Show Notes
Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in cybersecurity. In part two of this series, Ron and Chris host a mastermind conversation with Tia Hopkins, Charles Nwatu, AJ Yawn, and Kelvin Coleman. In this special conversation, we discuss ExIST, a framework to promote excellence in the pursuit of human endeavors like hobbies, careers, and finding purpose.
ExploreAs humans, we’re always on the brink of discovery. Watching a documentary, witnessing someone perform a piece of art or a eureka moment might be all that it takes to pull you in a new direction to explore a new topic. Learning something new can be like stepping into a new world that you’ve never experienced. This leap can be exciting, scary, or even uneventful but always leads to discovery.
Tia Hopkins began exploring technology since she can remember. One of her first memories of her interest in technology was when she noticed her mom stopped buying her toys because she would take them apart to understand how they worked. Tia took a giant leap into the new world of technology when she took apart her family and realized that she had to put it back together before her mom found out. Tia has explored many facets of technology from working with Internet Service Providers, IT teams, and Managed Detection and Response teams.
ImmerseAfter deciding which world to ExIST in, the next step to understanding and mastery is immersion. This is surrounding yourself in a new topic or idea and learning what it means to succeed in that arena. In sports, this might be watching a professional game and learning more about the rules. In cybersecurity, immersion may be reading blogs on the topic or watching YouTube videos that explain a focus area. While immersing yourself in this world you’ll identify the mindset needed to remain there and grow.
Charles Nwatu’s advice on immersion is to not be afraid to fail - It's the only way you succeed. Not giving yourself the opportunity to take the shot is even worse than failure itself. Learn how to consume content in any way that works best for you - read, listen, watch everything you possibly can. Identify ways that help you articulate what you’ve learned to others.
StudyAfter learning the rules and where the boundaries exist in the new world, the next step is to study. Using tools, knowledge, examples and mentors to improve your capabilities. If you’re learning about a topic with subtopics, you may need to re-immerse yourself in areas that you’re weak on. In this phase of the framework, you're using your new capabilities to rapidly learn and improve.
AJ Yawn provides the advice of staying focused and ignoring the results. To Focus AJ often implements the 90-90-1 rule. And it's taking 90 days spending the first 90 minutes of your day, focusing on ONE thing. Whenever AJ is trying out a new endeavour he ignores the results for the first 90 days, even if there’s no visible improvements. When picking up anything new the focus should be on the attempt rather than the outcome.
Translate / TransformTranslation is expressing the sense of wisdom into language. During this part of the ExIST framework, you’re using the collection of experience and wisdom to create, innovate, or teach. Taking your developed ability and bettering the lives of others.
Kelvin Coleman has always been an advocate of teaching others and promoting the people in the cybersecurity industry. Kelvin can recall researching and reciting state capitals that he’d take to his meetings to build a rapport with city and state government stakeholders. While the name of a state capital or mascot may not seem critical, it helped his customers understand that he does the research and cares about doing what is best for everyone.
Impactful Moments
0:00 - We Are Here a series exploring black excellence in cybersecurity
1:13 - Kelvin Coleman, the strategic mastermind
1:50 - Tia Hopkins, the technical juggernaut
2:25 - Charles Nwatu, the wise warrior
3:00 - AJ Yawn, the empathetic CEO
4:28 - ExIST, a framework to promote excellence
5:40 - Explore
22:14 - Immerse
56:09 - Study
1:10:10 - Translate/Transform
1:20:12 - Sage wisdom from our mastermind group
1:25:20 - How to keep in touch with our amazing guests
Stay In Touch Kelvin Coleman on LinkedIn
Connect with Tia Hopkins on LinkedIn and Empow(her) Cybersecurity
Follow Charles Nwatu on LinkedIn
Stay connected with AJ Yawn on LinkedIn
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Get your start in cybersecurity with SANS through their Diversity Cyber Academy! Applications are now open, and SANS is looking for the best and brightest to diversify the field! The SANS ICMCP Diversity Cyber Academy is available for current college students, college graduates, and career changers who are not already working in cybersecurity. Those interested can go to sans.org/dca or if you’d like to learn more about what SANS is doing on the Diversity and Inclusion front please visit https://www.sans.org/about/diversity
Recent Episodes
Cybersecurity Meets AI: The Good, The Bad & The Janky
There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect. In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make ...
A Human-Centric Approach to Cybersecurity with Edna Conway
What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to ...
Rise of the Machines: Why Your Attack Surface Has More Holes Than ...
Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product ...
How a Game Turned a Watchmaker into a Cybersecurity Pro with ...
What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and ...
Managing and Mitigating Cyber Risks For Your Assets with Jerich ...
What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management ...
The Year of the Agent: AI, Bug Bounties, and Cybersecurity ...
How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI ...
Understanding the Psychology of Cyber Risk with David Shipley
Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and ...
From Landscaping to Cyber Leadership with Cole Lisko
How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from ...
Think Like a Hacker, Solve Like a Leader featuring Ted Harrington
What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, ...
Hacking Trust with AI and Deepfakes featuring Iain Jackson
What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic ...
WORK WITH US
PODCASTS + SPEAKING + EVENTS
Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.
Thank you!
We will be in touch soon.