- 5 free cyber courses
- Warten school - C0suite exduction
- Business Writing 101 Course - University Chicago
CISO Tradecraft
G Mark Hardy does interviews with security leaders. The show is produced by CISO Ross Young so the guests and topics are well vetted.
2 - Hacker Valley Studio
Ron Eddings and Chris Cochran talk shop with hackers and security leaders. Easy going conversational style to get in the head of security pros.
3 - Simply Cyber
๐๐ผ Gerald Auger, Ph.D. puts out tons of great content including a daily news roundup.
4 - Haunted Hacker
Mike jones has some pretty deep conversations with hackers of all walks of life. Conversations range from the personal to deep technical.
5 - Dr. Dark Web
Chris Roberts gives us the unadulterated truth on all things cybersecurity. If you have heard Chris speak, you know what to expect.
Links to my favorite Security YouTube channels
(Add your favorite security YouTube channels in the comments so we can save this as a resource for later!)
๐ญ. ๐ฟ๐ถ๐๐ธ๐ฏ๐๐ถ๐ ๐๐ (https://lnkd.in/g8hCvu4t)
We do compliance overviews and deep dives on frameworks like SOC 2, ISO 27001, PCI DSS, and more. We also do weekly conversations with cybersecurity leaders.
๐ฎ. ๐๐น๐ฎ๐ฐ๐ธ ๐๐ถ๐น๐น๐ ๐๐ป๐ณ๐ผ๐ฆ๐ฒ๐ฐ (https://lnkd.in/gK5NPW74)
BHIS have long hosted a wide variety of security and hacking related content on their YT channel.
๐ฏ. ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ก๐ผ๐ (https://lnkd.in/gvCVbCkK)
Weekly podcast covering security news and headlines.
๐ฐ. ๐๐น๐ฎ๐ฐ๐ธ ๐๐ฎ๐ (https://lnkd.in/gUa8yitF)
Many of the best presentations from the black hat conference and other related events.
๐ฑ. ๐๐ฐ๐๐ป๐๐ฏ๐ฑ ๐๐ฎ๐ฐ๐ธ๐ฒ๐ฟ (https://lnkd.in/gU2VdNCk)
Mike Jones hosts conversations with other individuals in the security community. These podcasts are very conversational and provide some insight to the humans behind the personalities.
๐ฒ. ๐๐ฒ๐ฟ๐ฎ๐น๐ฑ ๐๐๐ด๐ฒ๐ฟ - ๐ฆ๐ถ๐บ๐ฝ๐น๐ ๐๐๐ฏ๐ฒ๐ฟ (https://lnkd.in/gTKakihz)
Gerald uploads more GRC focused content including a daily news roundup.
๐ณ. ๐๐๐๐๐ข๐ก ๐๐ผ๐ป๐ณ๐ฒ๐ฟ๐ฒ๐ป๐ฐ๐ฒ (https://lnkd.in/ggc2HsaR)
Some of the presentations from the DEFCON Conference.
๐ด. ๐ข๐ช๐๐ฆ๐ฃ ๐๐ผ๐๐ป๐ฑ๐ฎ๐๐ถ๐ผ๐ป (https://lnkd.in/gEveFkz2)
Great presentations on technical topics typically related to application security.
๐ต. ๐ช๐ถ๐น๐ฑ ๐ช๐ฒ๐๐ ๐๐ฎ๐ฐ๐ธ๐ถ๐ป ๐๐ฒ๐๐ (https://lnkd.in/gSd-Yt8B)
WWHF is a conference for the security community. They upload many of their best conference presentations that are worth watching.
๐ญ๐ฌ. ๐๐ฎ๐๐ถ๐ฑ ๐๐ผ๐บ๐ฏ๐ฎ๐น (https://lnkd.in/girHS3VP)
David has almost 1M subscribers. He has long provided various I.T. related content, but recently he has been doing hacking deep dives.
๐ญ๐ญ. ๐ฆ๐๐ก๐ฆ ๐๐ป๐๐ฒ๐ฟ๐ป๐ฒ๐ ๐ฆ๐๐ผ๐ฟ๐บ ๐ฃ๐ผ๐ฑ๐ฐ๐ฎ๐๐ (https://lnkd.in/g8B3-b5d)
Daily 5 minute podcast covering breaking news in cybersecurity.
Links to free business skills for security professionals
(Add your favorite links in the comments so we can save this as a resource for later!)
๐ญ - ๐๐ผ๐ ๐๐ผ ๐ช๐ฟ๐ถ๐๐ฒ ๐ฎ ๐๐๐๐ถ๐ป๐ฒ๐๐ ๐๐ฎ๐๐ฒ ๐ณ๐ผ๐ฟ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฅ๐ฒ๐๐ผ๐๐ฟ๐ฐ๐ฒ๐ (https://lnkd.in/e-7UYh7P)
To get what you need as a security organization, you need to be able to effectively ask for it. This is a format that will help you make asks from the executive team.
๐ฎ - ๐๐ผ๐ ๐๐ผ ๐ช๐ฟ๐ถ๐๐ฒ ๐๐ณ๐ณ๐ฒ๐ฐ๐๐ถ๐๐ฒ๐น๐ - ๐จ๐ป๐ถ๐๐ฒ๐ฟ๐๐ถ๐๐ ๐ผ๐ณ ๐๐ต๐ถ๐ฐ๐ฎ๐ด๐ผ ๐๐ฒ๐ฐ๐๐๐ฟ๐ฒ (https://lnkd.in/gTupZ6Cc)
This is a YouTube video on writing effectively that I always share with our team here at risk3sixty. It is especially helpful for business writing.
๐ฏ. ๐๐ผ๐ ๐๐ผ ๐๐ผ ๐ฎ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ ๐๐๐ฑ๐ด๐ฒ๐ (https://lnkd.in/gi8BTZHb)
Security leaders need to be able to make accurate budgets. This helps ensure you can communicate your needs to the finance team and get what you need to support the business.
๐ฐ. ๐๐ผ๐ ๐๐ผ ๐ฆ๐ฝ๐ฒ๐ฎ๐ธ ๐๐ณ๐ณ๐ฒ๐ฐ๐๐ถ๐๐ฒ๐น๐ - ๐ ๐๐ง ๐๐ฒ๐ฐ๐๐๐ฟ๐ฒ (https://lnkd.in/grvmjxdg)
I revisit this YouTube video often. If you are giving a presentation this is great food for thought.
๐ฑ. ๐๐ผ๐ ๐๐ผ ๐ฆ๐๐ฎ๐ฟ๐ ๐ฎ ๐ฆ๐ฝ๐ฒ๐ฒ๐ฐ๐ต (https://lnkd.in/geJFKRyh)
Launching into a presentation is the hardest part for me. This is a format to help get things kicked-off.
๐ฒ. ๐ ๐๐ผ๐ฟ๐บ๐ฎ๐ ๐ณ๐ผ๐ฟ ๐๐ณ๐ณ๐ฒ๐ฐ๐๐ถ๐๐ฒ ๐ ๐ฒ๐ฒ๐๐ถ๐ป๐ด๐ (https://lnkd.in/eBci5-Uu)
Meetings have the habit of getting off track. Our team has been using this format for internal meetings and it works very well.
๐ณ. ๐จ๐ป๐ฑ๐ฒ๐ฟ๐๐๐ฎ๐ป๐ฑ ๐ฌ๐ผ๐๐ฟ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ๐๐ต๐ถ๐ฝ ๐ฆ๐๐๐น๐ฒ (https://lnkd.in/efKYihcc)
This is an e-book that helps security leaders think through their leadership tendencies. It also provides tools for building a team and assessing your organization's needs based on your own strengths and weaknesses.
Add your favorite links in the comments so we can save this as a resource for later!
#cybersecurity #leadership #business
๐๐ถ๐ป๐ธ๐ to ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ๐๐ต๐ถ๐ฝ ๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐ง๐ผ๐ผ๐น๐
If you are looking to build your security leadership skills, here are a bunch of resources.
๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ๐๐ต๐ถ๐ฝ ๐ฆ๐ธ๐ถ๐น๐น๐:
๐ญ. ๐๐๐ฆ๐ข ๐๐๐ผ๐น๐๐๐ถ๐ผ๐ป ๐๐ผ๐ผ๐ธ (https://lnkd.in/e-Adx4qv)
This is a great book on security leadership and the necessary communication and business skills written by security pros Matthew Sharp and Kyriakos "Rock" Lambros.
๐ฎ. ๐ง๐ต๐ฒ ๐๐๐ฆ๐ข ๐ฅ๐ผ๐น๐ฒ ๐๐น๐ผ๐ด ๐ฆ๐ฒ๐ฟ๐ถ๐ฒ๐ - ๐๐ฅ๐๐ (https://lnkd.in/eAywKxhF)
This is a five part blog and webinar series that I wrote on security leadership skills. Goes through CISO roles, org chart design, recruiting and managing teams.
๐ฏ. ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐๐ฆ๐ข ๐ช๐ผ๐ฟ๐ธ๐๐ต๐ผ๐ฝ ๐ฆ๐ฒ๐ฟ๐ถ๐ฒ๐ - ๐๐ฅ๐๐ (https://lnkd.in/eJk3UFsH)
This is a free (no registration) series on CISO topics ranging from Management to Information Protection.
๐ฐ. ๐ฆ๐๐ก๐ฆ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ๐๐ต๐ถ๐ฝ ๐๐๐๐ฒ๐ป๐๐ถ๐ฎ๐น๐ (https://lnkd.in/ei8K8gcN)
This is a 5 day (in person) or 30 hours (online) course that is a crash course in being a security manager. This is a great once over the world from the SANS Institute.
๐ฑ. ๐ฆ๐ถ๐บ๐ฝ๐น๐ ๐๐๐ฏ๐ฒ๐ฟ ๐๐ฅ๐ ๐๐ผ๐๐ฟ๐๐ฒ - ๐๐ฅ๐๐ & ๐ฃ๐๐๐ (https://lnkd.in/eY2kPwR8)
๐๐ผ Gerald Auger, Ph.D. Auger, Ph.D. developed a solid "pay what you can" GRC course for anyone looking to break into the GRC side of cybersecur
๐๐๐ถ๐น๐ฑ ๐ฎ ๐๐๐๐ถ๐ป๐ฒ๐๐ ๐๐ฎ๐๐ฒ ๐ฎ๐ป๐ฑ ๐๐๐ธ ๐ณ๐ผ๐ฟ ๐๐๐ฑ๐ด๐ฒ๐:
๐ฒ. ๐๐๐ถ๐ฑ๐ฒ ๐๐ผ ๐๐๐ถ๐น๐ฑ๐ถ๐ป๐ด ๐ฎ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐๐๐ถ๐ป๐ฒ๐๐ ๐๐ฎ๐๐ฒ - ๐๐ฅ๐๐ (Blog: https://lnkd.in/e-7UYh7P or on YouTube: https://lnkd.in/ebjZf_Aq )
Free guide and template that I put together on thinking through and documenting a business case for security initiatives
๐๐ฒ๐ป๐ฒ๐ฟ๐ฎ๐น ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ๐๐ต๐ถ๐ฝ ๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด:
๐ฒ. ๐ฅ๐ผ๐ฏ ๐๐ฎ๐บ๐ฝ๐ฏ๐ฒ๐น๐น - ๐๐ฅ๐๐ & ๐ฃ๐๐๐ (https://lnkd.in/e-ieDTsH)
We get leadership training from Rob Campbell at risk3sixty. Subscribe to Rob's blog. Its free.
๐ณ. ๐๐ฎ๐ป ๐ฆ๐๐น๐น๐ถ๐๐ฎ๐ป ๐ฆ๐๐ฟ๐ฎ๐๐ฒ๐ด๐ถ๐ฐ ๐๐ผ๐ฎ๐ฐ๐ต - ๐๐ฅ๐๐ & ๐ฃ๐๐๐ (https://lnkd.in/eaqbj24X)
Dan Sullivan has a widely praised leadership ecosystem. He is the business coach of business coaches. Tons of free content on YouTube.
๐ด. ๐๐๐๐ถ๐ป๐ฒ๐๐ ๐ช๐ฟ๐ถ๐๐ถ๐ป๐ด ๐ญ๐ฌ๐ญ - ๐๐ฅ๐๐ (https://lnkd.in/ewSFvvtq)
Fantastic course from the University of Chicago I find myself revisiting often.
#leadership #business #cybersecurity
https://www.cybersecuritytribe.com/articles/top-11-books-for-cisos-to-read-today
๐ญ. ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ ๐ ๐ฎ๐๐๐ฟ๐ถ๐๐ ๐๐๐๐ฒ๐๐๐บ๐ฒ๐ป๐ ๐ง๐ฒ๐บ๐ฝ๐น๐ฎ๐๐ฒ ๐ถ๐ป ๐๐ ๐ฐ๐ฒ๐น (https://lnkd.in/gjeTQCcZ)
We created an easy to follow excel checklist security leaders can use to assess their program gaps. The workbook includes a nice dashboard based you can use in presentations.
๐ฎ. ๐ ๐ฎ๐๐๐ฟ๐ถ๐๐ ๐๐๐๐ฒ๐๐๐บ๐ฒ๐ป๐ ๐ฃ๐ฟ๐ฒ๐๐ฒ๐ป๐๐ฎ๐๐ถ๐ผ๐ป ๐ง๐ฒ๐บ๐ฝ๐น๐ฎ๐๐ฒ ๐ถ๐ป ๐ฃ๐ผ๐๐ฒ๐ฟ๐ฃ๐ผ๐ถ๐ป๐ (https://lnkd.in/guKtNZBN)
This presentation is a great template for presenting the result of your security program maturity assessment to executives or the board of directors.
๐ฏ. ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ ๐๐๐ฑ๐ด๐ฒ๐ ๐ง๐ฒ๐บ๐ฝ๐น๐ฎ๐๐ฒ ๐ถ๐ป ๐๐ ๐ฐ๐ฒ๐น (https://lnkd.in/gnZsxJbz)
This is a comprehensive security program budget broken down by categories and potential tools you might need. It also includes a nice dashboard to show how your budget is broken down.
๐ฐ. ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ ๐ฅ๐ข๐ ๐๐ฎ๐น๐ฐ๐๐น๐ฎ๐๐ผ๐ฟ ๐ง๐ฒ๐บ๐ฝ๐น๐ฎ๐๐ฒ ๐ถ๐ป ๐๐ ๐ฐ๐ฒ๐น (https://lnkd.in/gxevXDcb)
This is an ROI calculator can use it as a conceptual model for any topic you wish. This is great for communicating ROI to the executive team or board of directors.
๐ฑ. ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ ๐๐๐๐ถ๐ป๐ฒ๐๐ ๐๐ฎ๐๐ฒ ๐ง๐ฒ๐บ๐ฝ๐น๐ฎ๐๐ฒ ๐ถ๐ป ๐ฃ๐ผ๐๐ฒ๐ฟ๐ฃ๐ผ๐ถ๐ป๐ (https://lnkd.in/guKtNZBN)
This is a great template to communicate a business case when you are requesting resources or project initiatives from the executive team.
๐ฒ. ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ ๐ข๐ฟ๐ด ๐๐ต๐ฎ๐ฟ๐ ๐ถ๐ป ๐๐ ๐ฐ๐ฒ๐น (https://lnkd.in/gHK9g_Gm)
This RACI diagram is an excellent tool for assessing if your organization has the right roles assigned to the right people.
๐ณ. ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ง๐ฒ๐ฎ๐บ ๐ข๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป ๐ฆ๐๐๐๐ฒ๐บ ๐ช๐ผ๐ฟ๐ธ๐ฏ๐ผ๐ผ๐ธ (https://lnkd.in/g6MVVF49)
The Security Team Operating System is a system for leaders to run their team. It includes a guide on how to define purpose, establish values, assign roles, create rhythms of meetings and data sharing, and set goals..
๐ด. ๐ฑ ๐๐๐ฆ๐ข ๐๐ฟ๐ฐ๐ต๐ฒ๐๐๐ฝ๐ฒ๐ (https://lnkd.in/guH3vi8q)
This guide breaks down the 5 types and gives you a helpful assessment to consider how different CISO strengths fit at different types of organizations. Also includes a self assessment.
๐ต. ๐๐๐ฆ๐ข ๐๐ถ๐ฟ๐๐ ๐ต๐ฌ ๐๐ฎ๐๐ ๐๐ต๐ฒ๐ฐ๐ธ๐น๐ถ๐๐ ๐ฎ๐ป๐ฑ ๐ง๐ฒ๐บ๐ฝ๐น๐ฎ๐๐ฒ๐ (https://lnkd.in/gYHVeFaN)
This guide includes everything you need for your first 90 days on the job as a security leader.