www.infosecinstitute.com Open in urlscan Pro
141.193.213.21  Public Scan

Submitted URL: https://click.e.infosecinstitute.com/?qs=a50d1326555d42794727af86261cef7b510772a7565b1b11f606fd7f4fcd22976ca5eea047800f974bf952ca7fe6...
Effective URL: https://www.infosecinstitute.com/resource-center/?utm_source=marketing%20cloud&utm_medium=email%20blast&utm_campaign=cyber%20work...
Submission: On September 01 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * 
   
 * 708.689.0131
 * Contact us
 * Login
   

 * 
 * Products
 * Solutions
 * Resources
 * Company
 * Partners

 * Back
 * Product overview
 * Security awareness & culture
   
 * On-demand training & cyber ranges
   
 * On-demand training & cyber ranges

 * Back
 * Infosec IQ overview
 * Security awareness training
 * Phishing simulator
 * Reporting & assessments
 * Integrations & automation
 * Global administration
 * Browse all training
 * Pricing & features
 * Demo

 * Back
 * Infosec Skills overview
 * Role-guided training
 * Infosec Skills Teams
 * Cyber ranges & labs
 * Certifications & CPEs
 * Skill assessments
 * Browse all training
 * Pricing & features
 * Book a meeting

 * Back
 * Live boot camps
 * Infosec Institute certifications
 * DoD 8570 certifications
 * Get team boot camp pricing
 * View boot camp schedule
 * Book a meeting

 * Back
 * Pre-built training plans
 * Compliance, industry & role-based training
 * Custom education
 * Personalized learning
 * Languages
 * Gamified learning

 * Back
 * 1000+ phishing templates
 * Simulation types
 * Phishing email reporter

 * Back
 * Dashboard reports
 * Security culture survey
 * Assessments
 * Learner analytics

 * Back
 * Learner management
 * Threat response orchestration
 * Integrations

 * Back
 * 52 NICE Work Roles
 * SOC Analyst
 * Cloud Security Engineer
 * Security Manager
 * ICS Security Practitioner
 * Security Engineer
 * Penetration Tester
 * Digital Forensics Analyst
 * Information Risk Analyst
 * Security Architect
 * Secure Coder

 * Back
 * Boot camp overview
 * CISSP Boot Camp
 * Security+ Boot Camp
 * Ethical Hacking Boot Camp
 * CCNA Dual Cert Boot Camp
 * CASP+ Boot Camp
 * CCSP Boot Camp
 * CISM Boot Camp
 * CySA+ Boot Camp
 * PMP Boot Camp
 * Browse all boot camps

Security awareness games by Infosec

Click to Play

On-demand training for every cybersecurity role

Download Catalog

Certification training from industry experts

Get Pricing

 * Back
 * Solutions overview
 * By organization type
 * By need

 * Back
 * For business teams
 * For government & contractor teams
 * For MSPs & resellers

 * Back
 * Security awareness
 * Phishing simulation
 * Technical skill development
 * IT certification
 * Compliance & framework
 * CMMC certification

2021 IT & Security Talent Pipeline Study

Download Now

 * Back
 * Cyber Work
 * Webcasts
 * Case studies
 * Reports & whitepapers
 * Blog
 * Community
 * Infosec Inspire
 * Free tools

 * Back
 * Cyber Work Podcast
 * Cyber Work Applied

 * Back
 * Infosec Insiders
 * TechExams
 * YouTube
 * LinkedIn
 * Facebook
 * Twitter

 * Back
 * Phishing Risk Test
 * Security awareness ROI calculator
 * Security awareness training plans
 * Security awareness buyer’s guide

Cyber Work Podcast

New cybersecurity career conversations every week

Listen Now

 * Back
 * About us
 * Events & webcasts
 * Careers
 * Scholarships & awards
 * Infosec Gives
 * Infosec Gives Partner Program

 * Back
 * About us
 * Leadership
 * Newsroom
 * Recognition
 * Industry alliances

 * Back
 * Infosec Hall of Fame
 * Infosec Security Awareness Awards
 * Infosec Accelerate Scholarship Program

We’re hiring!

Join a team dedicated to making a difference.

Get To Know Us



SECURITY AWARENESS & TRAINING RESOURCE CENTER

Boost the effectiveness of your security awareness program or earn your next
certification with free tools from our resource center. Check back frequently —
new resources are added every month!

Topic

Professional development(319)
Cybersecurity(318)
Security awareness(129)
Best practices(66)
Certification(59)
Phishing(44)
Compliance(32)
Threat intel(15)
Type

Webinar & video(132)
Article(5)
Case study(32)
Podcast(204)
Poster, infographic & tool(35)
Whitepaper & report(25)
View Results
Filter Results
Whitepaper & report


CYBERSECURITY TALENT DEVELOPMENT PLAYBOOK

PROFESSIONAL DEVELOPMENT, BEST PRACTICES, CYBERSECURITY

12 pre-built training plans to help teams identify, upskill and retain
cybersecurity talent
Download Playbook
Whitepaper & reportCase study


SECURITY EDUCATION WITH HEART: HOW ST. CATHERINE’S SECURES THEIR COMMUNITY WITH
HANDS-ON CYBER TRAINING

PHISHING, SECURITY AWARENESS, BEST PRACTICES, CYBERSECURITY

Learn how Mike Urbanki's team improved St. Catherine’s security posture and
employee engagement by focusing on proactive security awareness training and
incentive programs.
Read more
Case study


ANGEL SAYANI EARNS 13TH CERTIFICATION AT AGE 19

PROFESSIONAL DEVELOPMENT, CYBERSECURITY, CERTIFICATION

We sat down with Angel Sayani, a 19-year-old entrepreneur and app developer that
passed 13 certification exams within just seven months, to learn about her
training success.
Read more
Whitepaper & reportCase study


HOW MILWAUKEE COUNTY UTILIZES INFOSEC IQ TO ENHANCE THEIR ORGANIZATION’S
CYBERSECURITY CULTURE

PHISHING, SECURITY AWARENESS, BEST PRACTICES, CYBERSECURITY

Jason Scherer from Milwaukee County has reinvigorated their security awareness
training program over the past two years to build a stronger cybersecurity
culture and drive engagement
Read more
Whitepaper & report


THE FORRESTER WAVE™: SECURITY AWARENESS AND TRAINING SOLUTIONS, Q1 2022

SECURITY AWARENESS

Read The Forrester Wave™: Security Awareness and Training Solutions, Q1 2022 to
learn why Infosec was among the top two ranked solutions for Current Offering
based on learner content, risk quantification, reporting capabilities criteria,
security culture betterment and other criteria.
Download
Whitepaper & reportCase study


HOW LEIDOS IDENTIFIES, TRAINS AND RETAINS WORLD-CLASS CYBERSECURITY TALENT WITH
HELP FROM INFOSEC SKILLS

PROFESSIONAL DEVELOPMENT, BEST PRACTICES, CYBERSECURITY

Nearly three years ago, Slim helped establish Leidos’ CyberEDGE Academy. EDGE is
an acronym for Engage, Develop, Grow, Experience. The six-month training program
is supported by Infosec Skills.
Read more
Case study


CYBERJUTSU SCHOLARSHIP WINNER, MANSI THAKAR, EARNS HER PMP WITH INFOSEC SKILLS

PROFESSIONAL DEVELOPMENT, CYBERSECURITY, CERTIFICATION

We sat down with Mansi Thakar, a cybersecurity professional and Women’s Society
of Cyberjustu (WSC) scholarship winner that used her lifetime access to Infosec
Skills to earn her PMP certification.
Read more
Whitepaper & report


CYBERSECURITY CULTURE — QUANTIFIED

SECURITY AWARENESS, CYBERSECURITY

See the data on the most overlooked variable in security and learn how to
measure your organization's cybersecurity culture.
Download
Webinar & video


CMMC ROLLOUT: HOW CMMC WILL IMPACT YOUR ORGANIZATION | INFOSEC EDGE WEBCAST

PROFESSIONAL DEVELOPMENT, COMPLIANCE, CYBERSECURITY, CERTIFICATION

More than 300,000 organizations will be affected by the new CMMC Framework.
Learn how your organization will be affected.
Watch now
Poster, infographic & tool


INFOSEC IQ TRAINING MODULE CATALOG

SECURITY AWARENESS

Educate and engage your employees with the industry’s leading security awareness
and training modules.
Download
Poster, infographic & tool


INFOSEC SKILLS COURSE CATALOG

PROFESSIONAL DEVELOPMENT, CYBERSECURITY, CERTIFICATION

Infosec Skills keeps your team's security skills fresh year-round with hundreds
of courses mapped to the NICE Cybersecurity Workforce Framework.
Download
Poster, infographic & tool


ROI OF SECURITY AWARENESS CALCULATOR

SECURITY AWARENESS

Use industry averages from Osterman Research to instantly calculate your return
on security awareness training, or customize your results with data from your
own organization’s data.
Calculate ROI
Podcast


OVERCOMING CHALLENGES TO BUILD A CYBERSECURITY CAREER

PROFESSIONAL DEVELOPMENT, CYBERSECURITY

Today's Cyber Work Podcast features Dr. Chanel Suggs, the Duchess of
Cybersecurity®. Dr. Suggs is a teacher, business owner and thought leader and
has appeared on TV and podcast platforms around the world to talk about
cybersecurity and the hacker mentality. She also had an incredibly challenging
and seemingly insurmountable upbringing. Her tumultuous story can be found in
her book, “Against All Odds: Overcoming Racial, Sexual and Gender Harassment on
the Digital Battlefield.” This episode contains a lot of heartbreak and some
challenging stories, as well as incredible insights and some thoroughly
important takeaways.

0:00 - Free cybersecurity training resources
0:56 - Overview of today's episode
1:58 - Who is Chanel Suggs, the Duchess of Cybersecurity?
3:12 - Overcoming family obstacles
4:50 - What drew her to a career in cybersecurity
8:10 - First steps to learning IT and cybersecurity
10:45 - Earning cybersecurity certifications
12:20 - Making a cybersecurity training "dungeon"
14:40 - Workplace abuse and harassment
18:28 - Issues with hiring diverse candidates
22:23 - What is Wyvern Security?
27:25 - Changing the workplace culture
32:47 - Social media is key to finding diverse candidates
36:55 - Preventing burnout with employees
40:10 - Advice on earning advanced degrees
42:03 - Contract work vs. full-time employee
43:34 - Free resources and services
44:52 - What's Chanel Suggs book about?
47:48 - Outro

Listen now
Podcast


WHAT’S IT LIKE TO WORK IN EMERGENCY RESPONSE? | GUEST CHRISTOPHER TARANTINO

PROFESSIONAL DEVELOPMENT, CYBERSECURITY

Learn all about emergency response — and the myriad techniques and skills that
term implies — in today's episode featuring Christopher Tarantino, CEO of
Epicenter Innovation. Is there a physical security component? Yes! Is there a
cybersecurity component? Big time! Is there an educational element? Absolutely!
Find out how disaster planning, preparation, remediation and post-event
rebuilding and improvement are all opportunities to strengthen your security
posture.

0:00 - Free cybersecurity training resources
0:56 - Overview of today's episode
1:47 - Who is Christopher Tarantino?
3:25 - What does an emergency response team do?
4:38 - Resilience in emergency response
7:45 - Importance of boring innovation
9:30 - Higher ed emergency response example
13:13 - Healthcare, higher ed and government resilience
16:00 - Years-long education around disasters
21:03 - Biggest cybersecurity blind spots
25:00 - Skills required for emergency response careers
30:00 - Importance of communication across community
35:50 - Transitioning careers from cybersecurity to emergency response
44:10 - Learn more about Epicenter Innovation
44:35 - Outro

Listen now
Podcast


SECURING OPERATIONAL TECHNOLOGY: ICS, IOT, AI AND MORE | GUEST FRANCIS
CIANFROCCA

PROFESSIONAL DEVELOPMENT, CYBERSECURITY

If you want to learn more about working with operational technology (OT) and
internet-connected devices, then don't miss today's episode with Francis
Cianfrocca, CEO of Insight Cyber Group. He discusses security problems around OT
and IoT systems and shares some surprising stories of intruders in the
electrical grid. He also talks about why it’s so hard to secure a set of
machines that often pre-date computer technology and the small changes in your
community that can make huge differences in the entire security industry.

0:00 - Free cybersecurity training resources
0:56 - Overview of today's episode
1:48 - Who is Francis Cianfrocca and Insight Cyber?
2:15 - Getting into tech and cybersecurity
4:13 - Francis' job roles and companies
5:22 - Early days of ICS systems security
10:15 - CEO duties at a cybersecurity startup
12:19 - Why is infrastructure security so bad?
16:05 - Different approaches needed for ICS and IOT systems
20:23 - Catching intruders early on with industrial systems
22:45 - Using artificial intelligence in ICS security
24:50 - Bad actors are really good at reconnaissance
27:20 - ICS and IOT environments cannot have downtime
30:00 - Asset and behavioral inventory is difficult
31:42 - Real-world examples of rogue ICS software
36:30 - ICS vs. IOT security
42:57 - How to promote industrial security careers
46:07 - Impact of AI on cybersecurity careers
48:40 - Preparing for an ICS cybersecurity career
51:07 - What's Insight Cyber working on?
52:45 - Outro

Listen now
Podcast


CYBERSECURITY PROJECT MANAGEMENT: A PEEK BEHIND THE CURTAIN | CYBER WORK LIVE

PROFESSIONAL DEVELOPMENT, CYBERSECURITY

Last year, Cyber Work Live brought you into the world of cybersecurity project
management — with tips for acquiring your skills, improving your resume and
getting your foot in the door. But what does the day-to-day work of
cybersecurity project managers look like?

Jackie Olshack and Ginny Morton return to answer that question. They’ll also
share experiences they’ve gained while working on some of their biggest
projects!

0:00 - Intro
0:50 - Who is Jackie Olshack?
1:24 - Who is Ginny Morton?
2:52 - Can non-technical PMs move into the tech space?
8:50 - Best way to manage projects with limited resources
13:30 - What certificates are needed for project management jobs?
18:52 - How do you kick off a cybersecurity project?
28:41 - How do you keep the project on schedule?
34:15 - Tips for networking in remote working situations
36:55 - Dealing with slowdowns and delays in projects
43:35 - Importance of a supportive environment in projects
47:40 - Dealing with delays from other teams in projects
50:35 - Tips for managing multiple projects at once
55:35 - How can teams support their project manager
56:35 - Transitioning into a cybersecurity career
59:00 - Outro and Infosec Skills giveaway

Listen now
Podcast


OWASP TOP 10: WHAT CYBERSECURITY PROFESSIONALS NEED TO KNOW | GUEST JOHN WAGNON

PROFESSIONAL DEVELOPMENT, BEST PRACTICES, CYBERSECURITY

On today's episode, our old pal John Wagnon, Infosec Skills author and keeper of
the secrets of OWASP, joins me to talk about the big changes in the OWASP Top 10
that happened at the end of 2021, his own class teaching the Top 10, and some
job tips, study hints and career pivots for people interested in these
vulnerabilities. Find out why access managers are going to rule the world
someday!

0:00 - Free cybersecurity training resources
0:56 - Overview of today's episode
1:43 - Who is John Wagnon?
2:50 - Working in cybersecurity and teaching OWASP
4:18 - What is the OWASP Top 10?
7:51 - How did the OWASP Top 10 change in 2021?
15:48 - Why do these security issues never go away?
19:06 - Cybersecurity roles using the OWASP Top 10
23:43 - What's covered in John's OWASP Top 10 courses?
26:42 - How to get hands-on cybersecurity experience
30:24 - Vulnerability-related cybersecurity career paths
34:16 - What is John working on with Infosec and Fortinet?
35:37 - Using your career as a learning opportunity
37:16 - Learn more about John Wagnon and OWASP
38:30 - Outro
Listen now
Podcast


YOUR PERSONAL DATA IS EVERYWHERE: WHAT CAN YOU DO ABOUT IT? | GUEST MARK
KAPCZYNSKI

PROFESSIONAL DEVELOPMENT, SECURITY AWARENESS, CYBERSECURITY

Today on the Cyber Work Podcast, Mark Kapczynski of OneRep reminds us of an
awful truth most people either don’t know or don’t like to think about. Your
personal information — your address, your phone number, your age — all of these
things are on the public internet! Mark talks about OneRep’s mission to scrub
personal information from these sites, suggests changes that could help prevent
this problem, and shares ways you could base a career in this fight for data
privacy and autonomy. All that and a detour into grade-school home computer
shenanigans on today's episode.

0:00 - Free cybersecurity training resources
0:56 - Overview of today's episode
1:50 - Who is Mark Kapczynski?
2:44 - Data breaches are a way of life
3:36 - Getting started in IT and cybersecurity
5:41 - Helping the film industry go digital
7:31 - Transitioning industries from paper to digital
9:53 - What types of personal data are on the internet?
12:40 - How people search sites sell PII and make money
14:50 - How to get personal information removed from sites
18:07 - What type of services does OneRep offer?
19:19 - How is public personal data used in cybercrime?
23:01 - How can consumers limit personal data exposure?
26:38 - Regulatory changes needed to protect personal data
29:00 - Who owns your personal data?
30:55 - Web 3.0, smart contracts and other tech needed
33:58 - Jobs and careers related to data privacy
36:38 - Every professional needs to understand data
39:50 - What makes a data professional's resume stand out?
41:50 - What is OneRep?
44:30 - Outro

Listen now
Podcast


KEEPING YOUR INBOX SAFE: REAL-LIFE BEC ATTACKS AND EMAIL FRAUD CAREERS | GUEST
JOHN WILSON

PROFESSIONAL DEVELOPMENT, PHISHING, SECURITY AWARENESS, CYBERSECURITY

Today's episode is all about email fraud. John Wilson, head of the cyber
intelligence division at Agari by HelpSystems, discusses Business Email
Compromise (BEC), spearphishing, whaling, romance fraud and more. If you can
name it, John’s studied it. And he's likely collected intel that’s managed to
freeze cybercriminals’ assets — and even put them away. He gives career tips and
advice for engaging in threat research at all levels, we discuss the pyrrhic
victory that is the modern spam filter, and John tells me why BEC fraud hunters’
best asset is a degree in psychology! All that and loads more, today on Cyber
Work!

0:00 - Free cybersecurity training resources
0:58 - Overview of today's episode
1:58 - Who is John Wilson?
3:02 - Getting into cybersecurity
4:58 - How spam has evolved over the years
8:12 - Why pursue a career in fraud?
11:10 - 3 primary vectors for email attacks
15:20 - Is BEC ever an insider threat?
16:16 - Is education making a difference on BEC attacks?
20:55 - Tracking down BEC actors and recovering assets
23:50 - Two angles to preventing BEC attacks
29:12 - Careers related to BEC and phishing prevention
34:42 - How to gain cybersecurity experience and get hired
37:25 - Agari and email fraud protection
42:16 - Outro

Listen now
Webinar & video


CYBERSECURITY PROJECT MANAGEMENT: A PEEK BEHIND THE CURTAIN | CYBER WORK LIVE

PROFESSIONAL DEVELOPMENT, CYBERSECURITY

Have you considered a career as a cybersecurity project manager? Join our live
panel to learn all about this exciting career path.
Watch now
Podcast


CYBERSECURITY HAS A MARKETING PROBLEM — AND WE’RE GOING TO FIX IT | CYBER WORK
PODCAST

PROFESSIONAL DEVELOPMENT, CYBERSECURITY

On today's episode, we're breaking down phrases you've heard a million times:
“security is everyone’s job,” “humans are the weakest link in the security
chain,” “it’s not if you get breached, but when.” Returning guest Alyssa Miller
drills into these comforting nostrums and explains why, even when they’re used
for well-intended purposes, they often act to limit the conversation and the
options, rather than address the hard work needed to overcome these evergreen
problems. You’re not going to want to miss this one, folks! It’s all that, plus
a little bit of book talk, today on Cyber Work!

0:00 - Intro
1:38 - Alyssa's tweet that inspired this episode
4:00 - Why you need to read the Cybersecurity Career Guide
9:10 - Cybersecurity platitudes and clichés
11:30 - Cliché 1: "It's not if you get breached, but when"
18:44 - Cliché 2:"Just patch your shit"
24:58 - Cliché 3: "Users are the weakest link"
32:34 - Cliché 4: "Security is everyone's job"
35:52 - Cliché 5: What is a "quality gate"?
44:14 - Cliché 6: "You just need passion to get hired"
48:14 - How to write a better cybersecurity job description
50:15 - Business value of diversity and inclusion
52:52 - Building a security champions program
55:12 - Where can you connect with Alyssa Miller?
56:44 - Outro

Listen now
Podcast


WHAT DOES A SECURE CODER DO? | CYBERSECURITY CAREER SERIES

PROFESSIONAL DEVELOPMENT, CYBERSECURITY

Secure coders are responsible for developing and writing secure code in a way
that protects against security vulnerabilities like bugs, defects and logic
flaws. They take proactive steps to introduce secure coding methodologies before
the application or software is introduced into a production environment, often
following recommendations from the Open Web Application Security Project (OWASP)
Foundation.

0:00 - Intro
0:25 - What does a secure coder do?
5:48 - How do you become a secure coder?
9:46 - What skills do secure coders need?
12:28 - What tools do secure coders use?
17:08 - What roles can secure coders transition into?
19:50 - What to do right now to become a secure coder
Listen now
Podcast


CYBERSECURITY JOBS: HOW TO BETTER APPLY, GET HIRED AND FILL OPEN ROLES | CYBER
WORK PODCAST

PROFESSIONAL DEVELOPMENT, SECURITY AWARENESS, CYBERSECURITY

Diana Kelley returns to the show to discuss her work as a board member of the
Cyber Future Foundation and the goings-on at this year’s Cyber Talent Week.
Whether you’re a cybersecurity hiring manager who doesn’t know why you’re not
getting the applicants you want, a candidate who hears the profession has 0%
unemployment but still can’t seem to get a callback or anyone in between, DO.
NOT. MISS. THIS. EPISODE. This is one for the books, folks.

0:00 - Cybersecurity hiring and job searching
4:30 - Diana Kelley of Cyber Future Foundation
9:00 - Cyber Future Foundation talent week
13:58 - Reexamining cybersecurity job descriptions
21:52 - Cybersecurity hiring manager and applicant training
27:10 - Strategies to bring in diverse talent from other industries
33:06 - Narrowing your cybersecurity job pursuit
39:37 - Using different educations in cybersecurity roles
41:32 - Implementing an educational pipeline
44:40 - Hiring based on strong skills from other trades
48:22 - Cybersecurity apprenticeships
53:22 - Fostering cybersecurity community value
59:09 - Diana Kelley's future projects
1:00:30 - Outro

Listen now
Podcast


ETHICAL USER DATA COLLECTION AND MACHINE LEARNING | CYBER WORK PODCAST

PROFESSIONAL DEVELOPMENT, SECURITY AWARENESS, CYBERSECURITY

Today on Cyber Work Ché Wijesinghe of Cape Privacy talks about the safe and
ethical collection of user data when creating machine learning or predictive
models. When your bank is weighing whether to give you a loan, they can make a
better choice the more info they know about you. But how secure is that
contextual data? Hint: not as secure as Wijesinghe would like!

0:00 - Machine learning and data collection
2:37 - Getting started in cybersecurity
3:15 - Being drawn to big data
4:35 - What data is driving decision-making?
9:04 - How is data collection regulated?
15:02 - Closing the encryption gap
16:50 - Careers in data privacy
19:07 - Where can you move from data privacy?
21:20 - Ethics of data collection
23:25 - Learn more about Wijesinghe
23:55 - Outro

Listen now
123…19>>
 * 
 * 
 * 
 * 
 * 

Products

Infosec IQ Security awareness, culture & phishing simulator Infosec Skills
Hands-on skill development & boot camps

Resources

Cyber Work Blog Infosec Inspire Events & webcasts

Company

Contact us About Infosec Careers Newsroom Partners

 * ©2022 Infosec Institute, Inc.
    * 
    * Trademarks
    * Privacy Policy

Infosec, part of Cengage Group