Sponsored by Keepnet Labs

Tag - Ann Johnson

Microsoft Regional Director Dr Erdal Ozkaya

Microsoft Regional Director 2020-2022

Microsoft Regional Director After nearly 5 years I got some great news . I am back at the Microsoft Community this time as Regional Director. This morning I received an e-mail from Microsoft which starts as "I am delighted to welcome you to the Microsoft Regional Director program!"  No, don't let this title confuse you, I am not -at least at this [...]


Cybersecurity The Beginner's Guide Dr Erdal ozkaya

Cybersecurity The Beginner’s Guide – Informative step by step Guide (19)

Cybersecurity The Beginner's Guide It’s not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO’s like Satya Nadella, McAfee’s CEO Chris Young, Cisco’s CIO Colin Seward along with organizations like ISSA, research [...]


Cybersecurity The Beginner's Guide

Cybersecurity The Beginner’s Guide -ready within 2019 Informative Guide

Cybersecurity The Beginner's Guide Cybersecurity: The Beginner's Guide More than 400 pages of a comprehensive guide to getting started in cyber + 100 pages of advice from Cybersecurity experts. You will find everything to excel your career in Cybersecurity, or help your Organization to close the Cyber Talent Gap. The book is coming soon via @Packt and Amazon Cybersecurity The Beginner's Guide Thank [...]


Cybersecurity Canon Candidate Book Review

Cybersecurity Canon Candidate Book Review: Learn Social Engineering ;0

Cybersecurity Canon Candidate Executive Summary Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert will equip you with a holistic understanding of social engineering. It will help you  avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics ranging from baiting, phishing, and spear phishing, [...]