
RESOURCES
INDUSTRY | INDIVIDUALS | GOVERNMENT
– Click to Link –
![vecteezy_abstract-dark-blue-gradient-color-background-with-flowing_17293787 [Converted].pn](https://static.wixstatic.com/media/9041bd_668c55e5d7ce44af910f38b4eba06b09~mv2.png/v1/fill/w_980,h_551,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/9041bd_668c55e5d7ce44af910f38b4eba06b09~mv2.png)
INDUSTRY
THE SECURITY TABLE PODCAST is a panel of four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software. The podcast is led by Chris Romeo, a leading voice and thinker in application security, threat modeling, security champions, and the CEO of Kerr Ventures. Chris has twenty-five years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris is also a member of the NC-PACE Industry Advisory Board.
​
THE APPLICATION SECURITY PODCAST, led by Chris Romeo, provides relevant content to people who design, build and test applications. They cover application security, from threat modeling and OWASP projects to DevOps+security and security culture.
​
THE THREAT MODELING PODCAST is based on Chris Romeo’s journey to understand threat modeling at the deepest levels. Subscribe to Chris Romeo's "Reasonable Application Security" newsletter.
​
TRACKS - CN is The Robotics/Automation and Cybersecurity Knowledge Sharing Coordination Network is a project funded by the National Science Foundation’s Advanced Technological Education program.The Coordination Networks goal is to increase understanding of the knowledge and skills required to operate and maintain connected machines securely in a manufacturing setting.
Webinar about Micro-Credentials Via the Cyber4RAM Digital Badge
Membership in the network [free] provides students, employers, and educators with training information and the opportunity to earn a Digital Badge by completing training on 11 NICE [National Initiative of Cybersecurity Education] competencies:
-
Asset and Inventory Mgmt.
-
Computer Languages
-
Data Privacy
-
Data Security
-
Digital Forensics
-
Identity Management
-
Incident Management
-
Infrastructure Design
-
Physical Device Security
-
Systems Integration
-
Vulnerabilities Assessment
​​
RESOURCES FOR DEFENSE CONTRACTORS
​
THE POCKET PROTECTOR PODCAST. - Join cybersecurity North Carolina cybersecurity expert Jennifer Minella and her co-host Drew Conry-Murray at the intersection of networking and security. Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or working through your latest compliance audit, the Packet Protector podcast provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Jennifer Minella is the founder of Viszen Security.​
​
SECURITY CHAMPIONS PODCAST - Join North Carolina cybersecurity expert Michael Burch for the Security Champions Podcast. Security champions are the ambassadors of security and are looked upon as subject matter experts among developers. They help promote application security among their peers, and draw upon their knowledge, technical acumen, and their leadership skills to accomplish this goal. By equipping them with knowledge and skills through both leadership and secure coding training, organizations are investing in the improvement of their application security. The Security Champions podcast is presented by Security Journey, a North Carolina company specializing in secure code training.​
​
CHAINGUARD, a secure software supply chain company with a large presence in North Carolina, stood up their Chainguard Academy that offers self-paced, online courses such as Painless Vulnerability Management and Securing the AI/ML Supply Chain.
![vecteezy_abstract-dark-blue-gradient-color-background-with-flowing_17293787 [Converted].pn](https://static.wixstatic.com/media/9041bd_668c55e5d7ce44af910f38b4eba06b09~mv2.png/v1/fill/w_980,h_551,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/9041bd_668c55e5d7ce44af910f38b4eba06b09~mv2.png)
INDIVIDUALS
​
UNC CHARLOTTE CYBERSECURITY BOOTCAMP
​
DO YOU WANT TO LEARN MORE ABOUT CYBERSECURITY – WITHOUT THE TECHNICAL JARGON?
-
Join Dr. Jeff Crume, Distinguished Engineer at IBM, Assistant Teaching Professor at NC State University, and member of the NC-PaCE Industry Advisory Board, for short, information packed videos using the IBM Lightboard.
Social Engineering
- How Bad Guys Hack Users
AI in Cybersecurity
Don’t Let Your Phone Get Juice Jacked!
Careers in Cybersecurity
Protecting Yourself From Ransomware
How to Make Passwords More Secure
![vecteezy_abstract-dark-blue-gradient-color-background-with-flowing_17293787 [Converted].pn](https://static.wixstatic.com/media/9041bd_668c55e5d7ce44af910f38b4eba06b09~mv2.png/v1/fill/w_980,h_551,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/9041bd_668c55e5d7ce44af910f38b4eba06b09~mv2.png)
GOVERNMENT
THE NORTH CAROLINA AIR NATIONAL GUARD provides assessment, remediation, penetration testing, continuous monitoring, and incident response services on behalf of the NC Joint Cybersecurity Task Force. For more information about their services, or to sign up to receive services, CLICK HERE
​
THE NORTH CAROLINA JOINT CYBERSECURITY TASK FORCE is comprised of law enforcement, emergency management, N.C. National Guard Cyber, the Local Government IT Strike Team, state IT/cyber specialists and federal agencies.
-
This team provides incident coordination, resource support and technical assistance to reduce the impact to the affected organization, mitigate vulnerabilities and offers on-scene response personnel to aid in incident recovery. The services are available for State and Local agencies, as well as critical infrastructure providers.
-
When supporting the affected organization, the various members of the Joint Cybersecurity Task Force work in tandem to leverage their collective response expertise, apply their knowledge of cyberthreats, preserve key evidence and use their combined authorities and capabilities both to minimize asset vulnerability and bring malicious actors to justice.
​
-
For more information, or to report a cyber incident, please CLICK HERE
" An FBI Special Agent told the Wall Street Journal that every American citizen should expect that all of their personal data has been stolen and is on the dark web."