Ted Demopoulos
Principal InstructorOwner at Demopoulos Associates
Specialities
Cybersecurity and IT Essentials, Cyber Defense
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsCybersecurity and IT Essentials, Cyber Defense
Ted Demopoulos' first significant exposure to computers was in 1977 when he had unlimited access to his high school's PDP-11 and hacked at it incessantly. He consequently almost flunked out but learned he liked playing with computers a lot. His business pursuits began in college and have been continuous ever since. His background includes over 25 years of experience in information security and business, including 20+ years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other businesses. Ted is a frequent speaker at conferences and other events, quoted often by the press. He also has written two books on Social Media, has an ongoing software concern in Austin, Texas in the virtualization space, and is the recipient of a Department of Defense Award of Excellence. Ted is also a faculty member of the SANS Technology Institute, an NSA Center of Academic Excellence in Cyber Defense and multiple winner of the National Cyber League competition. In his spare time, he is also a food and wine geek, enjoys flyfishing, and playing with his children.
Ted's just great - he made even the bits of the material I knew well and made them fresh and relevant again - big thank you!
Ted has a very relaxed and captivating style. It was easy to stay awake and attentive to his instruction.
Ted's energy and insight brought the material to life.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
Of course, there are serious problems we are confronting now, and some people and businesses are not doing well. Yet some people and businesses are doing alright, and some are actually thriving.While luck certainly does play a role, what can we do to maximize the probability of coming out of this better than before? Obviously sitting on the couch, watching TV and lamenting what is happening doesn't help, and saying "take care of yourself, stay healthy" and other platitudes only goes so far.This talk covers concrete things you can do to weather the pandemic and thrive, both during and afterwards. Included is a planning template along with the slides so you can make your plan along with Ted.Some of us are taking this as an opportunity to reboot ourselves and our careers and come back better than ever. You should too!
What are the critical skills that extremely successful infosec professionals need and how can we develop these? Obviously, technology matters but it's not just about technology. In Ted Demopoulos' research, talking to, interviewing, and basically spending time with infosec professionals that are so successful that the moniker “Rock Star" is sometimes entirely appropriate, he has distilled 5 critical professional, and sometimes, life skills. This talk covers these 5 skills with plenty of practice advice.
The hard skills required to be successful in the cyber security industry are constantly evolving. The evolution of technology and the ever-evolving threat landscape have contributed to a new world of hard skills cyber security professions need to be well versed. Acquiring additional skills will not only help you better protect your organization, but also help grow your successful career in this dynamic industry. Knowing what skills to acquire can be overwhelming when you do not know where to start.
We are lucky in Infosec. It may not be an easy field to get into, but once in infosec there is plenty of work available and many work models. Most start out as a full time employee. You have a job and work for one organization. You can also be a contractor. Most contractors have one contract with one client at a time, and the terms of remuneration are different than a full time employee and generally one has more freedom. You can also be an independent consultant, which is very different from a contractor although there is overlap. Consultants generally have multiple clients, the ability to earn more money, and far more freedom but not the alleged stability of a longer term contract or full time job. And of course there are also hybrid models as well. In this talk we discuss these work models and their strengths and weaknesses. Which is ideal for you? You may have a different opinion afterwards!
The classic way to make a massive difference with technology, or “Dent in The Universe,” is via a startup. We can define a startup as a company with high growth possibilities that is innovative and potentially disruptive. This describes most startups in the infosec space. Also, essentially every startup has a strong technology component today and infosec concerns. This translates to lots of startup opportunities for infosec professionals, whether as a founder, early-stage employee, rank and file employee, or even investor. In this talk we’ll discuss startups, including how important having a “great idea” may or may not be, funding options, as well as “exit” strategies. Funding options include bootstrapping, which means using existing resources, starting a business without external help or capital. Angel investors, affluent individuals who provide capital for a startup, are another option, as are venture capitalists, and crowd sourcing. An exit strategy is how illiquid assets like company ownership and stock are changed into liquid assets like cash. Even if you do not plan on exiting the company, you may want to convert some assets to cash. And of course any investors will want their money back with profits at some point. If you are focused on outcomes instead of inputs, a startup can be absolutely fantastic. If you are happy hacking more than just technology, but also happy to figure out and execute business concerns, such as hacking procedures and whatever it takes to make things work, a startup is an option to consider.
Becoming a successful consultant seems like a dream: high pay, freedom, and fascinating work. These can all be true yet there is more to the reality: as a consultant you are running a business, and you need clients!
Webcast 4 of 5 in our Special Series—Explore the full lineup here. In today’s complex threat landscape, no single security solution is enough. A modern cybersecurity strategy requires layered, overlapping defenses to detect, prevent, and respond to both external threats and insider risks.
The classic way to make a massive difference with technology, or “Dent in The Universe,” is via a startup. We can define a startup as a company with high growth possibilities that is innovative and potentially disruptive. This describes most startups in the infosec space. In this talk we’ll discuss startups, including how important having a “great idea” may or may not be, funding options, as well as “exit” strategies.
Review relevant educational resources made with contribution from this instructor.