Feel like you're canned in by the spam emails in your inbox? Don't despair, here are some common sense tips to help stop spam from getting to your email inbox.
Hiring and adding new members to the team is always a mixed feeling. Will this person work out? Should we keep looking for a back up candidate, If What? And so many other unanswered questions plague our mind.
Jeff, you are known for your innovative and effective training programs. Could you tell us about the approaches you have used and what has made them so successful?
JEFF BARDIN: I think one of the things I’ve been able to do is use different media types, software awareness and training programs. The...
Today, we will be speaking with Stephen Northcutt, CEO of the SANs Technology Institute, a postgraduate level IT security college, and an acknowledged expert in training and certification. He founded the GIAC certification and is author and co-author of numerous books, including the seminal book in intrusion...
The Information Security Media Group podcast series continues with insights from Stephen Northcutt, CEO of the SANS Technology Institute, a postgraduate level IT security college, and an acknowledged expert in training and certification. He founded the Global Information Assurance Certification (GIAC) in 1999 to...
Listen in to this Information Security Media Group podcast to hear from the CISO at Investors Bank & Trust talk about what makes successful training programs work. Jeff Bardin has a wealth of experience in developing training programs for a wide range of organizations.
Previously he held CIO and Director level...
First question we have for you is how is the role of an information security officer evolving and what advice would you give to concurrent security officers or IT professionals who aspire to the ISO rule?
JOYCE BROCAGLIA: Well what I can tell you is that in over two decades what I’ve been doing recruiting it...
Information Security Media Group hears from Joyce Brocaglia, a leading information security recruiter and her thoughts on how the role of the CISO is evolving in companies and how corporate culture is shifting focus to the "risk strategic" role.
Brocaglia discusses the differences between a technically focused CISO...
As an employee at your institution, you’re a cog in the great wheel that makes everything run. You’ve got responsibilities and work hard to answer all inquiries and requests that come over your desk. A major portion of your work is done on a computer, over the email system your institution gave you...
When you think about the number of PIN numbers, passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer or email, signing in to an online bank account or shopping cart...the list seems to just keep getting longer.
Are you a trusting person? When dealing with people you don't know, don't give them sensitive information unless you're sure who they are, and can prove that they are who they say they are. You'll want to ask yourself if they should have access to the information.
Here are some tips to follow to protect your personal and work related data.
Use and maintain anti-virus software and a firewall - Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall.
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.
The Chief Security Officer (CSO) oversees and coordinates security efforts across an organization including departments such as information technology, human resources, communications, legal, finance management and other groups, and identifies and establishes security initiatives and standards throughout the...
Certifications are highly sought after by job seekers and employers. They are a major criterion for hiring qualified security professionals, a practice followed by most companies. The challenge for employers, and the key point, is to understand what a specific certification signifies- If a certification along with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.