Remove Cybersecurity Remove InfoSec Remove Technology Remove Workshop
article thumbnail

CISO workshop slides

Notice Bored

Other slides in the deck appear to equate ' security posture ' to vulnerability management and software/systems patching - a rather narrow/specific technical concern for metrics suggested to senior management, although arguably it is a major factor in cybersecurity - or to security strategy.

CISO 63
article thumbnail

Targeted Malware Reverse Engineering Workshop follow-up. Part 1

SecureList

On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo , Senior Security Researchers from our Global Research & Analysis Team (GReAT), who gave live workshops on practical disassembling, decrypting and deobfuscating authentic malware cases, moderated by GReAT’s own Dan Demeter.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

For this recognition, Cyber Defense Magazine (CDM) reviews the hottest, most innovative, market-leading cybersecurity players globally, recognizing the top one hundred firms worldwide. . Herjavec Group is 100% laser-focused on cybersecurity services with comprehensive expertise in Identity roadmap development, Consulting and?

InfoSec 52
article thumbnail

Here for Change: 12 Groups Supporting Women in Cybersecurity

Cisco Security

We then compiled their answers into an e-Book, Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates. . This resource illuminates how some of today’s leading infosec women experts got started in the cybersecurity industry and embraced the common goal of creating a more secure world for everyone.

article thumbnail

Security pros rely on peer groups and open communication for help with stress

SC Magazine

But it’s hard to deny that the last year-and-a-half has been perhaps the most stressful and challenging period in the history of cybersecurity. Benjamin Corll, vice president of cybersecurity and data protection at U.K. For security professionals, stress comes with the territory. But how have they been managing? External peer groups.

InfoSec 113
article thumbnail

The discomfort zone

Notice Bored

That's a heady mix of laws and regs that apply to the organisation, its officers and workers, its property and finances, its technologies, its contracts, agreements and relationships with employees and third parties including the authorities, owners, suppliers, partners, prospects and customers, and society at large. All requirements?!

Risk 72
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. For many, though, that isn’t true. It appears that skills alone aren't enough to get everybody through the door.

Hacking 40