2023 Cybersecurity Awareness Month
| | IEEE Day Membership Discount 🎉
In honor of IEEE Day, we are pleased to extend this special offer to our Build Your Career community:
IEEE Students can add Computer Society membership for Free! Use Code: CSIEEEDAYSTU23
IEEE Professional members can add Computer Society membership at 50% off! Use Code: CSIEEEDAY23
Become a Member and enhance the value of IEEE Computer Society as your professional home. |
|
| [GUIDE] What Makes a Great Cybersecurity Consultant (PDF)
Get Insights and advice from leading CISOs and security experts on current techniques and technologies you'll need to stand out as a consultant in cybersecurity. | DOWNLOAD CYBERSECURITY GUIDE (PDF) | 2023 Cybersecurity Awareness Month
This month provides an opportunity to improve our understanding of the ever-evolving landscape of cybersecurity. It’s a time to increase your knowledge, apply new defense tactics, and stay informed about the latest threats and best practices. | | How to be A Successful Manager as an Introvert | 12 October at 11:00 AM EDT
Are you an introverted manager looking to enhance your leadership skills? Join our upcoming webinar on "How to be a Successful Manager as an Introvert." This session will explore strategies for effective communication, networking, and building relationships. We'll cover techniques to leverage your introverted strengths, such as active listening and thoughtful reflection, while also addressing common challenges faced by introverted managers, such as public speaking and networking events. | ENHANCE YOUR LEADERSHIP SKILLS |
|
| | | [SE Radio Podcast] Andy Powell on Lessons Learned from a Major Cyber Attack
Andy Powell of AP Moller Maersk discusses lesson learned from a major cyber attack. SE Radio host Priyanka Raghavan spoke with Andy about the 2017 Not Petya cyber attack and the company’s recovery efforts, including how digital forensics helped in finding root causes; how “ways of working” changed, such as introducing secure by design and studying threat types and good testing processes; as well as his thoughts on zero trust networks and the use of machine learning to help detect future threats. |
|
| |
|
|