How to Create a Strong Security Culture – IT Governance UK Blog

How to Create a Strong Security Culture – IT Governance UK Blog

Getting a greater return on investment on your security measures We all have a responsibility for security. Regardless of role or rank, everyone has their part to play: Practising good cyber hygiene Knowing how to spot a phishing attack Reporting phishing emails and (possible) breaches Contrary to popular belief, cyber and information security aren’t just matters for IT. But to ensure that all staff truly take note of security and apply the knowledge gained from…

Read More

One-Third of UK Teachers Do Not Have Cybersecurity Training

One-Third of UK Teachers Do Not Have Cybersecurity Training

Teachers in schools in England are not receiving sufficient cybersecurity training, a new poll has revealed. A third of teachers haven’t completed any in the last academic year, while only 66% of those who did found it useful. These results come from a Teacher Tapp survey of teachers across England from the Office of Qualifications and Examinations Regulation, or Ofqual. It also revealed the prevalence of cyber attacks within the education sector in the U.K….

Read More

An Expert Overview of CISM® – IT Governance UK Blog

An Expert Overview of CISM® – IT Governance UK Blog

A Springboard to Career Success CISM® (Certified Information Security Manager) is a globally recognised qualification that provides a good understanding of IT security with a management flavour. But with so much in the news about AI, Cloud security and other niche areas of cyber security, it’s easy to overlook the importance of such solid, tried-and-tested qualifications in information security. Adesoji ‘Soji’ Ogunjobi is a cyber security specialist and instructor, with nearly two decades of experience…

Read More

Cisco Training Bootcamps: Get the Scoop from Subject Matter Experts

Cisco Training Bootcamps: Get the Scoop from Subject Matter Experts

Cisco Training Bootcamps have been on the scene for a couple years now. One of the things that makes them so popular is their intensity and real-world application. We sat down with Subject Matter Experts (SMEs) John Capobianco, Bootcamp Developer Advocate, Joe Rinehart, Engineering Leader, and Palmer Sample, Software Engineering Technical Leader, to find out what makes Cisco Training Bootcamps so special.  Plus, we got a sneak peek at what they’ll cover in the upcoming…

Read More

Thou shalt question accepted wisdom

Thou shalt question accepted wisdom

Thou shalt question accepted wisdom | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Be the threat: Case for hands-on threat simulations in cybersecurity

Be the threat: Case for hands-on threat simulations in cybersecurity

Be the threat: Case for hands-on threat simulations in cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The role of unarmed security officers in active shooter response

The role of unarmed security officers in active shooter response

The role of unarmed security officers in active shooter response | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Leveraging leadership during a career transition

Leveraging leadership during a career transition

Leveraging leadership during a career transition | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Leadership development programs: Is there one for you?

Leadership development programs: Is there one for you?

Leadership development programs: Is there one for you? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Executive leadership programs for security professionals

Executive leadership programs for security professionals

Executive leadership programs for security professionals | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2 3 4