Remove Information Security Remove Internet Remove Nonprofit Remove Virtualization
article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

We have so much change happening and we can drive it to happen in a more positive way to reduce the resource needs for organizations and actually scale security for businesses of all sizes.". This is pretty powerful because now we all know how to secure systems and it's been validated by a third party that's a nonprofit and trusted.

CTO 70
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Tennisha: Black Girls hack is a nonprofit organization we recently got our 501 C three designation. Vamosi: So what am I missing here.

Study 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Black Girls hack is a nonprofit organization we recently got our 501 C three designation. Vamosi: So what am I missing here.

Study 40
article thumbnail

10 Top Ways: Building an Effective Cybersecurity Awareness Campaign

SecureWorld News

If these things are true, how do we share information with others in a way that is proven to work and create a culture of security? Security awareness and how you talk about cybersecurity. Now, one of the things that people automatically asked, 'How am I going to host a virtual summit? So, reporting is vital.".

Survey 80
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

System 52
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

So I started attending Black Hat, Def Con, and after many years wrote my own book on the insecurity of internet of things devices. Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. I also went after a CISSP certification. It’s simple things like that.