Skip to content

Instantly share code, notes, and snippets.

@ashbyca
Last active June 20, 2024 12:46
Show Gist options
  • Save ashbyca/0291d1a3f8023f3eab02c585aab2a712 to your computer and use it in GitHub Desktop.
Save ashbyca/0291d1a3f8023f3eab02c585aab2a712 to your computer and use it in GitHub Desktop.
Chief Information Security Officer - Training and Educational Resources

  1. 5 free cyber courses
  2. Warten school - C0suite exduction
  3. Business Writing 101 Course - University Chicago

CISO Tradecraft

G Mark Hardy does interviews with security leaders. The show is produced by CISO Ross Young so the guests and topics are well vetted.

2 - Hacker Valley Studio

Ron Eddings and Chris Cochran talk shop with hackers and security leaders. Easy going conversational style to get in the head of security pros.

3 - Simply Cyber

๐Ÿ‘‰๐Ÿผ Gerald Auger, Ph.D. puts out tons of great content including a daily news roundup.

4 - Haunted Hacker

Mike jones has some pretty deep conversations with hackers of all walks of life. Conversations range from the personal to deep technical.

5 - Dr. Dark Web

Chris Roberts gives us the unadulterated truth on all things cybersecurity. If you have heard Chris speak, you know what to expect.


Links to my favorite Security YouTube channels

(Add your favorite security YouTube channels in the comments so we can save this as a resource for later!)

๐Ÿญ. ๐—ฟ๐—ถ๐˜€๐—ธ๐Ÿฏ๐˜€๐—ถ๐˜…๐˜๐˜† (https://lnkd.in/g8hCvu4t)

We do compliance overviews and deep dives on frameworks like SOC 2, ISO 27001, PCI DSS, and more. We also do weekly conversations with cybersecurity leaders.

๐Ÿฎ. ๐—•๐—น๐—ฎ๐—ฐ๐—ธ ๐—›๐—ถ๐—น๐—น๐˜€ ๐—œ๐—ป๐—ณ๐—ผ๐—ฆ๐—ฒ๐—ฐ (https://lnkd.in/gK5NPW74)

BHIS have long hosted a wide variety of security and hacking related content on their YT channel.

๐Ÿฏ. ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ก๐—ผ๐˜„ (https://lnkd.in/gvCVbCkK)

Weekly podcast covering security news and headlines.

๐Ÿฐ. ๐—•๐—น๐—ฎ๐—ฐ๐—ธ ๐—›๐—ฎ๐˜ (https://lnkd.in/gUa8yitF)

Many of the best presentations from the black hat conference and other related events.

๐Ÿฑ. ๐—›๐Ÿฐ๐˜‚๐—ป๐˜๐Ÿฏ๐—ฑ ๐—›๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ (https://lnkd.in/gU2VdNCk)

Mike Jones hosts conversations with other individuals in the security community. These podcasts are very conversational and provide some insight to the humans behind the personalities.

๐Ÿฒ. ๐—š๐—ฒ๐—ฟ๐—ฎ๐—น๐—ฑ ๐—”๐˜‚๐—ด๐—ฒ๐—ฟ - ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐˜† ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ (https://lnkd.in/gTKakihz)

Gerald uploads more GRC focused content including a daily news roundup.

๐Ÿณ. ๐——๐—˜๐—™๐—–๐—ข๐—ก ๐—–๐—ผ๐—ป๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐—ฐ๐—ฒ (https://lnkd.in/ggc2HsaR)

Some of the presentations from the DEFCON Conference.

๐Ÿด. ๐—ข๐—ช๐—”๐—ฆ๐—ฃ ๐—™๐—ผ๐˜‚๐—ป๐—ฑ๐—ฎ๐˜๐—ถ๐—ผ๐—ป (https://lnkd.in/gEveFkz2)

Great presentations on technical topics typically related to application security.

๐Ÿต. ๐—ช๐—ถ๐—น๐—ฑ ๐—ช๐—ฒ๐˜€๐˜ ๐—›๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป ๐—™๐—ฒ๐˜€๐˜ (https://lnkd.in/gSd-Yt8B)

WWHF is a conference for the security community. They upload many of their best conference presentations that are worth watching.

๐Ÿญ๐Ÿฌ. ๐——๐—ฎ๐˜ƒ๐—ถ๐—ฑ ๐—•๐—ผ๐—บ๐—ฏ๐—ฎ๐—น (https://lnkd.in/girHS3VP)

David has almost 1M subscribers. He has long provided various I.T. related content, but recently he has been doing hacking deep dives.

๐Ÿญ๐Ÿญ. ๐—ฆ๐—”๐—ก๐—ฆ ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ป๐—ฒ๐˜ ๐—ฆ๐˜๐—ผ๐—ฟ๐—บ ๐—ฃ๐—ผ๐—ฑ๐—ฐ๐—ฎ๐˜€๐˜ (https://lnkd.in/g8B3-b5d)

Daily 5 minute podcast covering breaking news in cybersecurity.


Links to free business skills for security professionals

(Add your favorite links in the comments so we can save this as a resource for later!)

๐Ÿญ - ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ช๐—ฟ๐—ถ๐˜๐—ฒ ๐—ฎ ๐—•๐˜‚๐˜€๐—ถ๐—ป๐—ฒ๐˜€๐˜€ ๐—–๐—ฎ๐˜€๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฅ๐—ฒ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ๐˜€ (https://lnkd.in/e-7UYh7P)

To get what you need as a security organization, you need to be able to effectively ask for it. This is a format that will help you make asks from the executive team.

๐Ÿฎ - ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ช๐—ฟ๐—ถ๐˜๐—ฒ ๐—˜๐—ณ๐—ณ๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ๐—น๐˜† - ๐—จ๐—ป๐—ถ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ถ๐˜๐˜† ๐—ผ๐—ณ ๐—–๐—ต๐—ถ๐—ฐ๐—ฎ๐—ด๐—ผ ๐—Ÿ๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ (https://lnkd.in/gTupZ6Cc)

This is a YouTube video on writing effectively that I always share with our team here at risk3sixty. It is especially helpful for business writing.

๐Ÿฏ. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐——๐—ผ ๐—ฎ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ ๐—•๐˜‚๐—ฑ๐—ด๐—ฒ๐˜ (https://lnkd.in/gi8BTZHb)

Security leaders need to be able to make accurate budgets. This helps ensure you can communicate your needs to the finance team and get what you need to support the business.

๐Ÿฐ. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฆ๐—ฝ๐—ฒ๐—ฎ๐—ธ ๐—˜๐—ณ๐—ณ๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ๐—น๐˜† - ๐— ๐—œ๐—ง ๐—Ÿ๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ (https://lnkd.in/grvmjxdg)

I revisit this YouTube video often. If you are giving a presentation this is great food for thought.

๐Ÿฑ. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฆ๐˜๐—ฎ๐—ฟ๐˜ ๐—ฎ ๐—ฆ๐—ฝ๐—ฒ๐—ฒ๐—ฐ๐—ต (https://lnkd.in/geJFKRyh)

Launching into a presentation is the hardest part for me. This is a format to help get things kicked-off.

๐Ÿฒ. ๐—” ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜ ๐—ณ๐—ผ๐—ฟ ๐—˜๐—ณ๐—ณ๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐— ๐—ฒ๐—ฒ๐˜๐—ถ๐—ป๐—ด๐˜€ (https://lnkd.in/eBci5-Uu)

Meetings have the habit of getting off track. Our team has been using this format for internal meetings and it works very well.

๐Ÿณ. ๐—จ๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜€๐˜๐—ฎ๐—ป๐—ฑ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ๐˜€๐—ต๐—ถ๐—ฝ ๐—ฆ๐˜๐˜†๐—น๐—ฒ (https://lnkd.in/efKYihcc)

This is an e-book that helps security leaders think through their leadership tendencies. It also provides tools for building a team and assessing your organization's needs based on your own strengths and weaknesses.


Add your favorite links in the comments so we can save this as a resource for later!

#cybersecurity #leadership #business


๐—Ÿ๐—ถ๐—ป๐—ธ๐˜€ to ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ๐˜€๐—ต๐—ถ๐—ฝ ๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—ง๐—ผ๐—ผ๐—น๐˜€

If you are looking to build your security leadership skills, here are a bunch of resources.

๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ๐˜€๐—ต๐—ถ๐—ฝ ๐—ฆ๐—ธ๐—ถ๐—น๐—น๐˜€:

๐Ÿญ. ๐—–๐—œ๐—ฆ๐—ข ๐—˜๐˜ƒ๐—ผ๐—น๐˜‚๐˜๐—ถ๐—ผ๐—ป ๐—•๐—ผ๐—ผ๐—ธ (https://lnkd.in/e-Adx4qv)

This is a great book on security leadership and the necessary communication and business skills written by security pros Matthew Sharp and Kyriakos "Rock" Lambros.

๐Ÿฎ. ๐—ง๐—ต๐—ฒ ๐—–๐—œ๐—ฆ๐—ข ๐—ฅ๐—ผ๐—น๐—ฒ ๐—•๐—น๐—ผ๐—ด ๐—ฆ๐—ฒ๐—ฟ๐—ถ๐—ฒ๐˜€ - ๐—™๐—ฅ๐—˜๐—˜ (https://lnkd.in/eAywKxhF)

This is a five part blog and webinar series that I wrote on security leadership skills. Goes through CISO roles, org chart design, recruiting and managing teams.

๐Ÿฏ. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—–๐—œ๐—ฆ๐—ข ๐—ช๐—ผ๐—ฟ๐—ธ๐˜€๐—ต๐—ผ๐—ฝ ๐—ฆ๐—ฒ๐—ฟ๐—ถ๐—ฒ๐˜€ - ๐—™๐—ฅ๐—˜๐—˜ (https://lnkd.in/eJk3UFsH)

This is a free (no registration) series on CISO topics ranging from Management to Information Protection.

๐Ÿฐ. ๐—ฆ๐—”๐—ก๐—ฆ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ๐˜€๐—ต๐—ถ๐—ฝ ๐—˜๐˜€๐˜€๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ (https://lnkd.in/ei8K8gcN)

This is a 5 day (in person) or 30 hours (online) course that is a crash course in being a security manager. This is a great once over the world from the SANS Institute.

๐Ÿฑ. ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐˜† ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—š๐—ฅ๐—– ๐—–๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ - ๐—™๐—ฅ๐—˜๐—˜ & ๐—ฃ๐—”๐—œ๐—— (https://lnkd.in/eY2kPwR8)

๐Ÿ‘‰๐Ÿผ Gerald Auger, Ph.D. Auger, Ph.D. developed a solid "pay what you can" GRC course for anyone looking to break into the GRC side of cybersecur

๐—•๐˜‚๐—ถ๐—น๐—ฑ ๐—ฎ ๐—•๐˜‚๐˜€๐—ถ๐—ป๐—ฒ๐˜€๐˜€ ๐—–๐—ฎ๐˜€๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—”๐˜€๐—ธ ๐—ณ๐—ผ๐—ฟ ๐—•๐˜‚๐—ฑ๐—ด๐—ฒ๐˜:

๐Ÿฒ. ๐—š๐˜‚๐—ถ๐—ฑ๐—ฒ ๐˜๐—ผ ๐—•๐˜‚๐—ถ๐—น๐—ฑ๐—ถ๐—ป๐—ด ๐—ฎ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—•๐˜‚๐˜€๐—ถ๐—ป๐—ฒ๐˜€๐˜€ ๐—–๐—ฎ๐˜€๐—ฒ - ๐—™๐—ฅ๐—˜๐—˜ (Blog: https://lnkd.in/e-7UYh7P or on YouTube: https://lnkd.in/ebjZf_Aq )

Free guide and template that I put together on thinking through and documenting a business case for security initiatives

๐—š๐—ฒ๐—ป๐—ฒ๐—ฟ๐—ฎ๐—น ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ๐˜€๐—ต๐—ถ๐—ฝ ๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด:

๐Ÿฒ. ๐—ฅ๐—ผ๐—ฏ ๐—–๐—ฎ๐—บ๐—ฝ๐—ฏ๐—ฒ๐—น๐—น - ๐—™๐—ฅ๐—˜๐—˜ & ๐—ฃ๐—”๐—œ๐—— (https://lnkd.in/e-ieDTsH)

We get leadership training from Rob Campbell at risk3sixty. Subscribe to Rob's blog. Its free.

๐Ÿณ. ๐——๐—ฎ๐—ป ๐—ฆ๐˜‚๐—น๐—น๐—ถ๐˜ƒ๐—ฎ๐—ป ๐—ฆ๐˜๐—ฟ๐—ฎ๐˜๐—ฒ๐—ด๐—ถ๐—ฐ ๐—–๐—ผ๐—ฎ๐—ฐ๐—ต - ๐—™๐—ฅ๐—˜๐—˜ & ๐—ฃ๐—”๐—œ๐—— (https://lnkd.in/eaqbj24X)

Dan Sullivan has a widely praised leadership ecosystem. He is the business coach of business coaches. Tons of free content on YouTube.

๐Ÿด. ๐—•๐˜‚๐˜€๐—ถ๐—ป๐—ฒ๐˜€๐˜€ ๐—ช๐—ฟ๐—ถ๐˜๐—ถ๐—ป๐—ด ๐Ÿญ๐Ÿฌ๐Ÿญ - ๐—™๐—ฅ๐—˜๐—˜ (https://lnkd.in/ewSFvvtq)

Fantastic course from the University of Chicago I find myself revisiting often.

#leadership #business #cybersecurity


https://www.cybersecuritytribe.com/articles/top-11-books-for-cisos-to-read-today


๐Ÿญ. ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ ๐— ๐—ฎ๐˜๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—”๐˜€๐˜€๐—ฒ๐˜€๐˜€๐—บ๐—ฒ๐—ป๐˜ ๐—ง๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ ๐—ถ๐—ป ๐—˜๐˜…๐—ฐ๐—ฒ๐—น (https://lnkd.in/gjeTQCcZ)

We created an easy to follow excel checklist security leaders can use to assess their program gaps. The workbook includes a nice dashboard based you can use in presentations.

๐Ÿฎ. ๐— ๐—ฎ๐˜๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—”๐˜€๐˜€๐—ฒ๐˜€๐˜€๐—บ๐—ฒ๐—ป๐˜ ๐—ฃ๐—ฟ๐—ฒ๐˜€๐—ฒ๐—ป๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ ๐—ถ๐—ป ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ๐—ฃ๐—ผ๐—ถ๐—ป๐˜ (https://lnkd.in/guKtNZBN)

This presentation is a great template for presenting the result of your security program maturity assessment to executives or the board of directors.

๐Ÿฏ. ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ ๐—•๐˜‚๐—ฑ๐—ด๐—ฒ๐˜ ๐—ง๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ ๐—ถ๐—ป ๐—˜๐˜…๐—ฐ๐—ฒ๐—น (https://lnkd.in/gnZsxJbz)

This is a comprehensive security program budget broken down by categories and potential tools you might need. It also includes a nice dashboard to show how your budget is broken down.

๐Ÿฐ. ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ ๐—ฅ๐—ข๐—œ ๐—–๐—ฎ๐—น๐—ฐ๐˜‚๐—น๐—ฎ๐˜๐—ผ๐—ฟ ๐—ง๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ ๐—ถ๐—ป ๐—˜๐˜…๐—ฐ๐—ฒ๐—น (https://lnkd.in/gxevXDcb)

This is an ROI calculator can use it as a conceptual model for any topic you wish. This is great for communicating ROI to the executive team or board of directors.

๐Ÿฑ. ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ ๐—•๐˜‚๐˜€๐—ถ๐—ป๐—ฒ๐˜€๐˜€ ๐—–๐—ฎ๐˜€๐—ฒ ๐—ง๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ ๐—ถ๐—ป ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ๐—ฃ๐—ผ๐—ถ๐—ป๐˜ (https://lnkd.in/guKtNZBN)

This is a great template to communicate a business case when you are requesting resources or project initiatives from the executive team.

๐Ÿฒ. ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ ๐—ข๐—ฟ๐—ด ๐—–๐—ต๐—ฎ๐—ฟ๐˜ ๐—ถ๐—ป ๐—˜๐˜…๐—ฐ๐—ฒ๐—น (https://lnkd.in/gHK9g_Gm)

This RACI diagram is an excellent tool for assessing if your organization has the right roles assigned to the right people.

๐Ÿณ. ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ง๐—ฒ๐—ฎ๐—บ ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฆ๐˜†๐˜€๐˜๐—ฒ๐—บ ๐—ช๐—ผ๐—ฟ๐—ธ๐—ฏ๐—ผ๐—ผ๐—ธ (https://lnkd.in/g6MVVF49)

The Security Team Operating System is a system for leaders to run their team. It includes a guide on how to define purpose, establish values, assign roles, create rhythms of meetings and data sharing, and set goals..

๐Ÿด. ๐Ÿฑ ๐—–๐—œ๐—ฆ๐—ข ๐—”๐—ฟ๐—ฐ๐—ต๐—ฒ๐˜๐˜†๐—ฝ๐—ฒ๐˜€ (https://lnkd.in/guH3vi8q)

This guide breaks down the 5 types and gives you a helpful assessment to consider how different CISO strengths fit at different types of organizations. Also includes a self assessment.

๐Ÿต. ๐—–๐—œ๐—ฆ๐—ข ๐—™๐—ถ๐—ฟ๐˜€๐˜ ๐Ÿต๐Ÿฌ ๐——๐—ฎ๐˜†๐˜€ ๐—–๐—ต๐—ฒ๐—ฐ๐—ธ๐—น๐—ถ๐˜€๐˜ ๐—ฎ๐—ป๐—ฑ ๐—ง๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ๐˜€ (https://lnkd.in/gYHVeFaN)

This guide includes everything you need for your first 90 days on the job as a security leader.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment