<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Myths in Cybersecurity in Career Discussions</title>
    <link>https://community.isc2.org/t5/Career-Discussions/Myths-in-Cybersecurity/m-p/29762#M2307</link>
    <description>&lt;P&gt;&lt;SPAN&gt;I was recently a panel member on an&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.issa.org/" target="_blank" rel="noopener"&gt;ISSA&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;Thought Leadership Webinar,&lt;/SPAN&gt;&lt;I&gt;&amp;nbsp;The Persistent Pernicious Myths and Hidden Truths of Cybersecurity&lt;/I&gt;&lt;SPAN&gt;. Zane Lackey of Signal Sciences and Greg Young of Trend Micro each spoke about specific myths they have worked on. My contribution was thoughts on how myths happen and what we can do about them. My human factors approach to&amp;nbsp; cyber security led me to look at a bit of simple history of our field, from communications security through several steps to today's cyber security. With&amp;nbsp; quick review of the basics of a systems model that includes&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;people&lt;/I&gt;&lt;SPAN&gt;, the&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;processes&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;they follow, and the&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;tools&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;they use, I made a few observations about human nature (e.g., unlearning is harder than learning &amp;amp; we're lazy), and traced the history of one particular myth that was once a truth in our field.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;You can see the full 62 minute webinar on&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.brighttalk.com/" target="_blank" rel="noopener"&gt;BrightTALK&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;at&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://www.brighttalk.com/webcast/16125/372289?utm_source=brighttalk-portal&amp;amp;utm_medium=web&amp;amp;utm_content=issa&amp;amp;utm_campaign=webcasts-search-results-feed" target="_blank" rel="noopener"&gt;The Persistent Pernicious Myths and Hidden Truths of Cybersecurity&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;You will have to create a free BrightTALK account to see the webinar.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;To download the slides, you will need to log into ISSA.org as a member and go to the On Demand Conferences for&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://www.members.issa.org/page/Nov62019TL" target="_blank" rel="noopener"&gt;November 2019 ISSA Web Conference&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I encourage folks to watch the full webinar. It is worth an hour of continuing professional education (CPE) or continuing education units (CEU) for a variety of professional certifications.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;(c) 2019 D. Cragin Shelton&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(The above content is from my Randomness blog.)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Craig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 09 Nov 2019 13:06:35 GMT</pubDate>
    <dc:creator>CraginS</dc:creator>
    <dc:date>2019-11-09T13:06:35Z</dc:date>
    <item>
      <title>Myths in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Career-Discussions/Myths-in-Cybersecurity/m-p/29762#M2307</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I was recently a panel member on an&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.issa.org/" target="_blank" rel="noopener"&gt;ISSA&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;Thought Leadership Webinar,&lt;/SPAN&gt;&lt;I&gt;&amp;nbsp;The Persistent Pernicious Myths and Hidden Truths of Cybersecurity&lt;/I&gt;&lt;SPAN&gt;. Zane Lackey of Signal Sciences and Greg Young of Trend Micro each spoke about specific myths they have worked on. My contribution was thoughts on how myths happen and what we can do about them. My human factors approach to&amp;nbsp; cyber security led me to look at a bit of simple history of our field, from communications security through several steps to today's cyber security. With&amp;nbsp; quick review of the basics of a systems model that includes&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;people&lt;/I&gt;&lt;SPAN&gt;, the&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;processes&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;they follow, and the&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;tools&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;they use, I made a few observations about human nature (e.g., unlearning is harder than learning &amp;amp; we're lazy), and traced the history of one particular myth that was once a truth in our field.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;You can see the full 62 minute webinar on&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.brighttalk.com/" target="_blank" rel="noopener"&gt;BrightTALK&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;at&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://www.brighttalk.com/webcast/16125/372289?utm_source=brighttalk-portal&amp;amp;utm_medium=web&amp;amp;utm_content=issa&amp;amp;utm_campaign=webcasts-search-results-feed" target="_blank" rel="noopener"&gt;The Persistent Pernicious Myths and Hidden Truths of Cybersecurity&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;You will have to create a free BrightTALK account to see the webinar.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;To download the slides, you will need to log into ISSA.org as a member and go to the On Demand Conferences for&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://www.members.issa.org/page/Nov62019TL" target="_blank" rel="noopener"&gt;November 2019 ISSA Web Conference&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I encourage folks to watch the full webinar. It is worth an hour of continuing professional education (CPE) or continuing education units (CEU) for a variety of professional certifications.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;(c) 2019 D. Cragin Shelton&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(The above content is from my Randomness blog.)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Craig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Nov 2019 13:06:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Career-Discussions/Myths-in-Cybersecurity/m-p/29762#M2307</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-11-09T13:06:35Z</dc:date>
    </item>
  </channel>
</rss>

