Blog Posts Tagged with "Training"

7fef78c47060974e0b8392e305f0daf0

Join Infosec Island and Tripwire at Security BSides Las Vegas

June 27, 2012 Added by:Infosec Island Admin

Each BSides is a community-driven framework for building events for and by information security community members. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ENISA: Getting Ready for Cyber Europe 2012

June 27, 2012 Added by:Headlines

Cyber Europe 2012 is the 2nd pan-European exercise on Critical Information Infrastructure Protection. It ties together the extensive activities in the EU, at both national and European level, to improve the resilience of critical information infrastructures. The exercise will take place in the autumn...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Elementary Information Security

June 21, 2012 Added by:Ben Rothke

For anyone looking for a comprehensive information security reference guide - Elementary Information Security is it. While the title may say elementary, for the reader who spends the time and effort to complete the book, they will come out with a complete overview of every significant information security topic...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threats Confound Enterprise Security Efforts

June 20, 2012 Added by:Headlines

"The majority of staff within any organization are trustworthy and honest. But businesses must understand the scale of the threat posed by the small proportion of staff who act dishonestly and defraud their employer and the numerous ways in which an organization can be targeted"...

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Webcast: Risk-Based Security Management

June 20, 2012 Added by:Tripwire Inc

RBSM is defined as applying rigorous and systematic analytical techniques to evaluate the risks that impact an organization’s information assets and IT infrastructure. Tripwire and Ponemon Institute researched the state of risk management and came up with some interesting findings. Join us for this webcast...

Comments  (0)

02a6d0efd54c7388e26f125d8df83671

Is BYOD a Nightmare for IT Security or a Dream Come True?

June 19, 2012 Added by:Megan Berry

While you still may be debating whether or not to allow employees to use their own smartphones or tables for work, many organizations realize that they may not have a choice. Though it may seem that the risks of unsecured devices are a security nightmare, with the right tools, companies can work BYOD to their advantage...

Comments  (24)

69dafe8b58066478aea48f3d0f384820

NSA's National Centers of Academic Excellence Announced

June 15, 2012 Added by:Headlines

Program graduates often develop into cyber experts who help to protect national-security information systems, commercial networks, and critical information infrastructure in both the private and public sectors – meeting the increasingly urgent needs of the U.S. government, industry, and academia...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Building Secure Web Applications: An Infographic

June 14, 2012 Added by:Fergal Glynn

Neglecting to take security measures at the application layer is one of the most common causes of data breaches, yet many companies still leave their applications unprotected. Securing applications begins with developer training on the risks applications face and methods required for vulnerability prevention...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain Eight: BCPs and DRs

June 14, 2012 Added by:Javvad Malik

Some companies are not factoring cloud-based or 3rd party hosted applications into their DR plans because contractually the cloud provider is responsible. What would you do if your cloud-provider got hit by a disaster they couldn’t recover from. What would you do in order to continue your business operations?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Conducts Big Data Workshop

June 14, 2012 Added by:Infosec Island Admin

In this first NIST 'Big Data' workshop, key national priority topics will be explored, including examples from science, health, disaster management, security, and finance. At the same time, topics in emerging technology areas including analytics and architectures will also be discussed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cybersecurity Center Kicks Off with Workshop

June 11, 2012 Added by:Headlines

The workshop’s goal is to introduce the center, which will bring together experts from industry, government and academia to develop practical, interoperable cybersecurity approaches that address the real-world needs of complex IT systems...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Security Field Entry Advice

June 08, 2012 Added by:Jayson Wylie

Government reports show that there is up to a fifty percent gap for information security needs to those able to fill them. This means that more and more people will attempt to enter into the information technology security field as the compensation for those who have security talent rises...

Comments  (2)

Bbb285308604bc5fbb9b43590d0501f6

Security BSides Las Vegas Mentorship Program

June 07, 2012 Added by:Security BSides

One of the many great things happening this year at BSides Las Vegas is the New Speaker Mentor program. The goal is to encourage new speakers to participate in the community. A team of mentors will work with the new speakers to hone their presentation and provide support for them...

Comments  (1)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance Hosts White House Cyber Jobs Event

June 06, 2012 Added by:Marjorie Morgan

"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Secretary Napolitano Announces Cyber Workforce Initiative

June 06, 2012 Added by:Headlines

“Today we face an increasing demand for the best and brightest in the cybersecurity field across industry, academia and government. DHS is committed to working with our partners... to develop the next generation of cyber professionals to protect against evolving cyber threats"...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hallway Con: The Real Reason to Go to Security Conferences

June 04, 2012 Added by:Rafal Los

No matter how much we push to a connected world via digital mediums - the human interaction, the discussion, and the ability to have a deep and meaningful problem-solving session outside the confines of the office is one of the most valuable things you can ever provide for your organization...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »