cybersecurity training

I Ran The Boston Marathon. Here is What I Learned

Ted Harrington recently ran The Boston Marathon – the oldest, most prestigious, arguably most important marathon in the world. According to Ted, it was by far one of the most fulfilling experiences of his entire life. Throughout the course of preparing for, attempting, and executing this feat, he noticed some striking parallels between running and entrepreneurship. This is his story.

Seriously?! Can You Not Do That? | Chapter I - Bad Habits and InfoSec Apathy

People go to work to do their job. They have meetings to attend, calls to make, tasks to complete, quotas to reach, and much more. So they can’t be bothered with worrying about information security. However, their habits – good and bad, innocent or malicious – are putting their employer’s business at risk. All it takes is one poorly made decision, or maybe even the lack of a decision in many cases, to damage or even destroy a business.

Seriously?! Can You Not Do That? | Prologue

Ahhh yes, our employees. We love them dearly, but sometimes they do things that put the company at risk of a data breach or other cyber attack. I reached out to the InfoSec community to help me capture some of the more common scenarios and troubling cases where employees could cause a company harm, both unknowingly and maliciously.

Serena L-G., 12 and a Half Years Old, Says "Sec_rity is not complete without you"

As part of a community service project for school, when asked to write an article to describe a teen's view of cybersecurity, Serena L-G. produced this fantastic article that every parent should read.

How I Pay It Forward and Build a Better Workplace in Cybersecurity

Amy Brachio knows the challenges of making partner at EY while raising two daughters and caring for ailing parents, but what made it bearable was the professional and personal support she received at every step. As a leader, her goal is to foster an environment that provides the same support for others.

An Unexpected Champion in the Fight Against Identity Theft - The IRS

While the US has been slow to legislate meaningful ID protection safeguards, an unexpected agency is taking a leadership position - The IRS.

Small Businesses Need an Affordable, Qualified Cybersecurity Workforce

In the fragmented world of cybersecurity, equipping small businesses for cyber threats and preparing the next generation of infosec professionals will require community-based workforce development.

Here is Your Cybersecurity Budget. Spend It Wisely

How can businesses pour millions into cybersecurity and still miss the mark? CISSP and CISM Candy Alexander explores the blind spot leaving many businesses open to costly attack.

Taking the Leap from Military to InfoSec: Another Opportunity to Serve

Many veterans have the soft skills to become effective cybersecurity professionals, but navigating the educational requirements and hard skill development can be daunting. CISO and former naval officer Gary Hayslip offers advice and resources for vets looking to transition into infosec.

Wouldn’t It Be NICE? The NICE Conference & Expo

How can education be used to produce the next generation of cybersecurity experts? The National Initiative for Cybersecurity Education (NICE) is bringing solutions and networking opportunities to Kansas City in its annual NICE Conference and Expo.

Head in The Clouds & Feet on The Ground: The CCSP Certification

How do you increase your value as a cybersecurity expert and pass the CCSP? Certified Cloud Security Professional Michael Lyman lays out a powerful 7-step plan so you too can master Cloud Security

The Yellow Brick Road Is Paved in Code; And It’s Pretty Awesome

Learn how ITSPmagazine’s new column, The Academy, will bring together cutting-edge IT educators, top industry experts, and our best and brightest students as they analyze trends in cybersecurity and offer insights regarding the many questions driving the field today.