{"id":290,"date":"2024-12-02T03:58:35","date_gmt":"2024-12-02T03:58:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/?p=290"},"modified":"2024-12-02T03:58:35","modified_gmt":"2024-12-02T03:58:35","slug":"greg-tomchicks-speech","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/2024\/12\/02\/greg-tomchicks-speech\/","title":{"rendered":"Greg Tomchick&#8217;s Speech"},"content":{"rendered":"\n<p>Riley McFadden<br>CYSE 200T<br>Nov 14, 2024<br>Greg Tomchick&#8217;s Speech<br>BLUF: During Greg&#8217;s speech, there were three items that resonated with me, were his<br>Establish, Preform, and Optimize principles, the importance of psychology in cyber security, and<br>his method for obtaining internships.<br>Establish, Perform, and Optimize.<br>One piece of dialogue that stood out to me during Greg Tomchick\u2019s speech was his idea<br>of, Establish, Preform, and Optomize. Greg mentions that if I decide to pursue a career in cyber,<br>I will find myself at one of these steps. I may have to establish tools, policies, or procedures. I<br>may have to perform such as a penetration tester, testing what people have put in place. I may<br>have to optimize, by making security systems faster or reducing vulnerabilities.<br>Psychology in Cyber<br>Greg mentions how psychology plays a very large and important role in cyber security.<br>When Greg goes about establishing a company cyber security program, he uses a tool called prep<br>modeling which relies largely on psychology. The process involves outlining different threat<br>areas and determining why a hacker would choose to hack the company as well as how they get<br>others to follow along with the hacking process. This section stuck out to me because I am<br>considering getting a minor in Psychology.<br>Method for Internships<br>Greg states that going after companies and simply asking for an internship will not cut it<br>most of the time, instead, he recommends that I ask the company if they have a security standard<br>and how I can help to advance or establish it. A good question to include would be to ask why<br>the company values security as a whole and ask if they know what cyber security is. I think this<br>way of seeking internships will open many opportunities for me and prove to organizations that I<br>can create value for the company.<br>Conclusion<br>To wrap it up, Greg Tomchick\u2019s talk really gave me a new perspective on cybersecurity. His tips<br>on the Establish, Perform, and Optimize steps helped me see how different roles in cybersecurity<br>work. Learning how psychology plays into security was also eye-opening, and I like that it could<br>tie into my interest in psychology. Finally, his advice on internships focusing on how I can add<br>value instead of just asking for a spot makes a lot of sense. Overall, his insights gave me a<br>clearer picture of what to expect and how to stand out in the cybersecurity field.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Riley McFaddenCYSE 200TNov 14, 2024Greg Tomchick&#8217;s SpeechBLUF: During Greg&#8217;s speech, there were three items that resonated with me, were hisEstablish, Preform, and Optimize principles, the importance of psychology in cyber security, andhis method for obtaining internships.Establish, Perform, and Optimize.One piece of dialogue that stood out to me during Greg Tomchick\u2019s speech was his ideaof, Establish,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rileymcfadden\/2024\/12\/02\/greg-tomchicks-speech\/\">Read More<\/a><\/div>\n","protected":false},"author":29527,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/users\/29527"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/posts\/290\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rileymcfadden\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}