Home/Nonfiction/Tribe of Hackers
Loading...
Tribe of Hackers cover

Tribe of Hackers

Cybersecurity Advice from the Best Hackers in the World

3.9 (256 ratings)
23 minutes read | Text | 9 key ideas
Seventy trailblazers in the world of cybersecurity stand ready to ignite your curiosity and challenge the status quo. In "Tribe of Hackers," luminaries such as Lesley Carhart and Robert M. Lee unveil the secrets behind their success, while demystifying the path to excellence in an ever-evolving field. From launching groundbreaking firms like Dragos, Inc. to navigating the industry's gender dynamics, this collection offers a treasure trove of insights. Whether you're a novice stepping into this digital frontier or a veteran seeking fresh perspectives, this book promises to be your catalyst for transformation. And with every purchase, you're not just investing in knowledge—you're supporting causes like Bunker Labs and the Rainforest Partnership. Dive into this unparalleled compendium of wisdom and let the hackers' spirit inspire your next move.

Categories

Nonfiction, Science, Technology, Programming, Computer Science, Technical, Hackers, Computers

Content Type

Book

Binding

Paperback

Year

2019

Publisher

Independently published

Language

English

ISBN13

9781793464187

File Download

PDF | EPUB

Tribe of Hackers Plot Summary

Introduction

In today's hyperconnected world, cybersecurity has transformed from a technical specialty into an essential life skill. The digital landscape presents unprecedented opportunities alongside significant risks, creating a complex environment where individuals and organizations must constantly adapt to stay protected. The challenges can seem overwhelming—sophisticated attackers, evolving threats, and the sheer complexity of modern systems create a perfect storm of vulnerability. Yet within these challenges lies tremendous opportunity for growth and resilience. The wisdom shared throughout these pages comes from those who have faced the most difficult security situations and emerged stronger. Their experiences reveal that true digital resilience isn't about perfect protection—it's about developing the mindset, skills, and practices that allow us to recover from setbacks, learn continuously, and build stronger defenses over time. As you explore these principles, you'll discover that the fortress of digital resilience isn't built with technology alone, but through the thoughtful integration of technical knowledge, human understanding, and strategic vision.

Chapter 1: Master the Fundamentals Before Advanced Techniques

Security fundamentals form the bedrock upon which all advanced protection is built. Despite the allure of cutting-edge security tools and techniques, the most successful security professionals consistently emphasize mastering the basics first. As Marcus J. Carey notes, "The biggest myth that I hear is how attackers are always changing up their tactics... Even if an organization is compromised by a zero-day attack, the lateral movement, registry manipulation, network communications, and so on, will be apparent to a mature cybersecurity practitioner and program." Jennifer Havermann's experience working with organizations of all sizes illustrates this principle perfectly. She once consulted for a multinational corporation that had invested millions in advanced security technologies—next-generation firewalls, sophisticated threat intelligence platforms, and AI-powered detection systems. Despite these investments, they suffered a major breach. When Havermann's team investigated, they discovered the attack didn't exploit any advanced vulnerabilities. Instead, the attackers used basic techniques to target unpatched systems and default credentials that had never been changed. The organization had been so focused on implementing advanced security measures that they neglected the fundamentals. The turning point came when Havermann helped the organization shift their approach. They developed a comprehensive asset inventory, implemented basic patch management, established strong access controls, and trained employees on security awareness. Within six months, their security posture improved dramatically, and they successfully repelled several attempted attacks. The advanced tools they had purchased became much more effective once they had a solid foundation in place. To master the fundamentals in your own security practice, start by knowing what you're protecting. As Havermann emphasizes, "Do the hard work to document your enterprise and identify your information crown jewels. You can't improve what you don't know exists." Create and maintain an accurate inventory of all systems, applications, and data. Implement basic security controls like regular patching, strong authentication, network segmentation, and least privilege access. Monitor your environment, particularly DNS logs, which Zate Berg describes as "a gold mine of information about what systems are doing and who is talking to what." Remember that security fundamentals aren't glamorous, but they're essential. The most sophisticated security tools will fail if deployed on a weak foundation. As you develop your security program, resist the temptation to jump straight to advanced techniques. Instead, ensure you've mastered the basics first, then build upon that solid foundation with more specialized approaches as your security maturity increases.

Chapter 2: Build Your Security Mindset Through Daily Practice

A security mindset isn't something you're born with—it's a way of thinking that develops through consistent practice and deliberate attention. At its core, this mindset involves viewing systems and situations through the lens of potential vulnerabilities, understanding how they might be exploited, and identifying ways to protect against those threats. As security expert Bruce Potter explains, this perspective transforms how you interact with technology: "If more organizations focused on doing the basics well, rather than focusing on fancy new technologies, we'd be better off." Kent Nabors, a cybersecurity leader with extensive experience in the banking industry, shares how his security mindset evolved through daily practice. Early in his career, Nabors approached security as a series of technical problems to be solved—implementing firewalls, configuring intrusion detection systems, and deploying encryption. While technically proficient, he found that breaches still occurred despite his best efforts. The breakthrough came when he realized that security isn't a binary state but rather an ongoing process of active defense. Nabors began practicing what he calls "security thinking" in everyday situations—questioning assumptions, looking for edge cases, and considering how systems might fail or be misused. He applied this approach not just to technology but to physical security, processes, and even casual conversations. Over time, this daily practice transformed his effectiveness as a security professional. He became more proactive in identifying potential vulnerabilities before they could be exploited and more creative in developing defense strategies that addressed both technical and human factors. To develop your own security mindset through daily practice, start by questioning assumptions in everyday situations. When using a new application or service, ask yourself: What information am I sharing? How might it be misused? What controls are in place to protect it? Practice threat modeling in ordinary scenarios—from home security to social media use—by considering what you're trying to protect, who might want access to it, and how they might attempt to gain that access. Make security awareness a habit by staying informed about current threats and vulnerabilities. Follow security researchers and organizations on social media, subscribe to security newsletters, and participate in community discussions. Apply what you learn to both professional and personal contexts. As Michelle Klinger advises, develop situational awareness by being mindful of what you say and where you say it, whether in person or online. Remember that building a security mindset is a journey, not a destination. Even the most experienced security professionals continue to refine their thinking and adapt to new threats. By making security awareness part of your daily practice, you'll develop an intuitive understanding of risks and protections that strengthens your digital resilience in all aspects of life.

Chapter 3: Create Defense in Depth with Layered Protection

Defense in depth is a security strategy that employs multiple layers of protection to safeguard valuable assets. Rather than relying on a single security control that might fail, this approach creates overlapping defenses that collectively provide stronger protection. As Ron Gula points out, "If you don't know what you have, it is really hard to defend it and even harder to defend something you don't know you need to defend." Brandon Perry, an engineer specializing in application and network infrastructure security, shares a compelling example of defense in depth from his consulting work. He was called to investigate a breach at a financial services company that had invested heavily in perimeter security—state-of-the-art firewalls, intrusion detection systems, and endpoint protection. Despite these investments, attackers had gained access to sensitive customer data. The investigation revealed that while the company's perimeter defenses were strong, they had neglected internal security controls. The turning point came when Perry helped the organization implement a comprehensive defense-in-depth strategy. They maintained their strong perimeter defenses but added network segmentation to limit lateral movement, implemented strict access controls based on the principle of least privilege, deployed data encryption for sensitive information, and established robust monitoring and incident response capabilities. When the same attackers attempted to breach the system again six months later, they were detected and contained before they could access any valuable data. To create your own defense-in-depth strategy, start by identifying your most valuable assets—what Perry calls "crown jewels"—and understanding the threats they face. Then implement multiple layers of protection around these assets, considering both technical and non-technical controls. At the perimeter level, use firewalls, intrusion detection systems, and email filtering to block known threats. At the network level, implement segmentation to contain breaches and limit lateral movement. At the endpoint level, deploy anti-malware solutions, application whitelisting, and patch management. Don't forget the human layer of defense. As Perry advises, "Start making implementation and process decisions assuming there is a breach." Train employees to recognize and report security threats, implement strong authentication mechanisms, and establish clear security policies and procedures. Regularly test your defenses through vulnerability assessments, penetration testing, and tabletop exercises to identify and address weaknesses before attackers can exploit them. Remember that defense in depth isn't about implementing every possible security control—it's about strategically layering protections to address your specific risks and protect your most valuable assets. By creating multiple barriers that attackers must overcome, you significantly increase the effort required for a successful breach and improve your chances of detecting and containing threats before they cause significant damage.

Chapter 4: Leverage Community Knowledge for Continuous Growth

The cybersecurity field thrives on community knowledge sharing and collective problem-solving. Unlike many competitive industries, security professionals often freely exchange information about threats, vulnerabilities, and effective defenses. As Cheryl Biswas describes, hackers are "problem-solvers, troubleshooters, and among the best people I know. Their curiosity and determination have often been misunderstood, fabricating a detrimental stereotype. In this community of learning and mentoring, hackers share what they know and encourage others to try, creating a welcoming space for many people who don't feel they belong anywhere." Tony Robinson's journey illustrates the power of community knowledge for professional growth. Early in his career, Robinson struggled to advance despite having strong technical skills. The breakthrough came when he began actively engaging with the security community—attending conferences, participating in online forums, and volunteering at local security events. Through these connections, he not only learned about new threats and techniques but also found mentors who guided his development and introduced him to career opportunities. Robinson's community involvement created a virtuous cycle of growth. As his network expanded, people began coming to him with questions about his areas of expertise, while he could approach others when facing challenges outside his knowledge base. This reciprocal exchange accelerated his learning and opened doors to collaborations and job opportunities that wouldn't have been possible through solo efforts. Today, Robinson credits much of his success to the relationships he built within the security community. To leverage community knowledge for your own growth, start by identifying and joining security communities aligned with your interests. Attend conferences like DEF CON, BSides, and specialized events in your area of focus. Participate in online forums, open-source projects, and social media discussions where security professionals share insights and experiences. As Robinson recommends, volunteering at security events provides an excellent opportunity to build relationships while contributing to the community. Don't just consume information—contribute your own insights and experiences, even if you're just beginning your journey. As Ian Coldwater advises, "Network like crazy. Get involved in the community, and make sure to give back. Going to meetups and cons is great, but organizing and volunteering are better." Share what you learn through blog posts, presentations, or code contributions to open-source projects. This not only helps others but also deepens your own understanding and establishes your reputation within the community. Remember that the security community offers more than just technical knowledge—it provides emotional support, diverse perspectives, and collaborative problem-solving opportunities that can't be found elsewhere. By actively engaging with this community, you tap into a collective intelligence that far exceeds what any individual could develop alone, accelerating your growth and strengthening the entire security ecosystem.

Chapter 5: Balance Technical Excellence with Business Understanding

Technical expertise alone isn't enough to create effective security programs. The most successful security professionals balance deep technical knowledge with a nuanced understanding of business objectives, organizational culture, and stakeholder needs. This dual perspective enables them to implement security measures that protect the organization while supporting its core mission and operations. Brad Schaufenbuel, a CISO with extensive experience across financial services and technology industries, learned this lesson through a challenging implementation project. Early in his career, Schaufenbuel led a technically sophisticated security initiative that met all industry best practices but failed to gain traction within the organization. Despite the solution's technical excellence, it disrupted critical business processes and required significant changes to how employees worked. Business leaders resisted the implementation, and the project ultimately failed to achieve its objectives. The turning point came when Schaufenbuel shifted his approach to balance technical and business considerations. For his next major security initiative, he began by understanding the organization's strategic priorities, revenue model, and operational constraints. He involved business stakeholders early in the planning process, soliciting their input on potential solutions and addressing their concerns. The resulting security program wasn't just technically sound—it aligned with business objectives, minimized disruption to critical operations, and gained enthusiastic support from executives and employees alike. To balance technical excellence with business understanding in your security work, start by developing curiosity about your organization's business model. Understand how the company generates revenue, what competitive pressures it faces, and what strategic initiatives are underway. Learn the language of business so you can translate security concerns into terms that executives and board members can understand and act upon. As Schaufenbuel notes, "an effective cybersecurity program depends on people, process, and technology, in that order of importance." Cultivate relationships with stakeholders across the organization, from frontline employees to executive leadership. Listen to their concerns, understand their priorities, and look for opportunities to align security initiatives with business objectives. When proposing security measures, clearly articulate both the risks being addressed and the business benefits of the solution. Be prepared to compromise on technical perfection when necessary to achieve practical security improvements that the organization can successfully implement. Remember that your ultimate goal isn't perfect security—which is impossible—but rather enabling the business to achieve its objectives with appropriate risk management. As Wendy Nather advises, security leaders must "engineer cooperation" with colleagues and other departments. By balancing technical excellence with business understanding, you transform security from a barrier to business innovation into a strategic enabler that builds competitive advantage through trustworthy products and services.

Chapter 6: Embrace Failure as Your Greatest Teacher

In cybersecurity, failure is not just inevitable—it's instructive. The most resilient security professionals recognize that mistakes, breaches, and setbacks provide invaluable learning opportunities that strengthen their skills and judgment. Rather than hiding failures or blaming others, they approach these experiences with curiosity and humility, extracting lessons that help them build more effective defenses. Charles Nwatu, a detection and response engineering specialist, references Matthew Syed's book "Black Box Thinking" to explain why failure is so instructive: "Failure is rich in learning opportunities for a simple reason: in many of its guises, it represents a violation of expectation. It is showing us that the world is in some sense different from the way we imagined it to be." This perspective transforms failures from embarrassments to be hidden into critical data points that reveal gaps in our understanding. David Rook's experience with production firewalls illustrates this principle in action. Early in his career, while working with enterprise firewalls, Rook disabled what he believed were unused rules based on log analysis. Minutes later, all customer payment transactions stopped processing. He had removed a critical rule that didn't generate logs due to volume concerns. Rather than hiding his mistake, Rook immediately acknowledged responsibility and rolled back the changes. This painful experience transformed Rook's approach to security work. He became more thorough in his analysis, more cautious about assumptions, and more diligent in testing changes before implementing them in production environments. The lesson wasn't just technical—it was about the dangers of overconfidence and the importance of verification. As Rook reflects, "The lesson here is don't be arrogant like I was, and don't make assumptions." This failure, while uncomfortable in the moment, made him a more effective security professional in the long run. To embrace failure as a learning opportunity in your own security practice, start by creating an environment where mistakes can be discussed openly. Distinguish between blameworthy failures (negligence, malice) and praiseworthy failures (good-faith efforts that reveal system weaknesses), celebrating the latter as contributions to organizational learning. Document what went wrong, analyze root causes without defensiveness, and share lessons learned with peers to prevent similar issues. Implement post-incident reviews that focus on systemic improvements rather than individual blame. Ask questions like: What assumptions did we make that proved incorrect? What signals did we miss? How could our processes or tools have better supported our team? Use these insights to strengthen your security posture and prevent similar failures in the future. Remember that the greatest security professionals aren't those who never fail—they're those who learn and grow from each failure. As Ben Ten advises: "Fail hard, and fail often. You're going to mess up, and that's okay. Just remember to learn from those failures so you don't repeat them." By embracing this mindset, you transform setbacks into stepping stones on your journey to building more effective and resilient security practices.

Chapter 7: Maintain Resilience Through Self-Care and Boundaries

The cybersecurity field presents unique psychological challenges that can lead to burnout if not properly managed. The constant pressure of defending against evolving threats, the high stakes of security failures, and the often thankless nature of preventative work create a perfect storm for professional exhaustion. Developing sustainable self-care practices and establishing clear boundaries is therefore essential for long-term success and wellbeing in this demanding field. David Rook, European security lead at Riot Games, shares how he learned this lesson the hard way. Early in his career, Rook prided himself on his dedication—working long hours, remaining constantly available, and sacrificing personal time to address security issues. This approach initially earned him recognition and advancement, but the cost became apparent when he found himself exhausted, irritable, and losing passion for the work he once loved. His effectiveness declined despite working more hours, and relationships with both colleagues and family suffered. The turning point came when Rook realized that his unsustainable work habits were actually undermining his security goals. After a particularly grueling project left him physically ill from stress, he made a deliberate decision to prioritize self-care and establish clear boundaries. He began taking regular time off, disconnecting completely from work communications during personal time, and developing interests outside of security. He also became more selective about which organizations he worked for, choosing those that supported work-life balance. The results were transformative. Not only did Rook's wellbeing improve, but his effectiveness as a security professional increased. With proper rest and perspective, his decision-making became sharper, his creativity flourished, and his ability to handle crises improved. As he explains, "Figure out what you need to do to look after yourself. All of the best leaders I know in this field have a significant hobby outside of cybersecurity." To maintain your own resilience through self-care and boundaries, start by recognizing that rest is not a luxury—it's a necessity for effective security work. Establish clear boundaries between work and personal life, including specific times when you're unavailable for non-emergency communications. Create technology-free zones or periods in your life where you can fully disconnect and recharge. As Dug Song recommends, practice periodic "data cleanses" where you deliberately step away from information inputs to create space for reflection and original thinking. Develop interests and relationships outside of security that provide balance and perspective. Physical activity, creative pursuits, time in nature, and meaningful connections with others all contribute to resilience. Pay attention to basic physiological needs—adequate sleep, nutrition, and movement—which form the foundation of cognitive and emotional wellbeing. Remember that maintaining boundaries isn't selfish—it's essential for sustainable security work. By modeling healthy work habits and supporting others in maintaining their own boundaries, you contribute to a more resilient security culture. As Bruce Potter notes about his trout fishing hobby, having interests outside security "keeps me sane" and ultimately improves his effectiveness as a security professional.

Summary

Throughout this exploration of digital resilience, we've discovered that true security strength comes not from perfect protection but from developing the mindset, skills, and practices that allow us to adapt to challenges and recover from setbacks. As Dug Song wisely observed, "Reputation takes a lifetime to build, but it can go away in a second. The meaning of life is to live a life of meaning." This profound insight reminds us that our security work isn't just about protecting systems and data—it's about creating meaningful impact through service to others. The journey to digital resilience begins with a single step. Today, identify one area where you can shift your perspective: perhaps viewing a recent security challenge as a learning opportunity, reaching out to build a new community connection, or establishing a self-care practice that will sustain you through difficult times. Remember that resilience isn't about never falling—it's about rising each time with new wisdom and determination. The fortress of digital resilience is built one mindful practice at a time, creating protection that withstands the tests of an ever-changing digital landscape.

Best Quote

Review Summary

Strengths: The book features a diverse group of 70 notable hackers, providing a wide range of perspectives from authors, speakers, business leaders, software creators, and experts in cybersecurity. The structure is inspired by Tim Ferriss's successful self-help book, which adds a familiar format for readers. Weaknesses: The book's structure, with each chapter dedicated to a different individual and the same 14 questions asked, may not be conducive to reading cover to cover. The review suggests that a print copy is preferable to an electronic version, implying potential issues with the digital format. Overall Sentiment: Mixed Key Takeaway: While the book offers valuable insights from a diverse group of cybersecurity professionals, its repetitive structure may not engage all readers, and a print version is recommended for the best experience.

About Author

Loading...
Marcus J. Carey Avatar

Marcus J. Carey

Read more

Download PDF & EPUB

To save this Black List summary for later, download the free PDF and EPUB. You can print it out, or read offline at your convenience.

Book Cover

Tribe of Hackers

By Marcus J. Carey

0:00/0:00

Build Your Library

Select titles that spark your interest. We'll find bite-sized summaries you'll love.