top of page
jj-ying-8bghKxNU1j0-unsplash(1).jpg

RESOURCES
INDUSTRY  |  INDIVIDUALS  |  GOVERNMENT
– Click to Link –

INDUSTRY
vecteezy_abstract-dark-blue-gradient-color-background-with-flowing_17293787 [Converted].pn

INDUSTRY

THE SECURITY TABLE PODCAST is a panel of four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software. The podcast is led by Chris Romeo, a leading voice and thinker in application security, threat modeling, security champions, and the CEO of Kerr Ventures. Chris has twenty-five years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris is also a member of the NC-PACE Industry Advisory Board.

THE APPLICATION SECURITY PODCAST, led by Chris Romeo, provides relevant content to people who design, build and test applications. They cover application security, from threat modeling and OWASP projects to DevOps+security and security culture.

THE THREAT MODELING PODCAST is based on Chris Romeo’s journey to understand threat modeling at the deepest levels. Subscribe to Chris Romeo's "Reasonable Application Security" newsletter.

TRACKS - CN is The Robotics/Automation and Cybersecurity Knowledge Sharing Coordination Network is a project funded by the National Science Foundation’s Advanced Technological Education program.The Coordination Networks goal is to increase understanding of the knowledge and skills required to operate and maintain connected machines securely in a manufacturing setting.

 

Webinar about Micro-Credentials Via the Cyber4RAM Digital Badge

Membership in the network [free] provides students, employers, and educators with training information and the opportunity to earn a Digital Badge by completing training on 11 NICE [National Initiative of Cybersecurity Education] competencies:

  • Asset and Inventory Mgmt. 

  • Computer Languages

  • Data Privacy

  • Data Security

  • Digital Forensics

  • Identity Management 

  • Incident Management

  • Infrastructure Design

  • Physical Device Security

  • Systems Integration

  • Vulnerabilities Assessment

RESOURCES FOR DEFENSE CONTRACTORS

INDIVIDUALS
vecteezy_abstract-dark-blue-gradient-color-background-with-flowing_17293787 [Converted].pn

INDIVIDUALS

NCSU CYBERSECURITY BOOTCAMP

UNC CHARLOTTE CYBERSECURITY BOOTCAMP

DO YOU WANT TO LEARN MORE ABOUT CYBERSECURITY – WITHOUT THE TECHNICAL JARGON?

  • Join Dr. Jeff Crume, Distinguished Engineer at IBM, Assistant Teaching Professor at NC State University, and member of the NC-PaCE Industry Advisory Board, for short, information packed videos using the IBM Lightboard. 

VIDEOS

Social Engineering
- How Bad Guys Hack Users

AI in Cybersecurity

Don’t Let Your Phone Get Juice Jacked!

Careers in Cybersecurity

Protecting Yourself From Ransomware

How to Make Passwords More Secure

GOVERNMENT
vecteezy_abstract-dark-blue-gradient-color-background-with-flowing_17293787 [Converted].pn

GOVERNMENT

THE NORTH CAROLINA AIR NATIONAL GUARD provides assessment, remediation, penetration testing, continuous monitoring, and incident response services on behalf of the NC Joint Cybersecurity Task Force. For more information about their services, or to sign up to receive services, CLICK HERE

THE NORTH CAROLINA JOINT CYBERSECURITY TASK FORCE is comprised of law enforcement, emergency management, N.C. National Guard Cyber, the Local Government IT Strike Team, state IT/cyber specialists and federal agencies.

  • This team provides incident coordination, resource support and technical assistance to reduce the impact to the affected organization, mitigate vulnerabilities and offers on-scene response personnel to aid in incident recovery. The services are available for State and Local agencies, as well as critical infrastructure providers.
     

  • When supporting the affected organization, the various members of the Joint Cybersecurity Task Force work in tandem to leverage their collective response expertise, apply their knowledge of cyberthreats, preserve key evidence and use their combined authorities and capabilities both to minimize asset vulnerability and bring malicious actors to justice.

  • For more information, or to report a cyber incident, please CLICK HERE

" An FBI Special Agent told the Wall Street Journal that every American citizen should expect that all of their personal data has been stolen and is on the dark web."

bottom of page