Access "Cybersecurity education vs. cybersecurity training"
This article is part of the May 2012 issue of New security strategies for the bring-your-own-device era
As you look to improve yourself as a cybersecurity professional, you often need help from an outside source to increase your knowledge. Security is a broad topic encompassing many disciplines, and cybersecurity is no different. There are technical, procedural, and managerial aspects to be considered to grow your knowledge of cybersecurity; you need to be proactive or you could be left behind. Plus, there are often many different ways to solve the same security problem. Knowing what to do and how to do it requires both knowledge and experience, but how do you gain this expertise? The answer is cybersecurity training and education, but which is more important? Where should you focus your limited time? Some consider security training and education to be the same thing, but there is a difference between the two. Consider them two sides of the same coin. Both training and education play a part in overcoming knowledge gaps. You need to be aware of your needs, wants, and goals before proceeding. This includes knowing where you want to go with your career and then ... Access >>>
Premium Content for Free.
Mobile device management systems help mitigate BYOD risks
by Lisa Phifer, Contributor
Understand the benefits and limitations of multi-platform MDM technology.
Deploying DP systems: Four DLP best practices for success
by Crystal Bedell
Plan your data loss prevention project carefully to avoid missteps.
- Mobile device management systems help mitigate BYOD risks by Lisa Phifer, Contributor
VMware strategy for security partners undergoes overhaul
by Marcia Savage
Virtualization giant revamps its security partner program after hitting some bumps in the road.
Thwarting BYOD risks starts with a mobile security policy, experts say
by Robert Westervelt
Organizations need to establish formal mobile policies before buying a mobile device management system.
- VMware strategy for security partners undergoes overhaul by Marcia Savage
Verizon DBIR: Organizations are forgetting computer security basics
by Marcia Savage
Verizon data breach report illustrates need to get back to basics.
Cybersecurity education vs. cybersecurity training
by Ron Woerner, Contributor
Security professionals need to understand the difference and plan accordingly.
Security staffing: Why information security positions go unfilled
by Lee Kushner, Contributor
Be aware of potential roadblocks and adjust your recruiting accordingly.
- Verizon DBIR: Organizations are forgetting computer security basics by Marcia Savage
More Premium Content Accessible For Free
Continuous monitoring program demystified
For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...
Does Windows 8.1 meet the demands of the BYOD age?
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Application security policy after Heartbleed
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...