Jude Fils-Aimé - Proactive Insights from a Cyber Expert
Critical Stats
LinkedIn: https://www.linkedin.com/in/judefilsaime/
Started their cybersecurity journey in: 2010
Most passionate about: Offensive security, mobile security, digital forensics, and incident resposne.
Favorite zero-day: It hasn’t come out yet, but it will likely be an AI-based worm.
Favorite song: Come on, that’s easy… ”Hey Jude” by the Beetles!
Introduction
Jude has years of cybersecurity experience. He's dedicated to helping enterprises navigate digital transformations by providing tailored cybersecurity solutions that protect their brand and operational resilience. With a consultative approach, he focuses on enhancing customer experience, driving business growth, and ultimately increasing shareholder value.
Jude is a mover-and-shaker!
We selected Jude because he is a mover and shaker! He is an expert, but beyond that, he is a wonderful person. I have known Jude for years; he is kind, wise, and funny. If you put all of that together, it makes him very approachable. Why does that matter? In my years in security, most experts with Jude’s expertise tend to be intimidating. They might talk down to you or completely over your head. But that is not Jude. He is the opposite, and it makes you feel comfortable asking him questions or seeking guidance. This is a critical and (often) undervalued skill. If more had it, cybersecurity wouldn’t be so intimidating to so many.
Without further ado, we asked Jude our standard set of 5 questions to rule them all, and here are his responses:
Five questions to rule them all!
1. What is the biggest problem we are dealing with in cybersecurity?
Social engineering is a pervasive threat in cybersecurity. As social creatures, we're susceptible to manipulation. Threat actors exploit our natural tendencies, often preying on human error, to launch successful attacks. These attacks can be rather devastating to even the most security-hardened companies.
2. How can we address social engineering?
There are a few ways, particularly by addressing the issue as part of a comprehensive social engineering defense strategy, to include:
A sound mobile security policy
Security protection controls
Detection and incident response measures
Ongoing testing and reporting
Keep in mind that you will never eliminate the threat, but you can mitigate it. By embracing a social engineering defense strategy, you can minimize the danger that threat actors pose.
3. What are three actions a CEO can take to protect their company from cyberattacks?
Three actions a CEO can take to protect their company are:
Lead by example and be part of the solution - I see many more CEOs taking responsibility for their organization’s security maturity and hygiene, so starting here is critical. It sets the tone for everyone to follow, and your Chief Information Security Officer (CISO) will thank you!
Prioritize security from day 1 - Security should not be an afterthought but an integral part of every technology and business initiative from the beginning… in the planning stages. When facing a cyber incident, organizations that plan ahead will always fare better than those learning on the fly… while the incident unfolds.
Assume you have been breached - Last but not least, I would assume that you’ve been breached and threat actors are already in your environment… act accordingly - find and stop them. This might sound a bit paranoid, but assessing your security posture is a great exercise. Even if you don’t find threat actors, you will find several areas to improve your security.
4. What are the best resources for learning more about cybersecurity?
Here are my goto resources:
Security podcasts - I regularly listen to CyberWire Daily, Threat Vector, and many others!
Security conferences - I attend RSA, BlackHat, DefCon, and local Atlanta events.
Interacting with other practitioners - I am a massive fan of Michael F. D. Anaya and everything he does… well, most of what he does. LOL! But on a serious note, I don’t know everything. No one does, so we all have to rely on one another to stay ahead of the threat actors.
Hands-on training - I have a home lab where I test and expand my knowledge. I also like SANS courses and capture-the-flag events. And if you are just getting started, YouTube is a great way to watch and learn what others are doing.
5. What is one piece of advice for those wanting to pursue a cybersecurity career?
One? Why stop at just one? I have a few:
Find your lane - Figure out what really interests you.
As a follow-on, find leaders in that space - Learn from them by reading their books, listening to their podcasts, etc. But also make them your mentors.
Be fearless and bold - Don’t be scared to email thought leaders. And never be afraid to fail; we all fail… what matters is what we do after we fail.
Ask lots of questions - Don’t be afraid to ask lots of questions of anyone already in the field. They all have the answers to your questions, you just have to ask them.
I'm the king of the world! Soooo…yeah. Share this article. K, thanks, bye.
Are you looking to go to a persona page?
Cyber 101 | The Solopreneur | SMB | BoD