Educating and Training Future Cybersecurity Pros

Data Breach Today

Rob Clyde of ISACA discusses his ideas for how to raise up the next generation of "cyberwarriors" to serve on the front lines of active defense against cyberthreats

Training Discount

Adam Shostack

If you add this feed there’s a training discount on my next open training course, kicking off October 11. Hey you! Out there beyond the wall, breaking bottles in the hall, you haven’t removed this feed from your RSS reader! threat modeling

40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Wiper Malware Used in Attack Against Iran's Train System

Data Breach Today

Operational Security Mistakes Left Clues About Developer's Skills, But Not Identity Nearly three weeks ago, Iran's state railway company was hit a cyberattack that was disruptive and - somewhat unusually - also playful.

Iranian Hackers Accidentally Exposed Training Videos

Data Breach Today

IBM: Videos Detail Attacks on US Navy and State Department Personnel An Iranian-backed hacking group appears to have accidentally left over 40 GB of training videos and other material exposed online, according to researchers with IBM who found the unprotected server.

188
188

How to effectively deliver virtual training

OpenText Information Management

COVID-19 has significantly altered how we deliver and consume training. Services Training Professional Services Learning Services virtual learning virtual training

Reinventing Security Awareness Training

Data Breach Today

Want to improve how your organization delivers and absorbs security awareness training? Then it comes down to reinventing your approach, including gamification, says Barracuda's Michael Flouton

10 Security Awareness Training Mistakes to Avoid

Dark Reading

Give your cybersecurity culture a boost by adding these to the "don't" column of your cybersecurity awareness training do's and don'ts list

Remote Training for State Agencies and Local Governments!

The Texas Record

Visit our training page for registration instructions each month. For more information about these classes, visit our training page , send an email to rm_trng @ tsl.texas.gov, or contact your analyst.

Remote Training for Local Governments!

The Texas Record

Visit our training page for registration instructions each month. For more information about these classes, visit our training page , send an email to rm_trng @ tsl.texas.gov, or contact your analyst. Training Resources

Cybersecurity Training Agency Breached After Phishing Attack

Adam Levin

The SANS Institute, a company that provides cybersecurity training and certification, announced that a data breach compromised the personally identifiable data of roughly 28,000 records. The post Cybersecurity Training Agency Breached After Phishing Attack appeared first on Adam Levin.

Why Anti-Phishing Training Isn't Enough

Dark Reading

Not only is relying on employees' awareness insufficient to prevent sophisticated social engineering attacks, some training methods can create other problems

Free Threat Modeling Training

Adam Shostack

The current situation is scary and anxiety-provoking, and I can’t do much to fix that. One thing I can do is give people a chance to learn, and so I’m making my Linkedin Learning classes free this week. (I’m

IT 83

What Are the Requirements for CCPA Training? via TeachPrivacy

IG Guru

Check out this great overview about CCPA training from Professor Solove. The post What Are the Requirements for CCPA Training? Business CCPA Education IG News Information Governance information privacy Privacy Security Daniel Solove TeachPrivacy Training

Remote Training for Local Governments!

The Texas Record

Visit our training page for registration instructions each month. For more information about these classes, visit our training page here , send an email to rm_trng @ tsl.texas.gov, or contact your analyst. News You Can Use Training Resources

US Cyber Command and Australian IWD to develop shared cyber training range

Security Affairs

US Cyber Command and the Information Warfare Division (IWD) of the Australian Defense Force to develop a virtual cyber training platform. & Australia means we can both evolve our virtual cyber training range. Persistent Cyber Training Environment allows U.S. &

On Chinese "Spy Trains"

Schneier on Security

Congress is considering legislation that would prevent the world's largest train maker, the Chinese-owned CRRC Corporation, from competing on new contracts in the United States. News articles talk about " spy trains ," and the possibility that the train cars might surreptitiously monitor their passengers' faces, movements, conversations or phone calls. The trade war with China has reached a new industry: subway cars.

Remote Training for State Agencies and Local Governments!

The Texas Record

Visit our training page for registration instructions each month. For more information about these classes, visit our training page , send an email to rm_trng @ tsl.texas.gov, or contact your analyst.

Behind the Scenes: Training Development

Adam Shostack

I’ve talked about our new training , and I want to provide a little behind the scenes view. When you’re in a room with people, able to observe body language and facial expressions, it’s easier to adjust on the fly, and ‘rescue’ a training going badly.

IT 52

New Director of Records Management Training

National Archives Records Express

Christopher “Eddie” Kline joined our staff as the new Director of Records Management Training program in May and we asked him a few questions. New Records Management Training program director, Christopher “Eddie” Kline. General records management training

Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

Threatpost

Threat actors shift focus from COVID-19 to employee coronavirus training and current events like Black Lives Matter as cyber-attacks continue to rise.

Update on Jamf Training courses and Training Passes

Jamf

Read an update on these courses and Training Pass extensions Over the last few weeks, our Curriculum and Content Development team has been hard at work to adapt our curriculum and course infrastructure to a remote delivery format.

91

Best Cybersecurity Awareness Training for Employees in 2021

eSecurity Planet

Employee cybersecurity training has come a long way in the last few years. Back in the day, security training was largely reserved for IT security specialists and then extended to include IT personnel in general. Security awareness training for employees has come into its own of late.

Gamifying Password Training Shows Security Benefits

Dark Reading

When picking passwords, users often fall back on certain insecure patterns, but good habits can be learned using simple games, a group of researchers find

Can Training Work Remotely?

Adam Shostack

I get this question a lot: Can distributed/remote training work as well as in person? Especially for threat modeling, where there’s a strong expectation that training involves whiteboards. (I I remember one course in particular, about 15 minutes in, the buyer said: “Let’s get to the whiteboards already!”). ”). And there’s no doubt: people learn by doing.

IT 40

Compliance Training? What Compliance Training?

Dark Reading

Employees can run. but they can't hide. Or can they

Top Cybersecurity Employee Training Programs

eSecurity Planet

Employees are the weakest part of your cybersecurity defenses; here are 9 top security training vendors that can help

Malware Training Sets: FollowUP

Security Affairs

Since that day I received hundreds of emails from students, researchers and practitioners all around the world asking me questions about how to follow up that research and how to contribute to expanding the training set. Now, if you wish you are able to generate training sets by yourself and to test new algorithms directly into WEKA. The post Malware Training Sets: FollowUP appeared first on Security Affairs.

Cyberattacks Are Tailored to Employees. Why Isn't Security Training?

Dark Reading

Consider four factors and behaviors that impact a particular employee's risk, and how security training should take them into account

Risk 56

Register Now! Remote Training for State & Local Governments

The Texas Record

Visit our training page for registration instructions each month. For more information about these classes, visit our training page here , send an email to rm_trng @ tsl.texas.gov, or contact your analyst.

Phishing Campaign Pretends to be Phishing Training Reminder

Adam Levin

A phishing campaign is targeting employees with phony email reminders for cybersecurity and phishing awareness training. . The post Phishing Campaign Pretends to be Phishing Training Reminder appeared first on Adam Levin.

Mainframes, Freight Trains and Education Pains

Rocket Software

You use a freight train. I’ve seen what those “why are we doing this” folks, who now are in middle and upper management, have done trying to make pickup trucks do what trains were made for. By David Robertson , guest blogger.

Training to Improve Support of Product Security

Data Breach Today

The Forum of Incident Response and Security Teams recently announced the release of new training resources to help organizations build and improve product security incident response teams. Damir "Gaus" Rajnovic of FIRST discusses the global need for these resources

Training Opportunity- NAGARA Webinar

The Texas Record

News NAGARA Training WebinarsWhen the Going Gets Tough. Take advantage of this webinar hosted by the National Association of Government Archives and Records Administrators (NAGARA ). Date & Time: Thursday, September 5, 2019 | 12:00 PM CT. Overview: Cultural resources are found in government offices, archives, museums, libraries, historical societies, and other collecting institutions.

Register Now! Remote Training for State & Local Governments

The Texas Record

Visit our training page for registration instructions each month. For more information about these classes, visit our training page here , send an email to rm_trng @ tsl.texas.gov, or contact your analyst. News You Can Use Training Resources training webinars Zoom

Florida's Approach to Training Cybersecurity Specialists

Data Breach Today

Universities throughout Florida are adding more cybersecurity courses in an effort to better train the next generation of practitioners, says Ernie Ferraresso of the Florida Center for Cybersecurity, which recently provided a second round of funding for the effort

6 Free Cybersecurity Training and Awareness Courses

Dark Reading

Most are designed to help organizations address teleworking risks related to COVID-19 scams

Risk 90

IAPP Offers Training to prepare for CCPA

IG Guru

The post IAPP Offers Training to prepare for CCPA appeared first on IG GURU. Business CCPA Education IG News Information Governance information privacy information security Privacy Record Retention Risk News IAPP Training

GDPR 52

What is Cyber Security Awareness and Why is it Important?

IT Governance

For all the talk of criminal hacking, ransomware infections and the technologies to prevent them, the key to protecting your organisation is cyber security awareness training. All employees at every level of the organisation should receive training.

Manipulating Machine Learning Systems by Manipulating Training Data

Schneier on Security

Interesting research: " TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents ": Abstract: : Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.

Access 103

Remote Training for Local Governments and State Agencies!

The Texas Record

Visit our training page for registration instructions each month. For more information about these classes, visit our training page here , send an email to rm_trng @ tsl.texas.gov, or contact your analyst. News You Can Use Training Resources