You Can Write an Infosec Book!

Subscribers:
23,700
Published on ● Video Link: https://www.youtube.com/watch?v=R5g7UyqAjW8



Duration: 1:00:33
100 views
3


Reportedly, 81 percent of people want to write a book, and that number may be even higher in infosec as the field is rapidly evolving. And although almost any of us can, very few will.

In this talk we cover how to write a book, what to write about, options to get it published, and how to get people to read it so that it matters.

We destroy the many myths of writing a book such as you need to be a good writer to write a good book, you need to be a mind blowing expert, and you need to sell a lot of copies to make an impact.

Writing a book is an incredibly rewarding experience. You can write a book. It is not that hard! If Ted Demopoulos, who historically was a horrible writer and always hated it, has written several, then you can, too.

Topics include:

· Why write a book?
· What to write about ­– the book’s topic
· The writing process and simple writing hacks
· The “Book Proposal"" - why you want one even if you self-publish
· Publishing options today
· Getting people to read the book
· Maximizing your books impact and success

Ted has over 25 years of experience in information security and business, including 20+ years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other businesses. Ted is a frequent speaker at conferences and other events, quoted often by the press. He also has written two books on Social Media, has an ongoing software concern in Austin, Texas in the virtualization space, and is the recipient of a Department of Defense Award of Excellence. In his spare time, he is also a food and wine geek, enjoys flyfishing, and playing with his children.

More about Ted: sans.org/profiles/ted-demopoulos
More about SEC401: sans.org/sec401




Other Videos By SANS Cyber Defense


2020-11-29Analysis 101 for Incident Responders | SANS Cyber Defense Forum 2020
2020-11-28Hiding in the clouds: How attackers can use applications for sustained persistence & how to find it
2020-11-27Asking Questions and Writing Effectively | SANS Cyber Defense Forum 2020
2020-11-25New Tools for your Threat Hunting Toolbox | SANS Cyber Defense Forum 2020
2020-11-16Full Packet Capturing with TShark for Continuous Monitoring & Threat Intel via IP, Domains, & URLS
2020-09-14PowerShell 2020: State of the Art / Hack / Infection
2020-07-30Social Engineering Your Way to Success | Justin Henderson & Ismael Valenzuela
2020-07-22Extending Your Home Lab to include Cloud
2020-07-17Danger Stewards – Measuring Risk and Predicting the Future for Fun and Profit
2020-07-17Network Compromise for the Technically Challenged (Dummies)
2020-07-17You Can Write an Infosec Book!
2020-07-17ICMP: A world beyond ping
2020-07-17CISSP Test-Taking Tactics: Successfully Navigating Adaptive Exams
2020-07-08Threat Intelligence: How to Focus Fire on the Bad Guys Coming for Your Network-SANS Blue Team Summit
2020-07-08DevBlue: Applying Software Engineering Practices to Blue Teaming for the Win! -SANS Blue Team Summit
2020-07-08Put Some Power in Your Shell: POSH for Incident Response at Scale - SANS Blue Team Summit
2020-07-08Creativity, Convergence, & Choices: Security Analyst Thinking Modes - SANS Blue Team Summit
2020-07-08Threat Hunting via DNS with Eric Conrad - SANS Blue Team Summit 2020
2020-07-08Cobot Uprising: Smart Automation for Blue Teams with Mark Orlando - SANS Blue Team Summit 2020
2020-07-08Real-Time OSINT: Investigating Events as They Happen with Josh Huff | SANS OSINT Summit 2020
2020-07-08Weaponizing the Deep Web with Matt Edmondson - SANS OSINT Summit 2020