Remove Information Security Remove Network Remove Nonprofit Remove Virtualization
article thumbnail

The ‘Great Retraining’: IT upskills for the future

CIO Business Intelligence

When the timing was right, Chavarin honed her skills to do training and coaching work and eventually got her first taste of technology as a member of Synchrony’s intelligent virtual assistant (IVA) team, writing human responses to the text-based questions posed to chatbots.

Training 136
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. The Twistlock was a company I joined after Intel security was a startup.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 Top Ways: Building an Effective Cybersecurity Awareness Campaign

SecureWorld News

If these things are true, how do we share information with others in a way that is proven to work and create a culture of security? Security awareness and how you talk about cybersecurity. Now, one of the things that people automatically asked, 'How am I going to host a virtual summit? I don't even have a budget.'

Survey 87
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

System 52
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Anyone who has anyone in the information security community is usually melting under the hot Nevada sun. For example, I have a laptop and it runs Linux so I can get into network security. There's also so many virtual conferences. There was also a hack of the internal Wi Fi network of a commercial airplane.

article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. But how do you even start to identify who might be good in a role in information security? We are not yet right now looking for a network security engineer. If you find a trusted source.