Wednesday, July 27, 2016

Security entrepreneur training manual information security he belonged to the

Lei Feng network (search "Lei Feng network" public, concern) by: author Zhang Ju, peak Swiss capital Director, is responsible for had Google and YouTube data center of building and shipped dimension, is Google China founding team members and first shipped dimension personnel, participation development and service environment construction, has any Joyent China District Chief, and friends friends System Chief operation officer, and speed An Zhen implementation Director, domestic first a into cloud computing industry of people. This is Zhang Ju in Ali's Security Summit entitled Investing in the eyes of "sense of" entrepreneurs of part of speech, resolve current problems and opportunities of the network security team, investors, entrepreneurs what security is "security"?

Security entrepreneur training manual: information security, he belonged to the circle of people

Investment in people's eyes "sense of" entrepreneurs

In the past year, China information security business to become very hot. Leaders set up a central network security and information technology since the head of the leading group, and as information security industry is receiving more and more attention, and "unknown Jue Li". It from the top, completely changed the investment community and industry for information security basic perception of entrepreneurship, making it a relatively neutral became a hot event.

I'd like to share with you, my years of observation and idea of entrepreneurial information security practitioners. Business no matter how I look at is a process of growth and transformation. It is important, since bound to begin this process, both non-defeat, threw back his head and be a hero.

1, for the destruction of "otherness"

Internal people, information security practitioner is actually a very special, very rare group. In thought, and computer engineers have essential differences in the traditional sense. Engineers have a pervasive idea: use of technology resources and raw materials, many components built into a system, in order to achieve a particular functionality. This is a typical construction and the creative process.

Contrary to the idea of information security practitioners. When they see a running system, usually think of is whether there are any loopholes in the system, and unreasonable on the design, use, construction of the weaknesses, and through these loopholes, shortcomings and weaknesses, to surrender the system, change their behavior leading to injury, or for our use. This process is a typical failure process.

Security entrepreneur training manual: information security, he belonged to the circle of people

Information security practitioners are often destructive of genius thinking MIU MIU iPhone 5 Case

Information security practitioners are usually destructive genius thinking people. However, our education system is pressed, correction, or even put an end to this destructive thinking. Survive or escape the baptism of open education, and in any case should be regarded as "other".

MIU MIU iPhone 5 Case

If traced back, education is perhaps the second. Because most of our evolution of destructive thinking individual is very negative. In the development of human resources is scarce for most States, constructive and creative individuals in an era of scarce resources is more likely to survive, while the natural destruction of the individual will live more difficult, both in food as well as color.

2, information security, he belongs to the insider's

Look out, legendary martial arts sensation in the field of information security. Large circles from the outside is a relative mystery, the people inside have special skills, can not for ordinary people. When it comes to martial arts, one very important thing is the influential people, it is also very important in information security. When it comes to influential, in fact, is two things, one is the level of martial arts. Like martial arts, parties everywhere as well as information security circles, the result is information security may be the technology one of the most competitive areas in the field. There should be more than half the world's offensive and defensive information security competition, held in East Asia.

Security entrepreneur training manual: information security, he belonged to the circle of people

Information security as a martial arts

Second, in addition to the skill, and character. Like the martial arts, and loyalty are often influential high master of information security practitioners often start from the hacker, then became a very influential experts in the field vertically. Along the way, grace JI, made friends with a group of friends, murderous, also have a group of loyal fans, becoming Lady in the field.

Entrepreneurship is different from other areas of information security, one of the main features is that this is an insider thing. A non-information security industry outsider, information security business, basically just play try. There is an old saying in China that was in place: operation not dispell, not Moss. And the entrepreneurial nature of this thing is to fight all the way to achieve fame and fortune. The process for entrepreneurs, both original nature, is often a challenge, is a process of reshaping, re-growth.

3, information security business: Liu Bang Xiang Yu fighting + strategy

Information security practitioners of growth process and is a classic from soldiers to generals, then to the heads of State of the process. They started out as a skilled engineering staff, following the actual confrontation become industry experts. A good security officer would normally through one's own ideas and technical heritage formed an influential coterie of soldiers which also meet the general location. This point is often the time to start thinking about entrepreneurship information security practitioners. Because they have the knowledge, experience, ideas, and even has a lot of contacts.

Security entrepreneur training manual: information security, he belonged to the circle of people

Development of information security in China is a typical from soldiers to generals and heads of

In fact, entrepreneurship is the key to the process from General to heads of State. There is too much uncertainty in this process, there are so many challenges and issues, there are too many want to consolidate resources and the need to unite forces, so there must be some means of circumvention, or requires a lot of compromise. This process is often from a high profile, high standards of military personnel, to a landing and the evolution of practical politicians.

Many information security practitioners who, intentionally or not Xiang Yu's shadow: not only courageous, but also goes out to win not only contempt for authority casual ease, more beauty in his arms. But truly successful entrepreneurs must add the element of Liu Bang: that is, essence of mastery of the people and the insight, vision, and adhere to, or compromise.

4, opposite, his fast is not broken

Information security is a very broad field (on the rapid development of information technology, information security coverage is rapidly increasing). Attack and defense of information security is an Evergreen property determines the information security market: evolving methods to create information security start-ups will spring up. In this context, information security practitioners in search of entrepreneurial direction need not to follow the so-called hot spots.

Security entrepreneur training manual: information security, he belonged to the circle of people

Information security defense decides this is a green market.

Information technology and entertainment industries have great similarities. We can do the opposite, take a step back and look, in fact, information security professionals are good at reverse engineering capability is now scarce by the impetuous business environment: a view of the current situation to find the cracks, weaknesses and imperfections are used.

Business startup with reverse thinking way more effective than positive, especially in the field of information security. Reverse thinking is often seen, current technology architecture and the current market environment, positive thinking is not easy to see, very clear weaknesses and imperfections. Can be launched from here to choose the appropriate direction, what kind of things do.

Business ultimately is one thing. Together with the industry, all the biggest challenges entrepreneurs face. It entrepreneurs especially for the information security. Good information security practitioners are very scarce resources, plus BAT3 (Baidu, Alibaba group, Tencent and qihoo 360) the past few years for the hoarding of information security personnel (all familiar names, basically to staggering salaries on a global scale, was under them), this means that the venture is nearly impossible from the angle of economic benefits and competition.

Security entrepreneur training manual: information security, he belonged to the circle of people

Influential information security company more attractive than the Giants.

Really are the rivers and Lakes of his generation in the field of information security personnel, familiar names were just part of a true master, and more importantly, young talented people to value most is often not economic interests, but with the same great people working together, growing from more good people to see their future career development.

This also explains the truly outstanding entrepreneurial team in gathering of information security industry tend to be more automatic. Good information security practitioner, have the opportunity, through its knowledge and expertise in the field of, to create very attractive personal brand. In a Word, your status of lakes are often more attractive than the icy giants.

Only the fast is not broken, an Internet entrepreneur was promoted to the extreme concept, I personally think it is harmful to entrepreneurship in the field of information security. Part of it is, all processes are usually not as fast as we talked about; and more importantly, the effectiveness of information security products are offensive and defensive information security embodied in the confrontation, as other offensive and defensive characteristics of the products, such as drugs and weapons development, often fail to help the product successful.

It cannot be denied that opportunity is an important cause decided to start a business to business success, but they usually boil out. Patience comes from confidence in the future and their own. When you do this thing very confident, will have the patience and insist to wait. I feel slow down information safety entrepreneurs is an important starting point.

5, adhere to principles, maintain discipline, leading by example

Management have a lot to say about the company and school, especially popular are various discusses how to manage a high IQ, high capacity crowd of theory. You can say a lot of fancy management concept, but the ultimate goal is to establish an efficient organizational structure to achieve technical and commercial objectives.

Cast aside the theory of, I think the essence of management is the most important two things:

Is to have principles, the second is to have discipline.

Principles for information security practitioners don't, discipline is more difficult to grasp and implement information security practitioners.

Security entrepreneur training manual: information security, he belonged to the circle of people

Discipline is often more difficult to grasp and implement information security practitioners.

Management itself is an organization within the system you want to set up a good, reasonable standard. Specification depends on the discipline to protect, all things should be at a reasonable standard. Company culture built on the company adhering to the principles, including principles, it is important what not to do. These are paramount to an information security firm – internal principle is fairness, impartiality, respect each other behind the principles and discipline, and also have a little more to the founder's own request, and that is to lead by example. Information security practitioners many times on rules and disciplines are almost paranoid disdain, but adherence to the principles and discipline, the founder, is driving the development of the entire company into a well-managed, cultural entity of basic requirements for good.

6, was born in fear and market position from the trust MIU MIU iPhone 5 Case

The nature of the information security market driving force is fear-the fear of data theft of assets, fears of trade secret theft of information security incidents leading to fears the loss of brand, reputation and customer.

In fact, many of the industry's business model is built on the basis of fear. Insurance is another fear based industries combination of insurance and the information security industry is a very important topic of discussion. Fear itself is a big driving force, so that customers find your products, and your services to providing information security safeguards.

Clearly, the fear is the starting point for information security products and services fall, but a hope that the long-term development of information security company, be sure not to enhance the sense of fear as a means of market feedback. As implementation of security capabilities, information security company market position from trust instead of fear.

Trust, stronger, comes great responsibility. A truly successful company is usually a rule established in the field of information security, the man rather than a protection fee.

Security entrepreneur training manual: information security, he belonged to the circle of people

The nature of the information security market driven by fear.

In short, fear and, then, to seek and win, to governance and stability, to Germany for a long time, it was probably a security startups from scratch, from weak to strong process. Finally would like to share: heroic feet on those who do.

I would like to dedicate this entrepreneurial way of information security practitioners. 

Lei Feng network Note: the copyright belongs to the peak and the Swiss capital, please contact our licensing and keep the source and author, no deletion of content.

No comments:

Post a Comment