Solving cyber-security issues through awareness, training, and education

7997003068_770751fd52_z.jpgThe National Initiative for Cybersecurity Education (NICE) has developed the National Cybersecurity Workforce Framework (“the Framework”) to provide a common understanding of and lexicon for cybersecurity work, according to their website http://csrc.nist.gov/nice/framework/.

 

This framework work spans across the industries, job titles and verticals. This is also independent of size, because  one person may perform multiple roles or many people can perform single role depending on the size of the organization. 

NICE_Binder-2.png

 

The framework mainly centers on collection, aggregation and analysis of data and security events. The next steps are operation, prevention, and investigation. Sound familiar? Security Information and Event Management (SIEM) does the same in collecting 100 percent of the data and security events, unifying it and analyzing for threats. Once the threats are identified, SIEM responds to those events immediately with corrective actions.

 

It is not the tools, compliance or regulations that will help you be secured. It is the training and education that helps you safeguard your valuable data and IP.  Physical security and law and order enforcement agencies have educational programs and colleges and training for these jobs. Unfortunately, cyber-security has no programs or colleges.  For most organizations, a cyber-security team  is mostly a spin-off from the IT organization or compliance department that manages security. This genealogy determines the tools that they have access to.

 

You need to start somewhere and what better place than biggest security event in Washington, D.C --HP Protect. The event  has 150 sessions and more than 100+ hours of deep-dive technical and business trainings on cyber-security issues.

 

Click here for more details or to register for the event.  

HP_Protect_Register_Now_600x60_Static.jpg

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.