Remove Authentication Remove Books Remove Budget Remove Information Security
article thumbnail

My CISM Journey - The True Value of Certifications

CIO Musings

I have worked in cyber security for decades. I have toiled in the trenches, built authentication systems, lived through breaches, sold infosec investments to budget-minded leaders, built cyber security teams, and most importantly led in the cybersecurity area. The book was great, but didn't have the hints the videos did.

Study 195
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

With the new, recently onboarded Payment Card Industry Data Security Standard (PCI DSS) v4.0, Since Erin has a limited budget, one of the first things she might do is go to the internet and browse through meta-search engines looking for a deal. She wants the cheapest price with the least number of layovers. she wonders. The PCI DSS v4.0,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Adam Shostack has a new book, Threats: What Every Engineer Should Learn From Star Wars. Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. MUSIC] VAMOSI: In the summer of 1977, a low budget film opened with very modest expectations.

article thumbnail

The Hacker Mind Podcast: Gaining Persistence On Windows Boxes

ForAllSecure

VAMOSI: So obtaining user credentials or finding a flaw in the authentication, that gets you inside. And that's just because it's not in the books VAMOSI: True. A lot of infosec’s knowledge is either tribal -- passed on from one person to another - or can be found in books. It's not perfect, of course.

Windows 40