article thumbnail

Are our infosec controls sufficient?

Notice Bored

begging questions about which infosec-related matters are particularly important, and how they stack up in relation to other business priorities, issues, pressures etc. In addition to the technical and human aspects of infosec, there are broader governance, strategic and commercial implications of [information] risk management and assurance.

InfoSec 63
article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. “B” is obviously the correct choice, but not all companies succeed in motivating their workers to learn the ins and outs of phishing, social engineering and other cyber threats. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Pearl Harbor Is Happening Right Now — It’s Ransomware

Daniel Miessler

Since 2007 the InfoSec industry has been talking about TheBigOneâ„¢—the event that would change cyber threats from annoyances to existential concerns. They called it Cyber Pearl Harbor. This doesn’t mean it can’t still happen.

article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

In a few minutes I’m going to talk to a pentester who’s written a book that can help take your current skills as a sys admin and security engineer and turn them into skills needed to become a great digital pentester. She is an impressive force within the infosec world. available wherever books are sold.

article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

In a few minutes I’m going to talk to a pentester who’s written a book that can help take your current skills as a sys admin and security engineer and turn them into skills needed to become a great digital pentester. She is an impressive force within the infosec world. available wherever books are sold.

article thumbnail

Burnout: The Hidden Cost of Working in Cybersecurity & Other High Risk Fields

Jane Frankland

In this blog, and ahead of my talk at Infosec this week , I’m delving into this, and giving you tips for recognising its signs and preventing it as a leader. It poses a threat in numerous ways. The stakes are simply too high to neglect this. Naturally, attackers take advantage.