{"id":14968,"date":"2018-08-06T00:00:00","date_gmt":"2018-08-05T23:00:00","guid":{"rendered":"https:\/\/identifi-global.eu.applyflow.com\/everything-you-need-to-get-ahead-in-cyber-security-an-ever-expanding-list-of-great-resources\/"},"modified":"2022-12-09T06:14:21","modified_gmt":"2022-12-09T06:14:21","slug":"everything-you-need-to-get-ahead-in-cyber-security-an-ever-expanding-list-of-great-resources","status":"publish","type":"post","link":"https:\/\/www.identifiglobal.com\/news\/everything-you-need-to-get-ahead-in-cyber-security-an-ever-expanding-list-of-great-resources\/","title":{"rendered":"Everything you need to get ahead in cyber security. An ever-expanding list of great resources"},"content":{"rendered":"<p style=\"text-align: center\">\n\t<img decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-01.cms-eu-v2i.applyflow.com\/identifi-global\/wp-content\/uploads\/2022\/03\/CybersecurityResources.jpg\" style=\"width: 600px; height: 399px\"><\/p>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t\u2018Knowledge is power\u2019, so the saying goes.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tNo more is that truer than at work. Of course it pays to think innovatively and creatively in your roles; developing your own way of working and processes can say a lot about your personality and management style.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h3>\n\tYou may like: <a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\">How identifi uses strategic partners to improve the recruitment process for clients and candidates<\/a><\/h3>\n<div>\n\tBut, it also pays to seek inspiration wherever you can find it. With that in mind, we\u2019re developing a helpful resource for cybersecurity professionals to get ahead (and stay ahead) of the curve. Whether it\u2019s newsletter, podcasts, influencers of publications, this ever-evolving list will contain everything you need to get that competitive edge at work.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tCyber security thought leaders to follow<\/h2>\n<div>\n\tThere are plenty of industry experts in the cyber security field publishing great content on LinkedIn. Keep yourself well informed on business data breaches and gain leading insights from the most respected names in the industry.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Eugene Kaspersky<\/strong><\/a> &#8211; Kaspersky is one of the more reputable names in cyber security. Follow the Kaspersky Labs founder to stay abreast of defensive online threats.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Maya Schirmann<\/strong><\/a> &#8211; As CMO at <a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\">Deep Instinct<\/a>, Maya takes her role as a security marketer seriously. Follow her for actionable advice in the cyber security space.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Allison Miller<\/strong><\/a> &#8211; With her stint as Head of Ads Risk Strategy at Google, Allison is a leading voice in cyber security. She\u2019s a sought-after public speaker and worth following for her work on anti-fraud tactics.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tTop cyber security Twitter influencers<\/h2>\n<div>\n\tCut through all the Twitter chatter and follow some of these leading cyber security influencers. IT professionals can actively engage with influencers in real-time about breaking news that is pertinent to businesses and the wider industry as a whole.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; @briankrebs<\/strong><\/a> &#8211; The influential investigative journalist writes extensively about cybercrime after falling victim to a Chinese hacking group. He often shares his insights on high profile business and governmental cyberattacks.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; @mikko<\/strong><\/a> &#8211; A renowned <a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\">TED speaker<\/a> and inventor, Mikko Hypponen has lectured at Cambridge and Stanford. As a respected government advisor in the United States, Europe and Asia, he tweets about online security threats and privacy concerns.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; @BillBrenner70<\/strong><\/a> &#8211; Bill has been featured on numerous technology websites due to his expertise in cyber security. Follow his tweets for musings on hacking and IoT.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tCyber security newsletters you should subscribe to<\/h2>\n<div>\n\tStay informed and up-to-date with a regular newsletter to kick-start your day. Get a weekly or daily briefing of the latest security news and trends to keep you in the loop before arriving in the office. Subscribing to your favourite newsletter is a great way to stay ahead if you don\u2019t have time to flick through newspaper articles.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; CSOOnline<\/strong><\/a> &#8211; Join the mailing list for this popular newsletter on enterprise security. Subscribers will gain news and insights on evolving threats and combating cyber attacks.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Security Week<\/strong><\/a> &#8211; Subscribe to Security Week\u2019s newsletter and stay informed on trends and analysis from leading security experts.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Cybersecurity Ventures<\/strong><\/a> &#8211; Be part of an active social community by connecting on LinkedIn for newsletter notifications, events and resources.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tThe best Medium blogs on cyber security<\/h2>\n<div>\n\tMedium is home to some fantastic content from both leading and lesser-known publishers writing about everything from hacking to government data breaches. Subscribers can sign up and follow their favourite writers as well as engage with them in the comments.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Hackernoon <\/strong><\/a>&#8211; Billed as the site blog hackers use to \u2018start their afternoons\u2019, Hackernoon is the go-to source for coding, blockchain and security threats.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<strong><a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\">&#8211; Threat-Intel<\/a><\/strong> &#8211; Symantec\u2019s Medium blog gives readers practical insights into threat intelligence and IT security.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; The Grugq <\/strong><\/a>&#8211; A security researcher whose work covers covert topics including forensics and international espionage. The Grugq flies under the radar and writes critically about shady government security policies and privacy.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tTrade publications and websites for cyber security news<\/h2>\n<div>\n\tIT professionals are spoilt for choice with the numerous trade publications and blogs on offer in the security space. Opt for a traditional magazine subscription to catch up on news in your spare time or follow all the latest updates online during your tea break.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; SC Magazine<\/strong><\/a> &#8211; An award-winning source for security job seekers looking for in-depth analysis and expert comment. From live events to product reviews, SC Magazine is a vital offline and online industry resource.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Infosecurity Magazine<\/strong><\/a> &#8211; For security professionals seeking rich quality content to keep them well informed, Infosecurity Magazine is the ideal destination for all things security. With free educational content including webinars, Infosecurity is an industry favourite.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; CBR Online<\/strong><\/a> &#8211; For enterprising security job seekers, CBR offers breaking technology news and trends from leading tech journalists.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tCyber security events to attend<\/h2>\n<div>\n\tBrush up on your cyber security knowledge and network with other IT professionals at some of the UK\u2019s biggest industry events. From Europe\u2019s largest IT summit to the world\u2019s biggest IoT conference, these are the unmissable cyber security events to help you get ahead. For more, check out our annual round-up of the best events of the year.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; IP Expo Manchester<\/strong><\/a> &#8211; IT professionals should head to the IP Expo for invaluable insights from industry experts.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Cyber Security Expo<\/strong><\/a> &#8211; Job hunters can find exciting new job opportunities at this free security recruitment fair. Connect with employers like BAE Systems and BT who have hundreds of vacancies to fill on the day.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Cyber Security Summit<\/strong><\/a> &#8211; Join 2000 security professionals at this event dedicated to cyber resilience across governmental and public sectors.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; European Information Security Summit &#8211;<\/strong><\/a> The largest summit in Europe welcomes IT professionals to skill up at their clinics, roundtables and education sessions.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; IoT Tech Expo Global<\/strong><\/a> &#8211; Attend the IoT Expo as one of 12,000 delegates at the world\u2019s biggest IoT conference. Hear from over 500 industry experts over 2 days of insight and discussion.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tCyber security groups and forums<\/h2>\n<div>\n\tApart from social networks like LinkedIn, there are several other online communities where you can meet and network with your peers. Discuss current security trends and gain advice from like-minded individuals in online security groups across the globe.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Hack Forums<\/strong><\/a> &#8211; With over 50 million posts, Hack Forums is a popular online network for white hat hacking. A helpful resource for IT managers to share their knowledge on everything from malware to coding.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Netsec<\/strong><\/a> &#8211; This subreddit posts news and opinions to over 200,000 subscribers. There are plenty of discussions on topics like Cambridge Analytica and job opportunities.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Wilders Security<\/strong><\/a> &#8211; A community home to thousands of security professionals looking to stay abreast of security advancements. A great resource for job seekers to research topics like GDPR and digital transformation.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tCyber security podcasts<\/h2>\n<div>\n\tAdd these cyber security podcasts to your podcast library and discover what the leading industry experts are talking about. Podcasts are a great way to keep you both entertained and informed whilst on the morning commute.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; SANS Internet Storm Center Podcast<\/strong><\/a> &#8211; A bite-sized daily chunk of InfoSec news, SANS\u2019s Stormcasts are 5-10 minute updates on the latest information security threats.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Tripwire\u2019s Security Slice Podcast <\/strong><\/a>&#8211; Security Slice looks at the biggest issues and events around cyber, and features plenty of interviews with prominent guests.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Risky Business <\/strong><\/a>&#8211; This award-winning podcast takes a light-hearted look at the serious issue of online security. Expect expert guests to discuss the state of global hacking and defensive business tactics.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/wwww.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Defensive Security <\/strong><\/a>&#8211; Join hosts Jerry Bell and Andrew Kalat as they take listeners on a journey through malware trends and business data breaches.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tFor newbies<\/h2>\n<div>\n\tIf you\u2019re new to the cyber security world, the resources we\u2019ve listed above will prove invaluable. But if you\u2019re looking for some more entry-level resources, we can\u2019t recommend these two enough.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener\"><strong>&#8211; Cybrary<\/strong><\/a> &#8211; There may be no such thing as a free lunch, but free cyber security courses really do exist. Join over a million other professionals taking advantage of Cybrary\u2019s free courses, spanning everything from project management to penetration testing.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"http:\/\/www.google.com\"><strong>&#8211; Inspired Careers<\/strong><\/a> &#8211; When looking for a cyber security role, it\u2019s worth thinking beyond the obvious. Inspired Careers offers a huge amount of information about courses, resources opportunities in the sector &#8211; including roles you may never have considered.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tWith our bumper list of helpful resources, you\u2019re bound to have the upper hand over other candidates when job hunting. Make sure to keep this list bookmarked so you can quickly whip it out ahead of any upcoming interviews.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tYou can thank us when you nab that new role!<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<strong>Stay well informed and subscribe to the identifi Global newsletter, or follow us on <a href=\"http:\/\/www.google,com\" target=\"_blank\" rel=\"noopener\">social media<\/a> for the latest industry updates.&nbsp; &nbsp;<\/strong><\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\t&nbsp;<\/h2>\n<h2>\n\tShare this Article<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; \u2018Knowledge is power\u2019, so the saying goes. &nbsp; No more is that truer than at work. Of course it pays to think innovatively and creatively in your roles; developing your own way of working and processes can say a lot about your personality and management style. &nbsp; You may like: How identifi uses strategic&hellip;&nbsp;<a href=\"https:\/\/www.identifiglobal.com\/news\/everything-you-need-to-get-ahead-in-cyber-security-an-ever-expanding-list-of-great-resources\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Everything you need to get ahead in cyber security. An ever-expanding list of great resources<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":14180,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[38],"tags":[],"class_list":["post-14968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-management"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/14968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/comments?post=14968"}],"version-history":[{"count":0,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/14968\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media\/14180"}],"wp:attachment":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media?parent=14968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/categories?post=14968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/tags?post=14968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}