Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 15 additions & 0 deletions summary/sessions/269/attendees.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
==== Attendees

. link:https://twitter.com/KartikSoneji_[Kartik Soneji^]
. link:https://x.com/Alpastx[Alpesh Bhagwatkar^]
. Chintan Gurjar
. link:https://twitter.com/chiragnayyar[Chirag Nayyar^]
. link:https://twitter.com/furtado_jaden[Jaden Furtado^]
. link:https://twitter.com/harshgkapadia[Harsh Kapadia^]
. link:https://twitter.com/SirusTweets[Darshan Rander^]
. link:https://twitter.com/bhavesh878789[Bhavesh Kukreja^]
. Ayush Shukla
. Janvi Matani
. Rehan S.
. Shlok Bagwe
. Shubhranil Paul
Comment on lines +1 to +15
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
==== Attendees
. link:https://twitter.com/KartikSoneji_[Kartik Soneji^]
. link:https://x.com/Alpastx[Alpesh Bhagwatkar^]
. Chintan Gurjar
. link:https://twitter.com/chiragnayyar[Chirag Nayyar^]
. link:https://twitter.com/furtado_jaden[Jaden Furtado^]
. link:https://twitter.com/harshgkapadia[Harsh Kapadia^]
. link:https://twitter.com/SirusTweets[Darshan Rander^]
. link:https://twitter.com/bhavesh878789[Bhavesh Kukreja^]
. Ayush Shukla
. Janvi Matani
. Rehan S.
. Shlok Bagwe
. Shubhranil Paul
==== Attendees
. link:https://x.com/Alpastx[Alpesh Bhagwatkar^]
. link:https://twitter.com/bhavesh878789[Bhavesh Kukreja^]
. link:https://twitter.com/chiragnayyar[Chirag Nayyar^]
. link:https://twitter.com/SirusTweets[Darshan Rander^]
. link:https://twitter.com/harshgkapadia[Harsh Kapadia^]
. link:https://twitter.com/furtado_jaden[Jaden Furtado^]
. link:https://twitter.com/KartikSoneji_[Kartik Soneji^]
. Ayush Shukla
. Chintan Gurjar
. Janvi Matani
. Rehan S.
. Shlok Bagwe
. Shubhranil Paul

Alphabetical order

1 change: 1 addition & 0 deletions summary/sessions/269/config
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
catchup_config_noimage=1
25 changes: 25 additions & 0 deletions summary/sessions/269/content.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
Date: 03-01-2026

Duration: 2 hrs 15 mins

==== Topics Discussed

* Chintan Gurjar shared insights about cybersecurity certifications and their role in the industry.
** He discussed the difference between certifications in coding versus cybersecurity, noting that unlike coding fields like Java where there aren't world-wide recognized certifications, cybersecurity has established certification programs.
** Chintan explained why certifications matter in cybersecurity, especially for consulting companies.
*** He shared his personal experience: during his first 5 years, he didn't believe in certifications and didn't have any.
*** When he landed his 3rd job at KPMG New Zealand, his boss explained the value of certifications from a business perspective.
Comment on lines +10 to +11
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
*** He shared his personal experience: during his first 5 years, he didn't believe in certifications and didn't have any.
*** When he landed his 3rd job at KPMG New Zealand, his boss explained the value of certifications from a business perspective.

Maybe this is not needed ?

** Chintan explained how certifications are used in project proposals and client acquisition.
*** When competing for projects, consulting firms (including Big 4 companies) showcase their team's credentials.
*** Companies highlight how many OSCP-certified or CEH-certified professionals they have to demonstrate expertise to potential clients.
*** This portfolio of certifications helps firms win projects, which is why companies are often willing to pay for employee certifications.
** The discussion covered differences in interview processes between coding and cybersecurity roles.
*** For coding positions, companies typically give coding tasks (like LeetCode problems) where they can observe thought process, methodology, and coding skills directly.
*** In cybersecurity, the interview process is more complex due to multiple sub-domains (VAPT, GRC, Threat Detection Engineering, etc.).
*** For VAPT roles, setting up vulnerable infrastructure for technical interviews requires significant maintenance and management overhead.
*** For GRC roles, there's often no technical component to assess, making it harder to evaluate candidates.
Comment on lines +18 to +20
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Write Vulnerability Assessment and Penetration Testing (VAPT) once and then use VAPT for further mentions.

Write like this for GRC and other abbreviations too which are not so generic or if they are domain specific.

*** For specialized roles like Threat Detection Engineering, setting up interview infrastructure would be prohibitively expensive and complex.
** Chintan emphasized that certifications should be viewed as a tiebreaker, not the primary hiring criterion.
*** The hiring process should start with resume-based analysis of 6-7 candidates, followed by interviews.
*** If multiple candidates perform equally well, certifications can serve as a differentiator.
** Key takeaway: The main goal should be to learn cybersecurity; certifications should act as proof of knowledge, not the primary learning objective.