecureWV

2023 Talks

Event details

  • Track 1
  • October 21, 2023
  • Saturday, 3:00 PM to 4:00 PM

Contact event manager

1 2 3 4

Book your tickets

Choose tickets
Bank NameAccount No: 0000 1400 1211IFSC Code: 00001321Branch Address
Back to details
Thank you Kindly

Suzette Bailey-Jones – Cyber Defense – The Big Picture

Track 1

Saturday, 3:00 PM to 4:00 PM
October 21, 2023


Cyber Defense – The Big Picture
Intro – High level/generalized about me
The Big picture of Cyber Defense and how to be an effective defender.
Knowledge, Skills, and Ability needed.
• PKI – Most importantly how they should be applied, what’s an A name, common name and what difference does it make, certificate chain of trust. What cipher suits and encryption strengths are required to be compliant with regs and are not CVEs. Where should the public key be stored and on which devices – IDS/IPS, Load balancer, Firewall, F5, etc.
• Ports and how to tell which ones are open, closed/deny, and are they encrypted
• How to read and navigate file directories
• How to use the command line and write scripts – .sh, .ps1
• Languages – PS, Bash, Python are essential
• Fundamentals of networking and how to use basic CLI networking commands and tools- ping, tracert, ipconfig, ifconfig, nslookup, openssl, curl, man, etc
• VS Code and how to use – Notepad ++ will work in a pinch
• How to setup a VM for practice
• Fundamentals of Risk – What’s the likelihood of it happening, and how great will the impact be (5×5 method)
• Fundamentals of databases & how they are backed up. (Incremental, full, etc)
• Fundamentals of Disaster Recovery
• How to write CYA emails – Assume that they will be read in court, evidence on social media, or congressional hearing.
• **** Nice to have – SQL queries, advance excel skills – Power Query, Xlookups, how to pull data into excel, Power BI, how to create datasets, familiar with APIs, JSON, XML, etc. ***

Common Security Risks/Issues
• PKI – Lack of proper implementation
• Cloud Configurations – Large rush and push, little training, resources, and expertise
• Ostrich Algorithm – Head in sand
• Lack of accountability and the need for plausible deniability
• Lack of Security oversight, procedures, and policy
• CMDB – Configuration Management DB is key for stakeholders, especially for security practitioners
• Proper Change Management
• Software Supply Chain – SolarWinds, MoveIT, Log4j (Still a thing), hoarding of old binaries.
• Many in C suite lack technical skills or experience
• CISA’s Known Exploited Vulnerability Catalog –

Getting Started
• To get started – Firehose method. Obtain security+ cert and maybe CEH
• It’s not like it’s portraited in the movies….learn how to use excel and CSV data

• Information
o NIST 800 series – Do not have to be an expert, just know how to use ctrl f.
o CVE –
o CWE –
o Stack Exchange – Some else has probably had the same question and the solution may be posted.

• Training
o Azure Cloud – Microsoft Enterprise Skills Initiative – (Corporate Account)
o Youtube
o AWS – (Corporate may have Amazon Partner Network training)
o Cybrary –
o SANS Institute –
o FedVTE – (Federal Employees and contractors only)

Pen Testing Practice and Skills
• Try hack me –
• Hack the Box –
• Hacker One –

• Github – Checkout MIT, NSA, CISA repos
• Docker Hub –
• Burp Suite – Web Vulnerability Exposure
• Chrome Browser Dev Tools
• Shodan
• Google Hacking Database –
• Kali Linux –