Skills and Training

Skills and Training | News, how-tos, features, reviews, and videos

Black Hat logo with woman in silhouette
primary laptop with certificate degree for technology

sale 8108 primary image

Refresh your networking skills with this Cisco CCNA training suite

Over 30 hours of digital content across 399 lectures, which can be viewed on your computer or mobile device.

multi tasking running executive race speed internet mobile laptop

Hack like a CISO

Developing the security officers' processes, strategies and techniques for managing their time, resources and teams.

template c100.00 00 14 06.still001
video

What is a business analyst? A key role for business-IT efficiency

Business analyst help guide businesses in improving processes, products, services and software through data analysis. These agile workers straddle the line between IT and the business to help bridge the gap and improve efficiency.

sequence 01.01 01 49 08.still001
video

CIO Leadership Live with Douglas Blackwell, CIO at Horizon Blue Cross Blue Shield of New Jersey | Ep 12

In this episode, host Maryfran Johnson talks with Douglas Blackwell, senior vice president and CIO at Horizon Blue Cross Blue Shield of New Jersey, about digital transformation in the healthcare industry, including voice enablement...

program dirty 2018.06.18 13.29.32.00 00 35 30.still001
video

Mingis on Tech: How to be a 'Best Place' to work in IT

The organizations that make Computerworld's annual list go far beyond competitive salaries and healthcare benefits to woo, and then retain, employees. Here's what they're doing right.

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

template c100.00 02 07 12.still001
video

What is Six Sigma? Streamlining quality management

Six Sigma streamlines quality control in an effort to improve current processes, products or services. Here are the methodologies, roles and certifications central to this quality management methodology.

sequence 01.00 10 55 13.still001
video

CIO Leadership Live with James Rinaldi, CIO, Director for Information Technology, NASA’s Jet Propulsion Laboratory | Ep 11

In this episode, host Maryfran Johnson talks with James Rinaldi, CIO at NASA's Jet Propulsion Lab, about opening up data silos and driving data transformation; having a seat at the table to lead change; and using technology to explore...

template c100.00 01 03 03.still001
video

What is a data scientist? A key data analytics role and a lucrative career

The data scientist role varies depending on industry, but there are common skills, experience, education and training that will give you a leg up in starting your data science career.

fail frustration laptop user head desk

The impact of human behavior on security

People should be the last thing in charge of cybersecurity. Remove people and add transparency and automation for true protection.

1 intro security salaries

7 highest-paying IT security jobs, 2018

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check.

securitysmart primary

Get Security Smart

From the editors of CSO, Security Smart is a quarterly newsletter ready for distribution in your organization. We combine personal device and home safety tips with organizational security awareness, making security training relevant,...

template c100.00 00 06 21.still001
video

8 reasons why your resume isn't getting noticed

Not getting any bites on your resume? You might be making one or more of these eight common resume mistakes.

thumbs up positive attitude congratulations happy employees staff

Branding infosec: Why security should consider its own internal advertising campaign

A positivity campaign raised security awareness — and improved performance — at Finning International.

people search find locate

How to hire the right analysts for your intelligence program

As someone who’s been deeply involved in virtually every aspect of hiring and job-seeking in security and intelligence, I can attest firsthand that while the process is rarely easy, it’s worth the effort.

sequence 01.01 10 59 10.still001
video

CIO Leadership Live with Klara Jelinkova, CIO of Rice University | Ep 7

Maryfran Johnson talks with Klara Jelinkova, Rice University’s CIO, on a range of topics, including the responsibility of senior women in IT to mentor the next generation and how the university's GDPR project was an opportunity to...

marionette social engineering

Social engineering: It's time to patch the human

Is there a patch for human stupidity? If you believe the common saying, there isn't. However, Jayson E. Street says there is, and it's time companies started patching their humans. The truth is, technology alone isn't going to save...

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Load More