Items Tagged with "Training"


Security Awareness Training for Employees

June 07, 2012

Security awareness training can be a bit dull and boring, so we commonly try to come up with ways on how to make it a more engaging topic for our audience. But do we end up patronizing them with gimmicks and child-like messages?

Comments  (0)


Security BSides Las Vegas Mentorship Program

June 07, 2012 Added by:Security BSides

One of the many great things happening this year at BSides Las Vegas is the New Speaker Mentor program. The goal is to encourage new speakers to participate in the community. A team of mentors will work with the new speakers to hone their presentation and provide support for them...

Comments  (1)


Internet Security Alliance Hosts White House Cyber Jobs Event

June 06, 2012 Added by:Marjorie Morgan

"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...

Comments  (0)


DHS Secretary Napolitano Announces Cyber Workforce Initiative

June 06, 2012 Added by:Headlines

“Today we face an increasing demand for the best and brightest in the cybersecurity field across industry, academia and government. DHS is committed to working with our partners... to develop the next generation of cyber professionals to protect against evolving cyber threats"...

Comments  (0)


Hallway Con: The Real Reason to Go to Security Conferences

June 04, 2012 Added by:Rafal Los

No matter how much we push to a connected world via digital mediums - the human interaction, the discussion, and the ability to have a deep and meaningful problem-solving session outside the confines of the office is one of the most valuable things you can ever provide for your organization...

Comments  (0)


BSidesDetroit: ConBlu, and a First Try at Presenting

June 03, 2012 Added by:Scott Thomas

The great thing about the people (and our industry as a whole) is that people attending were willing to share their thoughts and what they did to stave off burnout. The conference itself was awesome. The different tracks made it easy to have hallway-con, as well having a teaching area, and a lock-pick village...

Comments  (0)


How to Deal with a Security Incident

June 01, 2012

"Incidents are bound to happen, there's no avoiding it!" Brian Honan, internationally recognized information security expert, offers tips on how to respond to security incidents...

Comments  (1)


Conferring about Security Conferences

May 30, 2012 Added by:Wendy Nather

There's a great discussion going on right now on Twitter about what's wrong with security conferences: Do we have too many? Are they focusing on the wrong things? Even if the hot topics are nominally the same, the perspectives and timbre of discussions will be very different...

Comments  (1)


NIST Workshop: Safeguarding Health Information

May 30, 2012 Added by:Infosec Island Admin

The HIPAA Security Rule sets federal standards to protect the confidentiality, integrity and availability of electronic protected health information by requiring HIPAA covered entities and their business associates to implement and maintain administrative, physical and technical safeguards...

Comments  (0)


Metasploit: The Penetration Tester’s Guide - A Review

May 28, 2012 Added by:Dan Dieterle

The exploiting sections are very good, covering the famous exploitation techniques of attacking MS SQL, dumping password hashes, pass the hash & token impersonation, killing anti-virus and gathering intelligence from the system to pivot deeper into the target network...

Comments  (0)


The Best Security Advice

May 27, 2012

What's the best security advice you've been given? Attendees at Infosecurity Europe tell us their best information security tips. Don't forget to like the video if it has been of any use to you. As always, Javvad is easy to stalk...

Comments  (0)


NSA Announces New Program for Careers in Cyber Ops

May 23, 2012 Added by:Headlines

Many of the nation's colleges and universities offer courses or promote projects in cybersecurity. NSA's new program differs in that it integrates the relevant academic disciplines, with a focus on technology and the techniques associated with specialized cyber operations...

Comments  (0)


A Meandering Rant on Sexism in Security

May 22, 2012 Added by:Jack Daniel

The depressing “booth babe” situation is an ongoing embarrassment. In the right contexts, I have nothing against attractive people, fast cars, or other things normally used to sell cheap beer - I just don’t believe that tech and security events are the correct contexts...

Comments  (2)


ICS-CERT: From the Trenches - A Tabletop Exercise

May 22, 2012 Added by:Infosec Island Admin

Incident response is critical. During a real incident, you don’t want to discover major gaps in policy/procedure and/or technology tools. The collaboration that occurs during the exercise helps to understand the roles and responsibilities that each of us have during cyber attacks...

Comments  (0)


Infosec and the Death of the Rabbi

May 17, 2012 Added by:Carter Schoenberg

What is more valuable, a SCADA security pro that understands a plant with such detail that his knowledge may never be rivaled, or a person who can also understand the organizations mission need and business drivers and can translate security into quantified risk measurements...

Comments  (2)


NIST Workshop: The Technical Aspects of Botnets

May 16, 2012 Added by:Infosec Island Admin

NIST seeks to engage all stakeholders to identify the available and needed technologies and tools to recognize, prevent, and remediate botnets; explore current and future efforts to develop botnet metrics and methodologies for measuring and reporting botnet metrics over time...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »