www.infosecinstitute.com
Open in
urlscan Pro
141.193.213.20
Public Scan
Submitted URL: https://click.e.infosecinstitute.com/?qs=6e6ecd794b32b93504f0a4b6505b2d403f9e5e41c0303539dee9586e544dcfc03a34fc3715909a5fa3655ad0002b...
Effective URL: https://www.infosecinstitute.com/?utm_source=marketing%20cloud&utm_medium=email%20blast&utm_campaign=training%20webinar&utm_conte...
Submission: On April 05 via api from SE — Scanned from DE
Effective URL: https://www.infosecinstitute.com/?utm_source=marketing%20cloud&utm_medium=email%20blast&utm_campaign=training%20webinar&utm_conte...
Submission: On April 05 via api from SE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* * 708.689.0131 * Contact us * Infosec IQ login * Infosec Skills login * * Products * Solutions * Resources * Company * Back * Product overview * Security awareness & culture * On-demand training & cyber ranges * On-demand training & cyber ranges * Back * Infosec IQ overview * Security awareness training * Phishing simulator * Reporting & assessments * Integrations & automation * Global administration * Browse all training * Pricing & features * Demo * Back * Infosec Skills overview * Role-guided training * Infosec Skills Teams * Cyber ranges & labs * Certifications & CPEs * Skill assessments * Browse all training * Pricing & features * Book a meeting * Back * Live boot camps * Infosec Institute certifications * DoD 8570 certifications * Get team boot camp pricing * View boot camp schedule * Book a meeting * Back * Pre-built training plans * Compliance, industry & role-based training * Custom education * Personalized learning * Languages * Gamified learning * Back * 1000+ phishing templates * Simulation types * Phishing email reporter * Back * Dashboard reports * Security culture survey * Assessments * Learner analytics * Back * Learner management * Threat response orchestration * Integrations * Back * 52 NICE Work Roles * SOC Analyst * Cloud Security Engineer * Security Manager * ICS Security Practitioner * Security Engineer * Penetration Tester * Digital Forensics Analyst * Information Risk Analyst * Security Architect * Secure Coder * Back * Boot camp overview * CISSP Boot Camp * Security+ Boot Camp * Ethical Hacking Boot Camp * CCNA Dual Cert Boot Camp * CASP+ Boot Camp * CCSP Boot Camp * CISM Boot Camp * CySA+ Boot Camp * PMP Boot Camp * Browse all boot camps Security awareness games by Infosec Click to Play On-demand training for every cybersecurity role Download Catalog Certification training from industry experts Get Pricing * Back * Solutions overview * By organization type * By need * Back * For business teams * For government & contractor teams * For MSPs & resellers * Back * Security awareness * Phishing simulation * Technical skill development * IT certification * Compliance & framework * CMMC certification 2021 IT & Security Talent Pipeline Study Download Now * Back * Cyber Work * Webcasts * Case studies * Reports & whitepapers * Blog * Community * Infosec Inspire * Free tools * Back * Cyber Work Podcast * Cyber Work Applied * Back * Infosec Insiders * TechExams * YouTube * LinkedIn * Facebook * Twitter * Back * Phishing Risk Test * Security awareness ROI calculator * Security awareness training plans * Security awareness buyer’s guide Cyber Work Podcast New cybersecurity career conversations every week Listen Now * Back * About us * Events & webcasts * Careers * Scholarships & awards * Infosec Gives * Infosec Gives Partner Program * Back * About us * Leadership * Newsroom * Recognition * Industry alliances * Back * Infosec Hall of Fame * Infosec Security Awareness Awards * Infosec Accelerate Scholarship Program We’re hiring! Join a team dedicated to making a difference. Get To Know Us Infosec has been acquired by leading education technology company, Cengage Group. Learn More IDC NAMES INFOSEC AN IT TRAINING LEADER Get the IDC MarketScape to learn why we stand out for cybersecurity training Download Report SKILL UP & GET CERTIFIED Upskill and get certified with unlimited access to 1,400+ hands-on cybersecurity courses and cyber ranges — or upgrade to a boot camp for live, instructor-led training guaranteed to get you certified on your first attempt. Learn More BUILD EMPLOYEE AWARENESS Empower employees with knowledge and skills to stay cyber secure at work and home. 2,000+ security awareness resources and phishing simulations aligned to employee learning styles help you change behaviors and culture. Learn More SECURITY EDUCATION FOR EVERY ROLE Infosec is the only security education provider with role-appropriate training for your entire workforce. We’ve helped organizations like yours upskill and certify security teams and boost employee awareness for over 17 years. Get in touch COMCAST STAYS AHEAD OF TECH CHANGE WITH INFOSEC SKILLS Infosec Skills is a very good place for building technical acumen and engineering development knowledge. It enables us to provide training to the entire team on relevant topics. Comcast Business Romy Ricafort, West Division Senior Director of Sales Engineering Read More POPULAR CYBERSECURITY RESOURCES 2021 IT & SECURITY TALENT PIPELINE STUDY Actionable strategies to patch your cyber talent pipeline in a post-pandemic world. Download CYBERSECURITY CULTURE — QUANTIFIED See the data on the most overlooked variable in security and learn how to measure your organization's cybersecurity culture. Download BUILDING A BILLION-DOLLAR CYBERSECURITY COMPANY | CYBER WORK PODCAST Veracode CEO Sam King is an icon in the realms of secure coding and application security, and she joins the podcast, along with Infosec CEO Jack Koziol, to discuss her cybersecurity journey, the President’s directive on software security and so, so many more topics. You really don’t want to miss this one, folks. 0:00 - Intro 3:10 - Origin story 5:05 - Ground floor of cybersecurity 7:54 - The “aha!” moments 12:30 - Point were you thought industry would grow 14:28 - Changes implemented at Veracode 19:52 - Nation’s approach to cybersecurity 24:10 - Federal government security 26:25 - Government oversight 28:14 - Secure coding practices 31:52 - Veracode’s app security report 40:04 - How to learn web application security 43:46 - Mistakes to avoid when applying 47:13 - Bringing in more diverse candidates 51:36 - Maintaining Veracode’s edge 54:25 - Advice to move into a new cybersecurity role 56:24 - Outro Listen Now EPISODE 200 EXTRAVAGANZA! BEST OF THE CYBER WORK PODCAST (AND $1,000 IN PRIZES!) PLEASE NOTE: Around minute 47, I incorrectly say that Eric Milam, author of the definitive report on the BAHAMUT threat group, is employed by HP. He is, in fact, employed by Blackberry. I sincerely apologize to Mr. Milam for the error. In this special episode, we look back at how the show has evolved over the past three years and celebrate our amazing guests and viewers. You've helped grow the Cyber Work Podcast to nearly a million plays! To give back, we're launching a brand new way for EVERYONE to build their cybersecurity skills. It's free. It's hands-on. Oh, and did we mention there's more than $1,000 in prizes EVERY MONTH. Huge thank you to all the past guests who shared their expertise over the past 200 episodes. The timings of everyone in this episode are listed below. Happy listening! 0:00 - Intro 0:42 - Monthly challenges and $1,000 in prizes! 1:30 - Cyber Work Podcast origins 2:32 - First episode with Leighton Johnson 3:16 - Finding our first guests 3:46 - Keatron Evans on incident response 6:54 - Susan Morrow on two-factor authentication 8:54 - Susan Morrow on GDPR 11:03 - Susan Morrow on "booth babes" and speaking up 13:20 - Alissa Knight on getting arrested for hacking at 17 16:39 - Alissa Knight on API security 19:14 - Ron Gula on cybersecurity challenges 23:23 - Amber Schroader on the real work of digital forensics 26:19 - Theme of the Cyber Work Podcast 27:01 - Jeff Williams on creating the OWASP Top Ten 31:23 - David Balcar on the biggest APTs 33:46 - Elie Bursztein on breaking into cybersecurity 37:37 - Sam King on AppSec frameworks and analysis 41:17 - Gary DeMercurio on getting arrested for red teaming 47:19 - Eric Milam on the BAHAMUT threat group 53:39 - Feedback from Cyber Work Podcast listeners 55:16 - Alyssa Miller on finding your career path 57:24 - Amber Schroader on computer forensics tasks 59:07 - Richard Ford on malware analyst careers 1:02:02 - Career action you can take today 1:02:19 - Rita Gurevich on reading and learning 1:03:20 - Snehal Antani on transitioning careers 1:04:26 - Promoting underrepresented voices 1:05:09 - Mari Galloway on women in cybersecurity 1:05:31 - Alyssa Miller on diversity "dog whistles" 1:10:11 - Christine Izuakor on creating role models 1:10:52 - We want to hear your story 1:11:40 - Monthly challenges and outro Listen Now PROUD TO BE RECOGNIZED With over 200 awards under our belt, we’re honored to be recommended and trusted by clients and industry leaders worldwide. See Our Achievements * * * * * Products Infosec IQ Security awareness, culture & phishing simulator Infosec Skills Hands-on skill development & boot camps Resources Cyber Work Blog Infosec Inspire Events & webcasts Company Contact us About Infosec Careers Newsroom Partners * ©2022 Infosec Institute, Inc. * * Trademarks * Privacy Policy Infosec, part of Cengage Group We use cookies to personalize your experience and optimize site functionality. Accept Cookie settings Privacy & Cookies Policy Close INFOSEC COOKIE NOTICE We use cookies to help understand your needs, optimize website functionality and give you the best experience possible. Use this policy to understand how, when and where cookies are stored on your device. Want to know more? Contact privacy@infoseci... Necessary Necessary Always Enabled This type of cookie helps keep our website functioning. They provide access to account-based features and other secure areas of our site, and do not store information about you that could be used for marketing. This category of cookies cannot be disabled. Analytics analytics Google Analytics cookies help us understand how visitors use our site. All data collected from Google Analytics is anonymized (including your IP address) and stored by Google on U.S. servers. Marketing marketing We use this type of cookie to optimize our marketing campaigns. Marketing cookies are delivered by our database when you visit our site, complete a form or open email from us. Information stored in this cookie includes personal information like your name and what pages you view on our site. Save & Accept