Scaling Threat Modeling Training

Adam Shostack

For the last few years, I’ve been delivering in-person threat modeling training. I’ve trained groups ranging from 2 to 100 people at a time, and I’ve done classes as short as a few hours and as long as a week.

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. They should therefore do whatever they can to support employees who want to go on training courses.

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. They should therefore do whatever they can to support employees who want to go on training courses.

ISO 27001 training in Birmingham

IT Governance

Since then, we’ve helped more than 7,000 professionals with their ISO 27001 training on ISMS implementations and audits. High demand means that, for the first time, we are now running ISO 27001 classroom training courses in central Birmingham.

Robotic Process Automation Training Giveaway

AIIM

As a "Thank You", we're going to be giving away two Emerging Technologies training courses on Robotic Process Automation (RPA). That's $220 worth of AIIM training for free! We're getting close to our November Virtual Event and we have an exciting announcement!

Training to Improve Support of Product Security

Data Breach Today

The Forum of Incident Response and Security Teams recently announced the release of new training resources to help organizations build and improve product security incident response teams. Damir "Gaus" Rajnovic of FIRST discusses the global need for these resources

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

E-learning: the effective way to train your team

IT Governance

Despite the operational challenge of staff turnover, there is still a need to ensure that teams are trained to perform not only their core duties but also to do so safely. Trained staff might not remain loyal to your business, so it can seem unpalatable to invest heavily in training.

3 tips for successful GDPR staff training

IT Governance

However, our 2017 GDPR Report found that less than 10% of organisations have provided GDPR staff awareness training to all employees. The report also showed that only 53% of organisations are planning to provide GDPR staff awareness training in the future.

Office 365 and SharePoint Training Giveaway

AIIM

As a "Thank You", we're going to be giving away two Office 365 and SharePoint training courses. That's $995 worth of AIIM training for free! We're getting close to our December Virtual Event and we have an exciting announcement!

CISMP training courses now available in Glasgow

IT Governance

High demand means we are now offering our CISMP training course in different locations, including Glasgow. CISMP is acknowledged across the UK, accredited by the British Computer Society and approved by the government in the Certified Professional training scheme. CISMP Training Course.

GUEST ESSAY: 5 anti-phishing training tools that can reduce employees’ susceptibility to scams

The Last Watchdog

Related: Gamification training gains traction. This is a platform for security awareness training and simulated phishing tests focusing on the problem of social-engineering. Its cloud-based service helps its’ clients to schedule automated training campaigns and simulated phishing attacks. Employees are given comprehensive awareness training using actual attacks and live demonstration examples. This service offers automated phishing tests and training modules.

Changes Coming to NARA RM Training Program

National Archives Records Express

One of the major topics covered during our last BRIDG meeting was the continual evolution of the Records Management Training Program. Dr. Gary Rauchfuss, the director of our training program, presented upcoming changes and answered questions.

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. Staff training under the GDPR. Read our 7 tips for GDPR staff awareness training to find out more. BreachReady EU GDPR Training breach ready GDPR

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. Staff training under the GDPR. Read our 7 tips for GDPR staff awareness training to find out more. BreachReady EU GDPR Training breach ready GDPR

The Periscope Podcast – Reporting on staff training and awareness

IT Governance

This week’s episode is an investigation into reporting on staff training and awareness, and IT Governance products and solutions for organisations that suffer a data breach. Staff training and awareness should be high on the agenda for organisations. Step into the Breach.

Designing Employee Security Awareness Training That Works

eSecurity Planet

The secret to effective employee security awareness training boils down to three things: Train early, often, and explain why

Office 365 and SharePoint Training Giveaway

AIIM

As a "Thank You", we're going to be giving away two Office 365 and SharePoint training courses. That's $995 worth of AIIM training for free! We're getting close to our December Virtual Event and we have an exciting announcement!

Information security and compliance training for the healthcare sector

IT Governance

Providing adequate levels of training to staff is vital to address the practicalities of information security and avoid the risk of non-compliance. ISO 27001 training. Healthcare Training GDPR Information security

3 Reasons to Train Security Pros to Code

Dark Reading

United Health chief security strategist explains the benefits the organization reaped when it made basic coding training a requirement for security staff

6 Security Training Hacks to Increase Cyber IQ Org-Wide

Dark Reading

Move beyond generic, annual security awareness training with these important tips

Tips 82

ISO 27001 staff awareness training – meeting the requirements

IT Governance

There is a three-step process for staff awareness training best practices: 1) Identify what staff need to learn : sensitive information will be accessed and used in a variety of ways across your organisation. Any training course should conclude with some form of test to measure the outcome.

FAQ about Records Management Training Changes

National Archives Records Express

We received quite a few questions since announcing the changes that we are making to the Records Management Training Program. If I plan to attend training during FY2018, do any of the program changes affect me? We recently published a memo indicating that we need to receive all FY2018 training payments by August 31, 2018. That is the only change that affects people completing training in FY2018. NARA is eliminating the tuition for training.

Training Snapshot: Selecting Views with CloudNine

eDiscovery Daily

The post Training Snapshot: Selecting Views with CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

Why healthcare CISOs need to revamp cybersecurity training

Information Management Resources

Technology tools can help, but emphasizing ‘people-centric security’ and training for potential cyberattacks offers the best chance of success. Cyber security Cyber attacks Network security Training

Train your team to ensure you achieve ISO 27001 certification

IT Governance

It is therefore essential that your implementation team is appropriately trained in order to ensure the success of the project. Self-study vs training course. E-learning also only provides training for individuals and does not support the training and coordination of a wider team.

Training Snapshot: Boolean Searching from CloudNine

eDiscovery Daily

The post Training Snapshot: Boolean Searching from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

IBM Builds 'SOC on Wheels' to Drive Cybersecurity Training

Dark Reading

A tractor trailer housing a Cyber Tactical Operation Center will travel throughout the US and Europe for incident response training, security support, and education

Training Snapshot: Saved Searches from CloudNine

eDiscovery Daily

The post Training Snapshot: Saved Searches from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

55% of Companies Don't Offer Mandatory Security Awareness Training

Dark Reading

Even those that provide employee training do so sparingly, a new study finds

Making it Stick: Records Management Training Approaches

The Schedule

Several weeks ago the University Archivist and I conducted our bi-annual University Archives and Records Management training session, part of our Office of Human Resources Faculty and Staff Development Program. So how to improve participation in records management training (RM)?

Training Snapshot: Fuzzy Searching from CloudNine

eDiscovery Daily

The post Training Snapshot: Fuzzy Searching from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

Training Snapshot: Creating Fields with CloudNine

eDiscovery Daily

The post Training Snapshot: Creating Fields with CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

Training Snapshot: Proximity Searching from CloudNine

eDiscovery Daily

The post Training Snapshot: Proximity Searching from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

Training Snapshot: Persistent Highlighting from CloudNine

eDiscovery Daily

The post Training Snapshot: Persistent Highlighting from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

MY TAKE: As phishers take aim at elections, why not train employees to serve as phishing police?

The Last Watchdog

For Cofense, the solution goes beyond security training but to fruitful immersion. If there is a data breach or some other cybersecurity incident, a phishing attack was probably involved. Over 90 percent of incidents begin with a phishing email. One of the more infamous hacks in recent years, the DNC data breach , was the result of a phishing attack. Related: Carpet bombing of phishing emails endures.

Training Snapshot: Litigation Hold Notifications from CloudNine

eDiscovery Daily

The post Training Snapshot: Litigation Hold Notifications from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

Training Snapshot: Preservation and Collection from CloudNine

eDiscovery Daily

The post Training Snapshot: Preservation and Collection from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

Training Snapshot: Early Data Assessment from CloudNine

eDiscovery Daily

The post Training Snapshot: Early Data Assessment from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training Webcasts