Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Solving cyber-security issues through awareness, training, and education

Sridhar Karnam (Sri_Karnam) ‎08-15-2013 10:34 AM - edited ‎07-07-2015 10:36 AM

7997003068_770751fd52_z.jpgThe National Initiative for Cybersecurity Education (NICE) has developed the National Cybersecurity Workforce Framework (“the Framework”) to provide a common understanding of and lexicon for cybersecurity work, according to their website


This framework work spans across the industries, job titles and verticals. This is also independent of size, because  one person may perform multiple roles or many people can perform single role depending on the size of the organization. 



The framework mainly centers on collection, aggregation and analysis of data and security events. The next steps are operation, prevention, and investigation. Sound familiar? Security Information and Event Management (SIEM) does the same in collecting 100 percent of the data and security events, unifying it and analyzing for threats. Once the threats are identified, SIEM responds to those events immediately with corrective actions.


It is not the tools, compliance or regulations that will help you be secured. It is the training and education that helps you safeguard your valuable data and IP.  Physical security and law and order enforcement agencies have educational programs and colleges and training for these jobs. Unfortunately, cyber-security has no programs or colleges.  For most organizations, a cyber-security team  is mostly a spin-off from the IT organization or compliance department that manages security. This genealogy determines the tools that they have access to.


You need to start somewhere and what better place than biggest security event in Washington, D.C --HP Protect. The event  has 150 sessions and more than 100+ hours of deep-dive technical and business trainings on cyber-security issues.


Click here for more details or to register for the event.  


About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
February 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during the online Expert Days - see details below. Software experts do not monitor this foru...
Read more
See board event postings
Vivit Events - 2016
Learn about upcoming Vivit webinars and live events in 2016.
Read more
View all