Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

How to Create a Better Cyber Defense by Building a Winning Cybersecurity Team

Date:
Oct. 24, 2018
Duration:
58m 43s

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.

Instructor:
Brad Puckett

Global Portfolio Director for Cybersecurity 

Brad Puckett is responsible for providing product leadership for our cybersecurity training portfolio at Global Knowledge. Brad has more than twenty years of experience in the information security realm, with a focus on applied security operations, policy, governance, compliance and risk management, system forensics and analysis, and thought leadership. Through extensive business analysis and market research, he ensures our cybersecurity offerings are in line with current trends and address our customer’s challenges in the cyber arena.

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization. 

Cybersecurity isn’t a one-person job—it’s dependent on several different factors within an organization. This webinar will show you how to build a strong cyber defense by focusing on:

 

  • The characteristics of winning cybersecurity teams
  • The Crown – Organizational map and career progression
  • The Castle – The eight functional specializations
  • Architecture and data policy
  • Data loss prevention
  • Governance, risk and compliance
  • Identity and access management
  • Incident response and forensic analysis
  • Penetration testing
  • Secure DevOps
  • Secure software development
  • Building a winning cybersecurity organization

 

Learn more: