Skills and Training

Skills and Training news, information, and how-to advice

fail frustration laptop user head desk
1 intro security salaries

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

securitysmart primary

Security Smart, Winter 2018

From the editors of CSO, Security Smart is a quarterly newsletter ready for distribution in your organization. We combine personal device and home safety tips with organizational security awareness, making security training relevant,...

template c100.00 00 06 21.still001
video

8 reasons why your resume isn't getting noticed

Not getting any bites on your resume? You might be making one or more of these eight common resume mistakes.

thumbs up positive attitude congratulations happy employees staff

Branding infosec: Why security should consider its own internal advertising campaign

A positivity campaign raised security awareness — and improved performance — at Finning International.

people search find locate

How to hire the right analysts for your intelligence program

As someone who’s been deeply involved in virtually every aspect of hiring and job-seeking in security and intelligence, I can attest firsthand that while the process is rarely easy, it’s worth the effort.

sequence 01.01 10 59 10.still001
video

CIO Leadership Live with Klara Jelinkova, CIO of Rice University | Ep 7

Maryfran Johnson talks with Klara Jelinkova, Rice University’s CIO, on a range of topics, including the responsibility of senior women in IT to mentor the next generation and how the university's GDPR project was an opportunity to...

marionette social engineering

Social engineering: It's time to patch the human

Is there a patch for human stupidity? If you believe the common saying, there isn't. However, Jayson E. Street says there is, and it's time companies started patching their humans. The truth is, technology alone isn't going to save...

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

cils 010 8essentialtips 2
video

8 essential sites for researching your next employer

Landing a job interview feels great, but how much do you know about your potential employer? Job listings often illicit more questions than provide answers. Knowing where to find inside information can mean the difference between...

template c100.00 00 49 02.still001
video

7 goals every project manager should aspire to achieve

Project managers must look beyond requirements, budgets and timelines to ensure they are executing high-impact, high-visibility projects with a direct line to the organization's overall strategic goals. Here's how to be recognized by...

CSO slideshow - Insider Security Breaches - A briefcase of binary code, wind turbines on the horizon

The theft of tea leaves and the evolution of cyber espionage prevention

All companies, big and small, are trying to figure out how to secure important data — the trade secrets. Lucky for us, it might come down to something as simple as being human.

abstract image of business silhouettes in blurred motion

You’re too busy to get your security right

The idea of having a few people who can do a little bit of everything isn’t really working anymore. We’re all too busy to be effective.

template c100.00 00 15 15.still001
video

10 tips for making your self-evaluation more meaningful

Whether you think your company uses the information or not, self-evaluations are a necessary device for professional development. Here’s how to make the most of the dreaded self-evaluation process.

climb mountain scale peaks climber

The hardest part of mountaineering is descending from the summit

Building an information security organization and effective security plan is like planning to climb a mountain. You need to plan for the ascent and descent, and the latter is much more involved and difficult than the former. You...

woman working on laptop - close focus, bokeh [by Rawpixel - CC0 via Unsplash]

Are your employees unwittingly invalidating your cyber liability insurance?

To prevent unintentional invalidation of their policies, businesses must educate employees on a number of related issues.

Man framing with hands in front of face to focus

How managers can best communicate the importance of cybersecurity to employees

We must challenge ourselves to think differently about how and what we’re communicating if we want to be successful in making security a priority for our employees.

capture the flag hackathon face off

10 questions to answer before running a capture the flag (CTF) contest

Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.

hot it skills

Cybersecurity skills shortage

From vendor agnostic, standards and skills-based training to a commitment to inspiring the next generation to join the industry in the first place, everyone demanding a solution to cyber security skills shortage today needs to step up...

Load More