• Type:


CH #Cybersecurity: ‘Resilience means making it harder to attack and quicker to respond’

Julian King, European Commissioner in charge of the Security Union, presented his plans to equip Europe with the right tools to deal with cyber attacks, the European Commission are proposing a wide-ranging set of measures to build strong cybersecurity resilience in the EU. The Commission are proposing a European Cybersecurity Research and Competence Centre (to be set up in the course of 2018). Working with Member States, it will help develop and roll out the tools and technology needed to keep up with an ever-changing threats and make sure our defences are as state-of-the-art as the weapons that cyber-criminals use. It will complement capacity-building efforts in this area at EU and national level. There will also be a blueprint for how Europe can respond quickly, operationally and in unison when a large-scale cyber-attack strikes. The recommendation asks EU countries and EU institutions to establish an EU Cybersecurity Crisis Response and test this through cyber and other crisis management exercises.

CompTIA CySA+ First Look at New Cybersecurity Analyst Exam

Hear from the internal expert behind CompTIA’s Cybersecurity Analyst+ certification exam about what’s next with this popular cybersecurity certification. We’ll discuss what the exam is, who should take it, the industry changes that prompted the exam update and the six specific areas that will change in the new exam. Learn more about CySA+: https://certification.comptia.org/certifications/cybersecurity-analyst

CH AI in Cybersecurity Use Cases (AI in Cybersecurity 2)

What are some common use cases of applying AI in Cybersecurity? Bryan Li (Founder, Cyber Tech & Risk) is joined by Tahseen Shabab (Founder & CEO, BiBu Labs) to discuss some examples of Enterprise Security, Anomaly Detection in IoT, and Decoys using the techniques such as Clustering, Active Learning, and Bayesian Neural Networks.

This is the episode 2 of the “AI in Cybersecurity”.

The EU Cybersecurity Act enters into force – Interview by ENISA ED, Udo Helmbrecht

A new era for ENISA and cybersecurity in Europe! The EU Cybersecurity Act entered into force on 27 June, setting a new mandate for the EU Agency for Cybersecurity – ENISA and establishing the European cybersecurity certification framework.

Find out more: https://europa.eu/!gc67kf

Video copyright: DG COMM – DG for Communication

CH Medical Device Cybersecurity in Healthcare: Managing Threats and Costs

The Vizient Supply Chain Leadership Series explores how hospitals can work with medical device vendors to develop cybersecurity program with effective security controls. With cyber attacks targeting a whopping 95% of health care organizations, medical devices offer access and control to would-be attackers, putting patients at great risk, at huge costs to the organization itself.

Next video info: vizientinc.com/Events/2019-05-15-Supply-Chain-Leadership-Series

Features Erick Decker, chief security and privacy officer, University of Chicago Medicine, Greg Garcia, executive director for Cybersecurity, Healthcare Sector Coordinating Council, Kevin McDonald, director, Clinical Information Security, Mayo Clinic and Molly Zmuda, senior networks director at Vizient, Inc.


BitSight for Security Performance Management

As a security leader, how do you know where to focus your security resources or make the quick strategic decisions your business needs to stay ahead? There are lots of solutions today: threat feeds, vulnerability scanners, maturity frameworks, penetration tests, but how do you know if these tools are actually working? BitSight for Security Performance Management is the first solution that provides maximum visibility into your cybersecurity program’s performance. Powered by BitSight Security Ratings, the largest and most engaged ecosystem worldwide, it monitors both good and bad security practices for more than 160,000 global vendors, giving you the intelligence you need to make defensible, risk-based decisions to drive your business forward. With one unified platform, you can assess your current security state, analyze how your security performance ranks against your industry and peers, and create improvement plans that reduce cyber risk.

With BitSight, you can:
– Create data-driven plans
– Allocate limited resources
– Prioritize efforts
– Prove the measurable impact of your team’s work

Learn more at https://www.bitsight.com/security-performance-management

CH How Much Math Do You Need to Know in Cybersecurity?

A common question asked around cybersecurity community is how much math is required for a career in this field. Often times this question is asked for students who are enrolling in formal college degree curriculums, having to complete basic math classes before entering the cybersecurity specific classes. Today I address this question head-on, outlining the classes you will likely see in a college degree maps.

If you are not pursuing a formal degree, you will still be able to understand the different security positions and the “math” demands each one requires (as outlined in the video).

Need Help? Visit: https://www.cyberinternacademy.com

Want to Follow Me?:
Twitter: @collinsinfosec
Sign up for the email list: https://youtu.be/FfmAHYqa314

Have questions, concerns, comments? Contact me, grant@cyberinternacademy.com

Should YOU get a Cyber Security Degree? Is it worth it?

#Cybersecurity #Hacking #degree

What’s up #SecurityNinjas!

If you’re considering a degree in Cyber Security, please do the research on the program you’re considering.
Often times schools will advertise their awesome Cyber Security Major, and then it turns out to be a waste of time.

Links to well recognized Cyber programs:

Cyber Operations:


Cyber Defense – by state:

Music in this video:
Free Download / Stream: http://ncs.io/ark
Watch: https://youtu.be/8xlDwukxjnA
Song —- Ark
Artist — Ship Wrek & Zookeepers

Virtual Session: NIST Cybersecurity Framework Explained

Kelly Hood, Cybersecurity Engineer, G2, Inc.
Thomas Conkle, CForum Founding Member / Cybersecurity Engineer, G2, Inc.

The Framework for Improving Critical Infrastructure (commonly known as the Cybersecurity Framework) was released by NIST in April 2014. In April 2018, NIST released update v1.1 of the Framework to enhance and clarify the Cybersecurity Framework based on comments from across all industry sectors. This session focuses on the information presented in update. Additionally, we will discuss the Categories within the Framework Core to understand how they work together to develop a robust cybersecurity program.


Scroll to top