No Title

From Network Admin to Cybersecurity Expert: Lessons from Decades of Change

It is early morning at my desk, third cup of coffee already rousing me to full consciousness, and I am daydreaming about just how different the cybersecurity world is today than when I started in 1993, as a network admin. Those were the days of managing networks and multiplexers by doing voice and data over PSTN—yes, for you yungins, look it up, just the good ol’ Public Switched Telephone Network. Just think of that, no whizzy cloud, no AI alarms going off every second, just thousands upon thousands of raw, dirty wires and switches.

And you know what, you gain a good bit of insight from witnessing what happens when chaos makes its way into the network. The Slammer worm still looms large in my memory. For you youngs, Slammer was a worm so fast it took big hulking chunks of the internet off the air in mere minutes. It was my first taste of just how flimsy and naked networks actually were. Now I run my own security company, where after years of that I help banks, mostly, navigate complex zero-trust upgrades.

I JUST returned from DefCon, and I’m buzzing from the hardware hacking village — watching how the vector of attack has matured from being about bits and bytes, to hardware, just really brings home that security is a whole. But enough with the nostalgia. Next, I want to go into some real-life lessons from my journey that can help your business survive the cybersecurity storm being felt today.


Network Admin to Cybersecurity Consultant: The Journey

In the PSTN era everything was hands-on. Networks were steel and copper, switches and multiplexers. No fancy dashboards or AI-powered detection (more on that skepticism below). From the beginning I learned the importance of knowing every layer of a network stack—not just a thin slice.

When Slammer worm struck in 2003, network defenses were largely focused on the perimeter — firewalls on guard at the gates like so many medieval castles. Then that worm slithered through cracks we had never imagined that it would uncover. I recall clients breaking down — systems locked up, processes stopped cold — because we’d never really thought about how quickly malware can actually spread, laterally, within a network. That was a wake-up call.

And now? I’ve rearchitected zero trust and rebuilt from the ground up at 3 of the largest banks. What did I learn? So, zero-trust ISN’T just a buzzword:

  • You should trust no device or user, verify everything, all the time.
  • MICRO-SEGMENTATION restricts lateral movement within a network/utility Control for accesses.
  • Real-time surveillance and analytics from the endpoint to the cloud

But it’s not plug-and-play. And adding zero-trust to your network is not like seasoning a pot of soup — you need the right ingredients, in the right proportions.


What I Saw at Defcon Will Change How You Think About Security

DefCon is always a taste of the future and this year the place to be was the hardware hacking village. Computers you trust — including routers, firewalls, and yes your favorite servers — can be compromised in person by attackers with the right gear. It’s not just bad code, bad actors can stroll up, plug in and own your systems.

Which means:

  • You should include physical security in your cybersecurity strategy
  • Tamper-evident is a must have solution
  • Immutability in logs can assist in retracing physical compromises after the fact

I met people who can pull encryption keys out of hardware by flipping switches and probing circuits. Incredible—and a little scary. Your security ops center must have visibility beyond the software layer.


Quick Take: What Your Business Should Do TODAY

If you have no time (Hey, we all get busy), here’s a summary of what I always lead with in discussions:

  • Evaluate your network segmentation: All of the data is residing in one giant flat network architecture you are just asking for problems to arise
  • Think zero trust, even if you can’t fully get there overnight
  • Purchase physical security protections for key hardware
  • Check, then update, your password policies (and yup, I’m going to complain about this below)
  • Oh and a word about those AI-powered silver bullets; think of them like spices–you use them sparingly, not as the main dish

Password Policies: Why I’m Still No Fan

Okay I need to say this. Password policies—UGH.

Here’s the thing, we all know the old rules: minimum length, complexity, periodic permutations. But honestly? Forcing users to change passwords every 30 days is only a recipe for creating easy-to-guess patterns — password1, password2 and so on. If your attitude toward data is grab first and ask questions later, it’s like using little locks on your vault and then sitting back and hoping thieves will get bored.

What works better?

  • Passphrases long enough for us human to remember but too long for machines to guess easily.
  • Multi-factor authentication (MFA)—and I mean actual MFA, not SMS codes that can be intercepted
  • Password managers, so the users are not running the same tired old key on every door

I get pushback: Some argue that it is necessary to have convoluted rules to prevent brute-force. True, but it’s more user behavior than anything else. You want to simmer down security like a fine curry: the appropriate blend in the right proportion, not mere heat.


Learning from Banking Transformations: Real World Zero Trust Deployments

Collaborating with three banks on zero-trust updates was a lesson in how to balance regulation, business needs and usability.

What stood out?

  • The beast is the legacy infrastructure. You can’t just rip and replace; you have to layer zero-trust on top, delicately.
  • Stakeholder buy-in is crucial—if other parts of the business feel the security team slows everything down, you lose traction
  • Audit Logs / Compliance Reports should be transparent / automated

We approached problems like:

  • Controlling scope with micro-segmentation, restricting what a compromised account see.
  • Identity management reform with rigorous authentication gating
  • Adding real-time analytics to endpoints for early detection of suspicious activity (not so much AI as you’d think, more rules-based with human)

It wasn’t perfect. We got hiccups around experience — because you can’t just put everyone through extra hoops without training and communication. But gradually, trust accrues when the network doesn’t just shut the doors after the robbery, but ensures that suspicious shadows don’t skulk in the halls.


Why You Should Be Wary of AI in Cybersecurity

Hey—everything’s AI-powered this, AI-powered that. Honestly, I’m skeptical. AI is great for pattern recognition but to have it as your firewall or I.D.S. is no better than setting the car on autopilot on a dirt road filled with potholes. It might be intelligent, but it is not infallible.

Most AI tools are trained on known threats and what has happened in the past. What about zero-day attacks? Social engineering? Hardware exploits? AI is not magic — it is just a tool.

My advice:

  • Augment with, but don’t replace human analysts, with AI-enable solutions.
  • Correlate classic signature and signature based on anomalies
  • Keep a set of human eyeballs in the loop at the highest levels of critical decision making

Final Thoughts from My Desk

Cybersecurity is somewhat like the fine tuning of an old car or the preparation of a family recipe passed down for generations. You have to honor the basics and then adjust for today’s prevailing road conditions (and taste buds).

It’s messy. It’s relentless. But if you have a half a century of haphazard successes and failures under your belt — like me — you begin to endorse patterns. You understand that technology evolves, but human nature does not. That’s where the challenge lies.

So if you run an electric grid, manage a bank’s digital fortress or just want to protect your business email, keep these lessons in mind:

  • Use multiple methods of defense — don’t count on a single tool or policy
  • It’s not just software: the importance of physical security
  • Work your people and keep them engaged
  • Be suspicious, especially of quick fixes and buzzwords

And for what it’s worth, if you ever want to chatter about zero-trust architectures or your firewall setup — give me a holler. I’ve also made enough network coffee to share stories and fix challenges.

Until next time — keep your networks close, and your passwords longer than my running list of things to do each morning.

– Sanjay Seth

Hardware Hacking Village at DefCon

Leave a Reply

Your email address will not be published. Required fields are marked *

Categories

Let’s Talk About How Can Help You Securely Advance

Get A Free Quote