The enemy that quietly and slowly attacks your physique, and how to combat it Credit: Thinkstock Change is difficult, especially when transitioning to a new career. A lot of times, work demands too much of your time and instead of living a healthy lifestyle, you find yourself sitting behind a computer for 10 to 12 hours a day, sometimes up to seven days a week.Not being able to achieve a work/life balance can turn what was a healthy physique into a far less muscular version of what once was. Nathan Magniez, security services enablement architect, Optiv Security, knows all too well the toll that a sedentary job can take on the body. A former U.S Marine turned cybersecurity pro, Magneiz went from having a hard body of armor to slipping physically out-of-shape. The change didn’t happen instantly, though. “I transitioned out of the Marine Corp 10 years ago, and I kept some of those principles of performing different levels of physical activity,” Magniez said. But, being able to eat whatever he wanted and stay as fit as he once had been wasn’t as easy as he expected it to be. “I went from on my feet 12 hours a day to being behind a computer, plus I was aging,” Magniez said. Going from the person people call on for help to the person who has to admit he needs help can be humbling, especially for those who are used to giving, not asking for, advice.It took him 10 years to admit that he needed some help, which is counter to his profession as a consultant. Professionally, he understands that people need help solving problems, but he didn’t want to be the guy who needed help getting fit. He wanted to fix it alone. In his Derbycon talk, “Body Hacking 101 (or a healthy lifestyle for security pros)” Magniez discussed his diet agnostic approach to change. “I hired a professional trainer, started making better food choices, and became more informed about what makes up nutrition, then we came up with a plan to fit my goals.”As he talked about monitoring and tracking his food intake, I couldn’t help but notice the correlation between protecting the body and defending the digital environment. How many times have you heard a security pro say that in order to mitigate risks, you first need to know your risks?It’s the same with the body, said Magniez. “I teach security classes, and when we talk about packet analysis of network activity, we talk about normal versus abnormal behaviors.” In order to determine the malicious behavior, you have to start by looking at the normal baseline activities. “In order to alter your eating habits and physical habits, you need to first ask, What is your baseline? What do you need to do to change those?” Magniez said. Using myfitnesspal.com to track caloric input and output made achieving his goals much more manageable. However, as it is in security, so too is it in the human body. Magniez needed to know what was going on in his environment. He needed to understand more about fats, carbohydrates, and proteins, and how different foods work together to fuel the body or have adverse affects on wellness.So, if you see yourself slipping into a less than impressive version of what you want your body to look like, defend yourself against the enemy. Work together with like-minded people who share in the struggle to find a work/life balance that allows them to both look and feel healthy. “I worked remotely with a group of people on Facebook, Body Hackers, which allowed us to help keep each other accountable,” said Magniez. Defending the body against intruders that will slowly attack its health is not a set and forget process either. Changing habits can take time, so is setting goals, Magniez said, “Take the safer approach. Rather than saying I’m going to lose 20 pounds in two weeks, try working toward losing a pound a week.” Related content news analysis Searching for unicorns: Managing expectations to find cybersecurity talent Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. By Kacy Zurkus Sep 29, 2017 4 mins IT Skills Careers IT Leadership feature Vulnerability vs. risk: Knowing the difference improves security Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks. By Kacy Zurkus Sep 26, 2017 3 mins Risk Management Vulnerabilities IT Leadership opinion What the Equifax breach means to me — an end user perspective Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in another massive breach? By Kacy Zurkus Sep 15, 2017 4 mins Cyberattacks DLP Software Internet Security opinion Abandoned mobile apps, domain names raise information security risks When app creators abandon domains for bigger, better deals, what happens to all the app-specific data? By Kacy Zurkus Sep 08, 2017 3 mins Access Control Data and Information Security Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe