Published: 27 September 2015
Do you know how cybercriminals work? Get helpful insight, in this cybersecurity course. As an IT Pro, you know that the computer threat landscape is continually changing and that increasingly sophisticated attacks are targeting your organization's infrastructure and confidential information. Walk with experts through social media platforms to discover how they really work. Get tips and practical advice on social networking security. Plus, explore methods of developing a secure baseline and how to harden your Windows Enterprise architectures and applications from pass-the-hash and other advanced attacks, and look at system patching. Finally, learn how to help improve your organization's security with Microsoft operating systems and tools.
Published: 25 September 2015
You may have many of the best security solutions...but the security landscape has changed. Learn more about the evolution of security breaches and how to start thinking about addressing these new challenges.
Here is the opportunity for you to learn Enterprise Security via Free Computer Based Training from Microsoft via Microsoft Virtual Academy and Channel 9. Simon and I had lots od fun during the recording and I am sure you will learn from this videos with joy
In this course you'll learn the following:
- Social Media Security
- Advanced Windows Defense
- Vulnerability Management
- Top Mitigation Methods to Protect Your Enterprise
- Free Tools to Protect Your Windows Environment
Published: 18 September 2015
By Garrett Baldwin as published in Modern Trader Magazine
This is a story about cyber security and its effect on traders.
It’s about vulnerabilities in a financial system that over-relies on technology to make trading faster and more efficient.
For traders and investors, the desire for ease-of-use and functionality that expedites buying and selling has been developed by application developers who typically underestimate security risks.
For brokerages, investment firms and exchanges, cyber security has become one of the most important concerns of the 21st century. The July software glitch at the New York Stock Exchange (NYSE) immediately reminded traders of the 2010 event in which Russian hackers placed a “cyber bomb” on the Nasdaq.
It never detonated, but it’s curious that it took four years for government officials to conclude their investigation and release information to the media. Cyber attacks are a sensitive topic.
No company wants to admit that it has been hacked. No exchange wants to divulge the reality that hackers are constantly looking for vulnerabilities in their systems. And no one wants to explain to traders how they should react after a breach in the markets.
It’s time to have an honest conversation about cyber security.
What are the risks in the future, and, more importantly, what can traders and investors do to ensure they are taking the right steps to protect themselves?
Published: 13 September 2015
I'm humbled to announce, that I have just passed the EC Council Chef Information Security Officer exam and become EC Council CISO certified.
It was a hard exam with 250 questions and 4 hours’ time. Even though , I have a master’s degree in the Information Security Area and completing my PhD and working in the field answering 250 questions at one go was not easy at all. Yes, I passed with 95% but , after few hours I started to think twice my answers.
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.
In order to sit for the CCISO exam and earn the certification, candidates must meet the basic CCISO requirements. Candidates who do not yet meet the CCISO requirements but are interested in information security management can pursue the EC-Council Information Security Management (EISM) certification.
Published: 06 September 2015
I'm glad to announce this year I will be speaking at EC Council's leading "Hacker" Conference, "Hacker Halted" again.
The session will be in All Things Technical track and will cover " An Anotomy of a Cyber Attack".
Before that i will be also attending EC Council's Partner Conference as part of Review Board Member to launch the updated certifications as annouinced earlier in a different blog post.
About Hacker Halted
Hacker Halted is a global series of Computer and Information Security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security.
Published: 06 September 2015
I’m glad to announce I will be presenting the Keynote , at the leading security Vendor, Secunia’s partner conference .
Join us on September 9th and 10th for two insightful and exciting days in Prague!
Secunia invites all distributors and partners to our partner conference in Prague for two days of innovation, inspiration and action. Meet the Secunia leadership team and discuss your questions, feedback or concerns with us and other Secunia partners.
Whilst we are confirming the final details on the agenda please get in touch with us right away to save your space.
Published: 01 September 2015
Author :Zeljka Zorz, HNS Managing Editor
Fake recruiters on LinkedIn are targeting infosec prosPosted on 04 September 2015."There's a group of fake recruiters on LinkedIn mapping infosec people's networks. Not sure what their goal is yet, just a heads-up to others," Yonathan Klijnsma, a threat intelligence analyst working at Dutch infosec firm Fox-IT, warned via his Twitter account.
"They will approach you by sending a general recruiter message with a profile picture of an attractive woman," he then explained their modus operandi. "The job will be relative to your job. They will 'scout' a few people (besides you). After about a week they stop sending out new requests, the profile picture is removed and a bit later their name is changed making it hard to find these people back in your list if its big). In about a month the accounts disappear, not sure if on purpose."
F-Secure's Sean Sullivan dug a bit into these recruiters' company's - Talent Src or Talent Sources - online presence and found an official website that provides no useful information and a skimpy Twitter account that has last been updated in January (likely on the date when it was set up).