Reinventing Security Awareness Training

Data Breach Today

Want to improve how your organization delivers and absorbs security awareness training? Then it comes down to reinventing your approach, including gamification, says Barracuda's Michael Flouton

On Chinese "Spy Trains"

Schneier on Security

Congress is considering legislation that would prevent the world's largest train maker, the Chinese-owned CRRC Corporation, from competing on new contracts in the United States. The trade war with China has reached a new industry: subway cars.

Compliance Training? What Compliance Training?

Dark Reading

Employees can run. but they can't hide. Or can they

Malware Training Sets: FollowUP

Security Affairs

Since that day I received hundreds of emails from students, researchers and practitioners all around the world asking me questions about how to follow up that research and how to contribute to expanding the training set.

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. They should therefore do whatever they can to support employees who want to go on training courses.

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. They should therefore do whatever they can to support employees who want to go on training courses.

The benefits of Live Online training

IT Governance

And thanks to the growing popularity of Live Online training, it’s easier than ever to get started. Live Online combines the advantage of classroom training and e-learning. Let’s look at some of the reasons to consider Live Online training. One of the sticking points when it comes to taking a training course is the cost. Whether you’re paying for it yourself or asking your employer to pitch in, a training course is almost always a big investment. Training

CompTIA training for Mobile Devices

ITPro.TV

With 87% of companies relying on their employees using personal devices to access business applications (Syntonic), … Continue reading CompTIA training for Mobile Devices → The post CompTIA training for Mobile Devices appeared first on ITProTV Blog.

ISO 27001 training in Birmingham

IT Governance

Since then, we’ve helped more than 7,000 professionals with their ISO 27001 training on ISMS implementations and audits. High demand means that, for the first time, we are now running ISO 27001 classroom training courses in central Birmingham.

GDPR 79

Scaling Threat Modeling Training

Adam Shostack

For the last few years, I’ve been delivering in-person threat modeling training. I’ve trained groups ranging from 2 to 100 people at a time, and I’ve done classes as short as a few hours and as long as a week.

What Should Training Cover?

Adam Shostack

So to loop this around to threat modeling, we can consider a bunch of skills or knowledge that could be delivered via training: Enumerate attacker capabilities.

'Culture Eats Policy for Breakfast': Rethinking Security Awareness Training

Dark Reading

What's definitely not working with end-user cybersecurity awareness training - and what you can do about it

Changes Coming to NARA RM Training Program

National Archives Records Express

One of the major topics covered during our last BRIDG meeting was the continual evolution of the Records Management Training Program. Dr. Gary Rauchfuss, the director of our training program, presented upcoming changes and answered questions.

3 tips for successful GDPR staff training

IT Governance

However, our 2017 GDPR Report found that less than 10% of organisations have provided GDPR staff awareness training to all employees. The report also showed that only 53% of organisations are planning to provide GDPR staff awareness training in the future.

GDPR 72

Upcoming Changes in Records Management Training

National Archives Records Express

Many of the significant changes to the Records Management Training Program occur at the end of this fiscal year. At the end of September 2019, NARA will stop offering the Certificate of Federal Records Management Training and will no longer offer the Knowledge Area (KA) training courses. We will be taking several steps that may affect agency personnel that have completed records management training courses. General records management training training

Training to Improve Support of Product Security

Data Breach Today

The Forum of Incident Response and Security Teams recently announced the release of new training resources to help organizations build and improve product security incident response teams. Damir "Gaus" Rajnovic of FIRST discusses the global need for these resources

Training Opportunity- NAGARA Webinar

The Texas Record

News NAGARA Training WebinarsWhen the Going Gets Tough. Take advantage of this webinar hosted by the National Association of Government Archives and Records Administrators (NAGARA ). Date & Time: Thursday, September 5, 2019 | 12:00 PM CT. Overview: Cultural resources are found in government offices, archives, museums, libraries, historical societies, and other collecting institutions.

E-learning: the effective way to train your team

IT Governance

Despite the operational challenge of staff turnover, there is still a need to ensure that teams are trained to perform not only their core duties but also to do so safely. Trained staff might not remain loyal to your business, so it can seem unpalatable to invest heavily in training.

Designing Employee Security Awareness Training That Works

eSecurity Planet

The secret to effective employee security awareness training boils down to three things: Train early, often, and explain why

CISMP training courses now available in Glasgow

IT Governance

High demand means we are now offering our CISMP training course in different locations, including Glasgow. CISMP is acknowledged across the UK, accredited by the British Computer Society and approved by the government in the Certified Professional training scheme. CISMP Training Course.

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

GDPR 82

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

GDPR 82

Florida's Approach to Training Cybersecurity Specialists

Data Breach Today

Universities throughout Florida are adding more cybersecurity courses in an effort to better train the next generation of practitioners, says Ernie Ferraresso of the Florida Center for Cybersecurity, which recently provided a second round of funding for the effort

NEW TECH: Circadence deploys ‘gamification’ training to shrink cybersecurity skills gap

The Last Watchdog

Related: The need for diversity in cybersecurity personnel One of the top innovators in the training space is Circadence ®. It then took its expertise in moving massive amounts of gaming data and applied it first to training military cyber warfare specialists, and, next, to training security analysts in the enterprise, government and academic communities. The way people are trained in cybersecurity right now is the opposite of gamification.

Robotic Process Automation Training Giveaway

AIIM

As a "Thank You", we're going to be giving away two Emerging Technologies training courses on Robotic Process Automation (RPA). That's $220 worth of AIIM training for free! We're getting close to our November Virtual Event and we have an exciting announcement!

Regular User Training Most Effective Security Antidote

Dark Reading

Regular training sessions coupled with creation of a "human firewall" remain the most effective protections against social engineering and phishing, he adds Social engineering remains the top vulnerability organizations face because humans remain the easiest way to access networks or databases, says Stu Sjouwerman, Founder and CEO of KnowBe4.

NEW Training Opportunity: Managing Social Media Records – Live Webinar

The Texas Record

If you can’t listen in live, fret not; the webinar recording, presentation slides, and supplemental materials will be made available 24/7 on our training website. News Training Managing Electronic Records Social Media Webinars

Training At Embedded Systems Security Days

Adam Shostack

I’m excited to be teaming up with Alpha Strike and Limes Security to deliver training in Vienna November 6-8. Details are available at Embedded Systems Security Days. Security Software Engineering threat modeling

Why your DPO needs specialised training

IT Governance

Instead, they should be given specialist training to help them excel. Here are three reasons why you should invest in specialised DPO training. DPOs are naturally expected to have expert understanding of data protection law, and they should have received GDPR training.

FAQ about Records Management Training Changes

National Archives Records Express

We received quite a few questions since announcing the changes that we are making to the Records Management Training Program. If I plan to attend training during FY2018, do any of the program changes affect me? We recently published a memo indicating that we need to receive all FY2018 training payments by August 31, 2018. That is the only change that affects people completing training in FY2018. NARA is eliminating the tuition for training.

Learn the Latest Hacking Techniques at Black Hat Trainings Virginia

Dark Reading

At Black Hat's upcoming Trainings-only October event you'll have opportunities to get up to speed on the newest hacking tricks for operating systems and cloud providers

Cloud 108

9 Topics to Cover in Your Privacy Awareness Training Program

MediaPro

That’s why it’s important to implement a privacy awareness training program so all your employees can actively protect sensitive data. Here are some of the basics to cover in privacy awareness training: What data needs to be protected.

Information security and compliance training for the healthcare sector

IT Governance

Providing adequate levels of training to staff is vital to address the practicalities of information security and avoid the risk of non-compliance. ISO 27001 training. Healthcare Training GDPR Information security

5 Topics CCPA-Compliant Privacy Awareness Training Needs to Cover

MediaPro

This means your employees need training—and fast. That said, here’s a quick overview of five aspects of the CCPA that compliance training needs to cover. Your CCPA-compliant training should give employees a sense of the various ways in which a consumer can be identified.

The Periscope Podcast – Reporting on staff training and awareness

IT Governance

This week’s episode is an investigation into reporting on staff training and awareness, and IT Governance products and solutions for organisations that suffer a data breach. Staff training and awareness should be high on the agenda for organisations. Step into the Breach.

New NARA Bulletin on Agency Records Officer Credential Training and Renewal Policy

National Archives Records Express

We have released a new Bulletin on Agency Records Officer training, NARA Bulletin 2019-02. The purpose of this Bulletin is to describe the replacement of NARA’s Certificate of Federal Records Management Training with the new Agency Records Officer Credential (AROC). of the Memorandum indicates agencies must designate an Agency Records Officer who holds the Certificate of Federal Records Management Training.

Ransomware Trains Its Sights on Cloud Providers

Dark Reading

Ransomware writers are now targeting cloud service providers with network file encryption attacks as a way to hold hostage the maximum number of customers that they can, notes Chris Morales, head of security analytics for Vectra. He also discusses Vectra's new ransomware report, which offers tips for protecting against virtual hostage taking