Creating secure environments requires efforts from numerous sources including you! You can assist in creating a more secure environment by becoming aware of common security threats your industry faces, educating yourself by deepening your understanding of what skills and abilities that are vital to cybersecurity specialists, and joining communities of practice or subscribing to free…
Cyber Awareness Videos
Tired of reading the same stale cyber awareness content? Lacking the time and/or resources to develop and deliver effective security content to your workforce? Strengthen your cybersecurity posture by implementing an ongoing awareness campaign that incorporates short, fresh video content created by the CSIAC.
Each month, the CSIAC will introduce a new video adding another cyber awareness topic to the series. This fresh supply of awareness content will provide organizations with the much needed variety of material to maximize effectiveness. The initial video collection covers the fundamental topics of any awareness campaign, such as phishing, malware, rules for handling PII, and social engineering.
Cybersecurity training efforts are most effective when they can successfully incorporate an element of ongoing awareness. The initial release of 12 videos and the steady supply of new content will help any organization create an ongoing cybersecurity campaign, or complement their existing efforts.
CSIAC releases a new Cyber Awareness training video on a monthly basis. Subscribe to receive an email notification when new videos are released.
Career Opportunities
Cybersecurity positions can require a varying degree of technical proficiency. Those that wish to pursue technical work such as programming or networking can excel in the security industry. However, those that desire a less technical profession can apply their cybersecurity knowledge to other areas such as policy, awareness, or management.
Malware
Malware continues to threaten organizations on a daily basis. However, did you know that your simple everyday practices and tendencies could actually be part of the reason why your organization is compromised? This video explores modern malware behavior as well as practical techniques for avoiding infection.
Password Security
We are all overwhelmed with login credentials for our various personal and professional accounts. Having said that, so much important information relies on our ability to generate and maintain a secure password. In practice we find weaknesses in our own human nature is too often our worst enemy, not a malicious attacker. This video demonstrates…
Phishing
Scamming users into giving up their information is not a new concept. However, for users to avoid modern phishing attempts, we need to understand the basics of everyday internet infrastructures such as URL links, web domain structure, and common attack techniques. This video discusses how attackers use phishing techniques to gain unauthorized access to a…
Challenges to Critical Infrastructure
Critical Infrastructure faces both traditional threats as well as industry specific security threats. Cyber-physical systems within Critical Infrastructure are often susceptible to the following issues: physical environment, limited processing and bandwidth and non-TCP/IP open formats, longer tech-refresh cycles, and how it varies from traditional priority of Confidentiality, Integrity and Availability to Availability, integrity and Confidentiality.
Emerging Concepts to Critical Infrastructure
Because of the unique communications of cyber-physical systems, new tools have been developed in order to effectively monitor and defend these systems. Two specific efforts and approaches to these design and security challenges are the DoD Industrial Control System Defense Operational Approach, which focuses on detection, mitigation, and recovery and the Cyber Threat Activity Matrix…
Cyber Physical Security
In order to understand a problem, definitions related to the issue are often studied. A common lexicon in this arena will help improve communication between industries. A few relevant definitions are explained.
Privacy of User Data – Today’s Predictions for Tomorrow’s Internet
In the future, we will continue to see arguments over the degree of privacy users can expect from internet service providers and other businesses. Users must be aware of the data that they share online by reading privacy statements that are posted on company websites and forms. It is imperative that users understand how their…
Internet of Things
Cars, medical devices, and other products will continue to be produced with network capabilities, increasing attack surface. There is expected to be 20.4 billion IoT devices connected to the Internet by 2020. With an increasing number of devices coming online, attackers have more potential targets than ever before. Part of the problem with these IoT…