www.infosecinstitute.com
Open in
urlscan Pro
141.193.213.21
Public Scan
Submitted URL: https://click.e.infosecinstitute.com/?qs=a50d1326555d42794727af86261cef7b510772a7565b1b11f606fd7f4fcd22976ca5eea047800f974bf952ca7fe6...
Effective URL: https://www.infosecinstitute.com/resource-center/?utm_source=marketing%20cloud&utm_medium=email%20blast&utm_campaign=cyber%20work...
Submission: On September 01 via api from US — Scanned from DE
Effective URL: https://www.infosecinstitute.com/resource-center/?utm_source=marketing%20cloud&utm_medium=email%20blast&utm_campaign=cyber%20work...
Submission: On September 01 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* * 708.689.0131 * Contact us * Login * * Products * Solutions * Resources * Company * Partners * Back * Product overview * Security awareness & culture * On-demand training & cyber ranges * On-demand training & cyber ranges * Back * Infosec IQ overview * Security awareness training * Phishing simulator * Reporting & assessments * Integrations & automation * Global administration * Browse all training * Pricing & features * Demo * Back * Infosec Skills overview * Role-guided training * Infosec Skills Teams * Cyber ranges & labs * Certifications & CPEs * Skill assessments * Browse all training * Pricing & features * Book a meeting * Back * Live boot camps * Infosec Institute certifications * DoD 8570 certifications * Get team boot camp pricing * View boot camp schedule * Book a meeting * Back * Pre-built training plans * Compliance, industry & role-based training * Custom education * Personalized learning * Languages * Gamified learning * Back * 1000+ phishing templates * Simulation types * Phishing email reporter * Back * Dashboard reports * Security culture survey * Assessments * Learner analytics * Back * Learner management * Threat response orchestration * Integrations * Back * 52 NICE Work Roles * SOC Analyst * Cloud Security Engineer * Security Manager * ICS Security Practitioner * Security Engineer * Penetration Tester * Digital Forensics Analyst * Information Risk Analyst * Security Architect * Secure Coder * Back * Boot camp overview * CISSP Boot Camp * Security+ Boot Camp * Ethical Hacking Boot Camp * CCNA Dual Cert Boot Camp * CASP+ Boot Camp * CCSP Boot Camp * CISM Boot Camp * CySA+ Boot Camp * PMP Boot Camp * Browse all boot camps Security awareness games by Infosec Click to Play On-demand training for every cybersecurity role Download Catalog Certification training from industry experts Get Pricing * Back * Solutions overview * By organization type * By need * Back * For business teams * For government & contractor teams * For MSPs & resellers * Back * Security awareness * Phishing simulation * Technical skill development * IT certification * Compliance & framework * CMMC certification 2021 IT & Security Talent Pipeline Study Download Now * Back * Cyber Work * Webcasts * Case studies * Reports & whitepapers * Blog * Community * Infosec Inspire * Free tools * Back * Cyber Work Podcast * Cyber Work Applied * Back * Infosec Insiders * TechExams * YouTube * LinkedIn * Facebook * Twitter * Back * Phishing Risk Test * Security awareness ROI calculator * Security awareness training plans * Security awareness buyer’s guide Cyber Work Podcast New cybersecurity career conversations every week Listen Now * Back * About us * Events & webcasts * Careers * Scholarships & awards * Infosec Gives * Infosec Gives Partner Program * Back * About us * Leadership * Newsroom * Recognition * Industry alliances * Back * Infosec Hall of Fame * Infosec Security Awareness Awards * Infosec Accelerate Scholarship Program We’re hiring! Join a team dedicated to making a difference. Get To Know Us SECURITY AWARENESS & TRAINING RESOURCE CENTER Boost the effectiveness of your security awareness program or earn your next certification with free tools from our resource center. Check back frequently — new resources are added every month! Topic Professional development(319) Cybersecurity(318) Security awareness(129) Best practices(66) Certification(59) Phishing(44) Compliance(32) Threat intel(15) Type Webinar & video(132) Article(5) Case study(32) Podcast(204) Poster, infographic & tool(35) Whitepaper & report(25) View Results Filter Results Whitepaper & report CYBERSECURITY TALENT DEVELOPMENT PLAYBOOK PROFESSIONAL DEVELOPMENT, BEST PRACTICES, CYBERSECURITY 12 pre-built training plans to help teams identify, upskill and retain cybersecurity talent Download Playbook Whitepaper & reportCase study SECURITY EDUCATION WITH HEART: HOW ST. CATHERINE’S SECURES THEIR COMMUNITY WITH HANDS-ON CYBER TRAINING PHISHING, SECURITY AWARENESS, BEST PRACTICES, CYBERSECURITY Learn how Mike Urbanki's team improved St. Catherine’s security posture and employee engagement by focusing on proactive security awareness training and incentive programs. Read more Case study ANGEL SAYANI EARNS 13TH CERTIFICATION AT AGE 19 PROFESSIONAL DEVELOPMENT, CYBERSECURITY, CERTIFICATION We sat down with Angel Sayani, a 19-year-old entrepreneur and app developer that passed 13 certification exams within just seven months, to learn about her training success. Read more Whitepaper & reportCase study HOW MILWAUKEE COUNTY UTILIZES INFOSEC IQ TO ENHANCE THEIR ORGANIZATION’S CYBERSECURITY CULTURE PHISHING, SECURITY AWARENESS, BEST PRACTICES, CYBERSECURITY Jason Scherer from Milwaukee County has reinvigorated their security awareness training program over the past two years to build a stronger cybersecurity culture and drive engagement Read more Whitepaper & report THE FORRESTER WAVE™: SECURITY AWARENESS AND TRAINING SOLUTIONS, Q1 2022 SECURITY AWARENESS Read The Forrester Wave™: Security Awareness and Training Solutions, Q1 2022 to learn why Infosec was among the top two ranked solutions for Current Offering based on learner content, risk quantification, reporting capabilities criteria, security culture betterment and other criteria. Download Whitepaper & reportCase study HOW LEIDOS IDENTIFIES, TRAINS AND RETAINS WORLD-CLASS CYBERSECURITY TALENT WITH HELP FROM INFOSEC SKILLS PROFESSIONAL DEVELOPMENT, BEST PRACTICES, CYBERSECURITY Nearly three years ago, Slim helped establish Leidos’ CyberEDGE Academy. EDGE is an acronym for Engage, Develop, Grow, Experience. The six-month training program is supported by Infosec Skills. Read more Case study CYBERJUTSU SCHOLARSHIP WINNER, MANSI THAKAR, EARNS HER PMP WITH INFOSEC SKILLS PROFESSIONAL DEVELOPMENT, CYBERSECURITY, CERTIFICATION We sat down with Mansi Thakar, a cybersecurity professional and Women’s Society of Cyberjustu (WSC) scholarship winner that used her lifetime access to Infosec Skills to earn her PMP certification. Read more Whitepaper & report CYBERSECURITY CULTURE — QUANTIFIED SECURITY AWARENESS, CYBERSECURITY See the data on the most overlooked variable in security and learn how to measure your organization's cybersecurity culture. Download Webinar & video CMMC ROLLOUT: HOW CMMC WILL IMPACT YOUR ORGANIZATION | INFOSEC EDGE WEBCAST PROFESSIONAL DEVELOPMENT, COMPLIANCE, CYBERSECURITY, CERTIFICATION More than 300,000 organizations will be affected by the new CMMC Framework. Learn how your organization will be affected. Watch now Poster, infographic & tool INFOSEC IQ TRAINING MODULE CATALOG SECURITY AWARENESS Educate and engage your employees with the industry’s leading security awareness and training modules. Download Poster, infographic & tool INFOSEC SKILLS COURSE CATALOG PROFESSIONAL DEVELOPMENT, CYBERSECURITY, CERTIFICATION Infosec Skills keeps your team's security skills fresh year-round with hundreds of courses mapped to the NICE Cybersecurity Workforce Framework. Download Poster, infographic & tool ROI OF SECURITY AWARENESS CALCULATOR SECURITY AWARENESS Use industry averages from Osterman Research to instantly calculate your return on security awareness training, or customize your results with data from your own organization’s data. Calculate ROI Podcast OVERCOMING CHALLENGES TO BUILD A CYBERSECURITY CAREER PROFESSIONAL DEVELOPMENT, CYBERSECURITY Today's Cyber Work Podcast features Dr. Chanel Suggs, the Duchess of Cybersecurity®. Dr. Suggs is a teacher, business owner and thought leader and has appeared on TV and podcast platforms around the world to talk about cybersecurity and the hacker mentality. She also had an incredibly challenging and seemingly insurmountable upbringing. Her tumultuous story can be found in her book, “Against All Odds: Overcoming Racial, Sexual and Gender Harassment on the Digital Battlefield.” This episode contains a lot of heartbreak and some challenging stories, as well as incredible insights and some thoroughly important takeaways. 0:00 - Free cybersecurity training resources 0:56 - Overview of today's episode 1:58 - Who is Chanel Suggs, the Duchess of Cybersecurity? 3:12 - Overcoming family obstacles 4:50 - What drew her to a career in cybersecurity 8:10 - First steps to learning IT and cybersecurity 10:45 - Earning cybersecurity certifications 12:20 - Making a cybersecurity training "dungeon" 14:40 - Workplace abuse and harassment 18:28 - Issues with hiring diverse candidates 22:23 - What is Wyvern Security? 27:25 - Changing the workplace culture 32:47 - Social media is key to finding diverse candidates 36:55 - Preventing burnout with employees 40:10 - Advice on earning advanced degrees 42:03 - Contract work vs. full-time employee 43:34 - Free resources and services 44:52 - What's Chanel Suggs book about? 47:48 - Outro Listen now Podcast WHAT’S IT LIKE TO WORK IN EMERGENCY RESPONSE? | GUEST CHRISTOPHER TARANTINO PROFESSIONAL DEVELOPMENT, CYBERSECURITY Learn all about emergency response — and the myriad techniques and skills that term implies — in today's episode featuring Christopher Tarantino, CEO of Epicenter Innovation. Is there a physical security component? Yes! Is there a cybersecurity component? Big time! Is there an educational element? Absolutely! Find out how disaster planning, preparation, remediation and post-event rebuilding and improvement are all opportunities to strengthen your security posture. 0:00 - Free cybersecurity training resources 0:56 - Overview of today's episode 1:47 - Who is Christopher Tarantino? 3:25 - What does an emergency response team do? 4:38 - Resilience in emergency response 7:45 - Importance of boring innovation 9:30 - Higher ed emergency response example 13:13 - Healthcare, higher ed and government resilience 16:00 - Years-long education around disasters 21:03 - Biggest cybersecurity blind spots 25:00 - Skills required for emergency response careers 30:00 - Importance of communication across community 35:50 - Transitioning careers from cybersecurity to emergency response 44:10 - Learn more about Epicenter Innovation 44:35 - Outro Listen now Podcast SECURING OPERATIONAL TECHNOLOGY: ICS, IOT, AI AND MORE | GUEST FRANCIS CIANFROCCA PROFESSIONAL DEVELOPMENT, CYBERSECURITY If you want to learn more about working with operational technology (OT) and internet-connected devices, then don't miss today's episode with Francis Cianfrocca, CEO of Insight Cyber Group. He discusses security problems around OT and IoT systems and shares some surprising stories of intruders in the electrical grid. He also talks about why it’s so hard to secure a set of machines that often pre-date computer technology and the small changes in your community that can make huge differences in the entire security industry. 0:00 - Free cybersecurity training resources 0:56 - Overview of today's episode 1:48 - Who is Francis Cianfrocca and Insight Cyber? 2:15 - Getting into tech and cybersecurity 4:13 - Francis' job roles and companies 5:22 - Early days of ICS systems security 10:15 - CEO duties at a cybersecurity startup 12:19 - Why is infrastructure security so bad? 16:05 - Different approaches needed for ICS and IOT systems 20:23 - Catching intruders early on with industrial systems 22:45 - Using artificial intelligence in ICS security 24:50 - Bad actors are really good at reconnaissance 27:20 - ICS and IOT environments cannot have downtime 30:00 - Asset and behavioral inventory is difficult 31:42 - Real-world examples of rogue ICS software 36:30 - ICS vs. IOT security 42:57 - How to promote industrial security careers 46:07 - Impact of AI on cybersecurity careers 48:40 - Preparing for an ICS cybersecurity career 51:07 - What's Insight Cyber working on? 52:45 - Outro Listen now Podcast CYBERSECURITY PROJECT MANAGEMENT: A PEEK BEHIND THE CURTAIN | CYBER WORK LIVE PROFESSIONAL DEVELOPMENT, CYBERSECURITY Last year, Cyber Work Live brought you into the world of cybersecurity project management — with tips for acquiring your skills, improving your resume and getting your foot in the door. But what does the day-to-day work of cybersecurity project managers look like? Jackie Olshack and Ginny Morton return to answer that question. They’ll also share experiences they’ve gained while working on some of their biggest projects! 0:00 - Intro 0:50 - Who is Jackie Olshack? 1:24 - Who is Ginny Morton? 2:52 - Can non-technical PMs move into the tech space? 8:50 - Best way to manage projects with limited resources 13:30 - What certificates are needed for project management jobs? 18:52 - How do you kick off a cybersecurity project? 28:41 - How do you keep the project on schedule? 34:15 - Tips for networking in remote working situations 36:55 - Dealing with slowdowns and delays in projects 43:35 - Importance of a supportive environment in projects 47:40 - Dealing with delays from other teams in projects 50:35 - Tips for managing multiple projects at once 55:35 - How can teams support their project manager 56:35 - Transitioning into a cybersecurity career 59:00 - Outro and Infosec Skills giveaway Listen now Podcast OWASP TOP 10: WHAT CYBERSECURITY PROFESSIONALS NEED TO KNOW | GUEST JOHN WAGNON PROFESSIONAL DEVELOPMENT, BEST PRACTICES, CYBERSECURITY On today's episode, our old pal John Wagnon, Infosec Skills author and keeper of the secrets of OWASP, joins me to talk about the big changes in the OWASP Top 10 that happened at the end of 2021, his own class teaching the Top 10, and some job tips, study hints and career pivots for people interested in these vulnerabilities. Find out why access managers are going to rule the world someday! 0:00 - Free cybersecurity training resources 0:56 - Overview of today's episode 1:43 - Who is John Wagnon? 2:50 - Working in cybersecurity and teaching OWASP 4:18 - What is the OWASP Top 10? 7:51 - How did the OWASP Top 10 change in 2021? 15:48 - Why do these security issues never go away? 19:06 - Cybersecurity roles using the OWASP Top 10 23:43 - What's covered in John's OWASP Top 10 courses? 26:42 - How to get hands-on cybersecurity experience 30:24 - Vulnerability-related cybersecurity career paths 34:16 - What is John working on with Infosec and Fortinet? 35:37 - Using your career as a learning opportunity 37:16 - Learn more about John Wagnon and OWASP 38:30 - Outro Listen now Podcast YOUR PERSONAL DATA IS EVERYWHERE: WHAT CAN YOU DO ABOUT IT? | GUEST MARK KAPCZYNSKI PROFESSIONAL DEVELOPMENT, SECURITY AWARENESS, CYBERSECURITY Today on the Cyber Work Podcast, Mark Kapczynski of OneRep reminds us of an awful truth most people either don’t know or don’t like to think about. Your personal information — your address, your phone number, your age — all of these things are on the public internet! Mark talks about OneRep’s mission to scrub personal information from these sites, suggests changes that could help prevent this problem, and shares ways you could base a career in this fight for data privacy and autonomy. All that and a detour into grade-school home computer shenanigans on today's episode. 0:00 - Free cybersecurity training resources 0:56 - Overview of today's episode 1:50 - Who is Mark Kapczynski? 2:44 - Data breaches are a way of life 3:36 - Getting started in IT and cybersecurity 5:41 - Helping the film industry go digital 7:31 - Transitioning industries from paper to digital 9:53 - What types of personal data are on the internet? 12:40 - How people search sites sell PII and make money 14:50 - How to get personal information removed from sites 18:07 - What type of services does OneRep offer? 19:19 - How is public personal data used in cybercrime? 23:01 - How can consumers limit personal data exposure? 26:38 - Regulatory changes needed to protect personal data 29:00 - Who owns your personal data? 30:55 - Web 3.0, smart contracts and other tech needed 33:58 - Jobs and careers related to data privacy 36:38 - Every professional needs to understand data 39:50 - What makes a data professional's resume stand out? 41:50 - What is OneRep? 44:30 - Outro Listen now Podcast KEEPING YOUR INBOX SAFE: REAL-LIFE BEC ATTACKS AND EMAIL FRAUD CAREERS | GUEST JOHN WILSON PROFESSIONAL DEVELOPMENT, PHISHING, SECURITY AWARENESS, CYBERSECURITY Today's episode is all about email fraud. John Wilson, head of the cyber intelligence division at Agari by HelpSystems, discusses Business Email Compromise (BEC), spearphishing, whaling, romance fraud and more. If you can name it, John’s studied it. And he's likely collected intel that’s managed to freeze cybercriminals’ assets — and even put them away. He gives career tips and advice for engaging in threat research at all levels, we discuss the pyrrhic victory that is the modern spam filter, and John tells me why BEC fraud hunters’ best asset is a degree in psychology! All that and loads more, today on Cyber Work! 0:00 - Free cybersecurity training resources 0:58 - Overview of today's episode 1:58 - Who is John Wilson? 3:02 - Getting into cybersecurity 4:58 - How spam has evolved over the years 8:12 - Why pursue a career in fraud? 11:10 - 3 primary vectors for email attacks 15:20 - Is BEC ever an insider threat? 16:16 - Is education making a difference on BEC attacks? 20:55 - Tracking down BEC actors and recovering assets 23:50 - Two angles to preventing BEC attacks 29:12 - Careers related to BEC and phishing prevention 34:42 - How to gain cybersecurity experience and get hired 37:25 - Agari and email fraud protection 42:16 - Outro Listen now Webinar & video CYBERSECURITY PROJECT MANAGEMENT: A PEEK BEHIND THE CURTAIN | CYBER WORK LIVE PROFESSIONAL DEVELOPMENT, CYBERSECURITY Have you considered a career as a cybersecurity project manager? Join our live panel to learn all about this exciting career path. Watch now Podcast CYBERSECURITY HAS A MARKETING PROBLEM — AND WE’RE GOING TO FIX IT | CYBER WORK PODCAST PROFESSIONAL DEVELOPMENT, CYBERSECURITY On today's episode, we're breaking down phrases you've heard a million times: “security is everyone’s job,” “humans are the weakest link in the security chain,” “it’s not if you get breached, but when.” Returning guest Alyssa Miller drills into these comforting nostrums and explains why, even when they’re used for well-intended purposes, they often act to limit the conversation and the options, rather than address the hard work needed to overcome these evergreen problems. You’re not going to want to miss this one, folks! It’s all that, plus a little bit of book talk, today on Cyber Work! 0:00 - Intro 1:38 - Alyssa's tweet that inspired this episode 4:00 - Why you need to read the Cybersecurity Career Guide 9:10 - Cybersecurity platitudes and clichés 11:30 - Cliché 1: "It's not if you get breached, but when" 18:44 - Cliché 2:"Just patch your shit" 24:58 - Cliché 3: "Users are the weakest link" 32:34 - Cliché 4: "Security is everyone's job" 35:52 - Cliché 5: What is a "quality gate"? 44:14 - Cliché 6: "You just need passion to get hired" 48:14 - How to write a better cybersecurity job description 50:15 - Business value of diversity and inclusion 52:52 - Building a security champions program 55:12 - Where can you connect with Alyssa Miller? 56:44 - Outro Listen now Podcast WHAT DOES A SECURE CODER DO? | CYBERSECURITY CAREER SERIES PROFESSIONAL DEVELOPMENT, CYBERSECURITY Secure coders are responsible for developing and writing secure code in a way that protects against security vulnerabilities like bugs, defects and logic flaws. They take proactive steps to introduce secure coding methodologies before the application or software is introduced into a production environment, often following recommendations from the Open Web Application Security Project (OWASP) Foundation. 0:00 - Intro 0:25 - What does a secure coder do? 5:48 - How do you become a secure coder? 9:46 - What skills do secure coders need? 12:28 - What tools do secure coders use? 17:08 - What roles can secure coders transition into? 19:50 - What to do right now to become a secure coder Listen now Podcast CYBERSECURITY JOBS: HOW TO BETTER APPLY, GET HIRED AND FILL OPEN ROLES | CYBER WORK PODCAST PROFESSIONAL DEVELOPMENT, SECURITY AWARENESS, CYBERSECURITY Diana Kelley returns to the show to discuss her work as a board member of the Cyber Future Foundation and the goings-on at this year’s Cyber Talent Week. Whether you’re a cybersecurity hiring manager who doesn’t know why you’re not getting the applicants you want, a candidate who hears the profession has 0% unemployment but still can’t seem to get a callback or anyone in between, DO. NOT. MISS. THIS. EPISODE. This is one for the books, folks. 0:00 - Cybersecurity hiring and job searching 4:30 - Diana Kelley of Cyber Future Foundation 9:00 - Cyber Future Foundation talent week 13:58 - Reexamining cybersecurity job descriptions 21:52 - Cybersecurity hiring manager and applicant training 27:10 - Strategies to bring in diverse talent from other industries 33:06 - Narrowing your cybersecurity job pursuit 39:37 - Using different educations in cybersecurity roles 41:32 - Implementing an educational pipeline 44:40 - Hiring based on strong skills from other trades 48:22 - Cybersecurity apprenticeships 53:22 - Fostering cybersecurity community value 59:09 - Diana Kelley's future projects 1:00:30 - Outro Listen now Podcast ETHICAL USER DATA COLLECTION AND MACHINE LEARNING | CYBER WORK PODCAST PROFESSIONAL DEVELOPMENT, SECURITY AWARENESS, CYBERSECURITY Today on Cyber Work Ché Wijesinghe of Cape Privacy talks about the safe and ethical collection of user data when creating machine learning or predictive models. When your bank is weighing whether to give you a loan, they can make a better choice the more info they know about you. But how secure is that contextual data? Hint: not as secure as Wijesinghe would like! 0:00 - Machine learning and data collection 2:37 - Getting started in cybersecurity 3:15 - Being drawn to big data 4:35 - What data is driving decision-making? 9:04 - How is data collection regulated? 15:02 - Closing the encryption gap 16:50 - Careers in data privacy 19:07 - Where can you move from data privacy? 21:20 - Ethics of data collection 23:25 - Learn more about Wijesinghe 23:55 - Outro Listen now 123…19>> * * * * * Products Infosec IQ Security awareness, culture & phishing simulator Infosec Skills Hands-on skill development & boot camps Resources Cyber Work Blog Infosec Inspire Events & webcasts Company Contact us About Infosec Careers Newsroom Partners * ©2022 Infosec Institute, Inc. * * Trademarks * Privacy Policy Infosec, part of Cengage Group