Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Professional Hackers
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
Jim Geovedi
June 12, 2009
Technology
130
0
Share
Professional Hackers
Are hackers getting paid now, like a pro?
Jim Geovedi
June 12, 2009
More Decks by Jim Geovedi
See All by Jim Geovedi
Who's Smarter Than Machine?
geovedi
0
140
Unstructured Data is the New Gold: ML + NLP is the New Shiz!
geovedi
5
930
Machine Learning for Cybersecurity
geovedi
5
2.6k
Waluku: Answering Astronomy Questions through Social Media
geovedi
0
200
@begobet
geovedi
0
330
The 21st Century Bank Job
geovedi
0
150
Satellite Telephony Security
geovedi
0
94
Hacking a Bird in the Sky: The Revenge of Angry Birds
geovedi
0
140
Cloud Security - Security Aspects of Cloud Computing
geovedi
0
91
Other Decks in Technology
See All in Technology
Vision Banana: Image Generators are Generalist Vision Learners
kzykmyzw
0
360
ワールドカフェ再び、そしてゴール・ルール・ロール・ツール / World Café Revisited, and the Goals-Rules-Roles-Tools
ks91
PRO
0
150
20260513_生成AIを専属DSに_AI分析結果の検品テクニック_ハンズオン_交通事故データ
doradora09
PRO
0
220
Oracle Cloud Infrastructure presents managed, serverless MCP Servers for Oracle AI Database
thatjeffsmith
0
230
『生成AI時代のクレデンシャルとパーミッション設計 — Claude Code を起点に』の執筆企画
takuros
3
2.3k
Modernizing Your HCL Connections Experience: Visual Report to chain, Profile Enhancements, and AI Integration
wannesrams
0
300
Forget technical debt
ufried
0
190
AIの揺らぎに“コシ”を与える階層化品質設計
ickx
0
270
20260516_SecJAWS_Days
takuyay0ne
2
320
カオナビに Suspenseを導入するまで / The Road to Suspense at kaonavi
kaonavi
1
450
AI-Assisted Contributions and Maintainer Load - PyCon US 2026
pauloxnet
1
100
Claude Code / Codex / Kiro に AWS 権限を 渡すとき、何を設計すべきか
k_adachi_01
5
1.2k
Featured
See All Featured
First, design no harm
axbom
PRO
2
1.2k
The Success of Rails: Ensuring Growth for the Next 100 Years
eileencodes
47
8.1k
What the history of the web can teach us about the future of AI
inesmontani
PRO
1
550
Connecting the Dots Between Site Speed, User Experience & Your Business [WebExpo 2025]
tammyeverts
11
910
How Fast Is Fast Enough? [PerfNow 2025]
tammyeverts
3
560
It's Worth the Effort
3n
188
29k
Balancing Empowerment & Direction
lara
6
1.1k
How People are Using Generative and Agentic AI to Supercharge Their Products, Projects, Services and Value Streams Today
helenjbeal
1
180
Agile Leadership in an Agile Organization
kimpetersen
PRO
0
150
JAMstack: Web Apps at Ludicrous Speed - All Things Open 2022
reverentgeek
1
440
Ten Tips & Tricks for a 🌱 transition
stuffmc
0
110
Stop Working from a Prison Cell
hatefulcrawdad
274
21k
Transcript
jim geovedi information security troublemaker, professional script kiddy professional hackers
hackers
are hackers getting paid now, like a pro?
professional hackers
corporate hackers
corporate hackers programmer deals with programming operating systems or applications
corporate hackers administrator responsible for running special equipment or whole
infrastructures
corporate hackers operator sitting in front of a monitor (or
several) all days and evaluating output of logs and system messages
corporate hackers security officer writing the security policies and procedures
for the company decides what to do when security incident is happening defining security and access roles
corporate hackers it auditor independent organ within the organisation which
ensures the adequateness of it controls
corporate hackers consultant works for a consultant company (general consultant
companies, it consultant companies, or it security companies)
corporate hackers hacker check security of networks, review source code,
etc. hired to show to customers or press the company employ cool person
independent hackers
independent hackers operating system/software hacker develop and improve system based
on personal interest
independent hackers intrusion specialist concentrate primarily on how to break-
in the system or network
independent hackers vulnerability researcher discovering the vulnerability and how to
take advantage of it
independent hackers botnet owner take control of thousands of hosts
rent the botnet for ddos, anonymous proxy, spam, phising etc.
independent hackers rootkit/trojan/virus writer sometime work together with intrusion specialists
and botnet owner
independent hackers spammer/fraudster intend to result in financial or personal
gain
local hacking scene
how many professional hackers in indonesia? a question of ethics:
hackers behaviour real hackers vs. media whores local hacking scene
skill development certification for professional hackers valuing our own skills
local hacking scene
fin.