You will prepare to stay up-to-date on the latest cybersecurity trends and explore how to engage with the security community.
Learning Objectives
- Identify reliable sources within the security community.
- Use reliable sources to remain current on the latest security threats, risks, vulnerabilities, and tools.
- Determine opportunities to become engaged with the security community.
- Determine ways to establish and advance a career in security, by engaging with the security community.
Reliable sources go a long way
Video: Welcome to module 4
Hi everyone, Emily from Google security education here! We’re nearing the end of this incredible journey through incident detection, stakeholder communication, and more. But the learning doesn’t stop! Get ready for:
- Reliable security resources: Learn where to stay updated on the latest threats, risks, and tools.
- Engaging with the security community: Discover ways to network and connect with fellow security professionals.
- Career building in security: Explore strategies for finding jobs, crafting your resume, and acing interviews.
Buckle up, future security champions! The final lessons are packed with valuable resources and guidance for your career path.
Welcome back! I’m Emily, and I’ve been working in security education
at Google for nearly nine years. My team works closely with our remarkable
security experts to craft innovative and engaging educational solutions for our workforce to keep
security at the forefront. I’ll be your instructor for the remainder of the course to discuss
important career-related topics, such as
how to engage with the security community, find jobs in the security field, create a
resume, and navigate the interview process. We’re approaching the end
of the certificate program, what an incredible journey it’s been so
far. We’ve discussed a lot up to this point,
including incident detection and escalation, and the roles that stakeholders
play in protecting an organization. We’ve also explored the sensitive nature
of the communications we share and strategies for conveying critical
information to stakeholders. But does the learning stop now that we’re
approaching the end of the program? Absolutely not! In the following videos,
we’ll identify reliable security resources you can use to stay
up-to-date on security news and trends. Then, we’ll share some ways to become
involved with the security community. We’ll end with a discussion
about how to establish and advance a career in security. Coming up, we’ll highlight some great
resources to help you stay current on what’s happening in the security industry.
Video: Helpful cybersecurity resources
Staying sharp in a dynamic field:
- Security’s constant evolution demands ongoing learning.
- OWASP Top 10 updates exemplify the need for continuous education.
- Staying informed puts you ahead of the curve in job applications.
Reliable resources for your security toolkit:
- CSO Online: News, analysis, and research on diverse security topics.
- Krebs on Security: In-depth blog by Brian Krebs, covering security news and investigations.
- Dark Reading: Popular website for security professionals, focusing on various security areas like analytics, mobile, and IoT.
Embrace lifelong learning to thrive in the ever-changing world of security.
Next: Engaging with the security community and career advancement strategies.
As we approach the
end of our program, it’s important to start
thinking about ways to engage with the
security community. As the industry evolves, it’s essential to
stay up-to-date on the latest security
trends and news. Let’s discuss a
few good resources for you to review periodically. What excites me about
the security profession is the constant evolution
of the industry. Take the OWASP top
10 for example. Earlier in the program, we discussed the
fact that this is a globally recognized standard awareness document that lists the top 10 most
critical security risks to web applications. This list is updated
every three to four years, so it’s a great example of the evolving nature
of the field. Continuing your security
education beyond this certificate program
will help you stand out to hiring managers
and could give you an extra edge over
other candidates because it shows your
willingness to remain current on what’s
happening in the industry. A few well-known security
websites and blogs to get you started are CSO Online, Krebs on Security,
and Dark Reading. The CSO Online site
provides news, analysis, and research on various security and
risk management topics. Many CSOs view this site
for tips and ideas. It would be great
for you to review this publication
every now and then. Krebs on Security is an
in-depth security blog created by former Washington
Post reporter, Brian Krebs. This blog covers
security news and investigations into
various cyber attacks. Accessing the Krebs blog
is a good way to stay up-to-date on the
latest security news and happenings around the world. Dark Reading is a
popular website for security professionals. This site provides
information about various security topics like analytics and
application security, mobile and cloud security, as well as the Internet
of Things, IOT. Security is a constantly
evolving industry. As professionals in security, we must evolve with it by
seeking out new information. Be sure to explore a few of the websites and
blogs we discussed in this video to stay up-to-date with what’s
happening in the industry. Coming up, we’ll
discuss how to become engaged with the
security community and ways to establish and advance your career in security.
Bye for now.
Reading: Strategies for engaging with the cybersecurity community
Reading
You have learned a lot about the security field, from the origins of security and its importance to organizations around the world to recognizing security incidents and communicating with stakeholders.
Security is a rapidly evolving industry, so it’s important to stay up-to-date on the latest news and trends. This reading will focus on how to stay engaged with the cybersecurity community after completing this program.
Security organizations and conferences
Attending security conferences and joining organizations gives you the opportunity to gain knowledge from seasoned professionals who are constantly seeking out new ways to improve on their security strategies and techniques.
Find the right organization
What security organization should you join? This question depends on your specific interest in security. Are you someone who wants to focus on reacting to security incidents or preventing them from happening? Are you interested in forensic security or data logging? Do you have aspirations of being a CISO one day? It’s important to have a clear understanding of what your interests are before you narrow down your search for a cybersecurity organization or conference.
Begin the search
Once you understand what your interests are, do a web search for organizations or conferences in your area. For example, you can type in “incident response cybersecurity conferences in my area.” This search will give you a list of cybersecurity conferences focused on incident response. If you’re interested in forensic security, you can type “forensic security organizations in my area” or a similar phrase into your web search engine. No matter what your interests are, you can do a web search online to find a cybersecurity organization or conference focused on that area.
Use social media
Social media is another great way to find cybersecurity organizations or conferences. LinkedIn®, for example, is a social media platform that connects business professionals with one another. You can use LinkedIn® to find security groups or organizations to join. In the LinkedIn® search bar, you can try search queries such as:
- “Incident response cybersecurity groups”
- “Organizations for cybersecurity analysts”
Be aware of social engineering
While social media is a good way to connect with other professionals in the security industry, it’s also important to be mindful that hackers use social media to trick users into giving up private information. You’ve previously learned that social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. To protect yourself from social engineering when using social media to find resources, always remember not to click on unexpected links or attachments sent from unfamiliar users on social media.
Mailing lists for security
Another great way to stay connected with the security industry is to sign up for different cybersecurity mailing lists. These mailing lists send out information periodically on various security topics. The Cybersecurity & Infrastructure Security Agency (CISA) offers two cybersecurity mailing lists for you to join:
- A list focused on security threat information, best practices for cybersecurity, and analysis from CISA’s domestic and international security partners
- A list providing weekly summaries of new vulnerabilities that might pose a risk to an organization’s network
Key takeaways
Attackers are always developing new ways to compromise corporate and personal data from users. Cybersecurity organizations and conferences are a great way for security professionals to stay up-to-date on the latest news, tools, and trends in the industry. Be sure to find organizations that align with your security interests.
Video: Victoria: Continue your learning journey
Summary: Victoria’s Journey into Cybersecurity
- Non-traditional background: Biology major Victoria overcame initial resume apprehension due to her non-computer science background.
- Diversity’s advantage: Victoria’s team thrives on diverse perspectives, with new approaches coming from fresh eyes.
- Lifelong learning: Keeping up with a fast-changing field is crucial, through courses, certifications, and industry news.
- Connecting with community: BSides conferences offer local networking opportunities for deeper industry interaction.
- No pressure to know it all: Embrace collaboration and teamwork, acknowledging that no one knows everything about security.
- Dynamic and exciting: Enjoy the constant evolution and daily challenges of a security career.
Victoria’s story offers valuable insights for aspiring security professionals, highlighting the importance of continuous learning, community engagement, and embracing the dynamic nature of the field.
I’m Victoria,
I’m a security engineer at Google. When I first applied for
a cybersecurity job, I felt overwhelmed. I was not a traditionally educated
in computer science applicant, I actually majored in biology. So anytime a recruiter saw my resume,
I would kind of get this little like fear that they would see that bio major and
say, why are you even applying? And just immediately disregard my resume. I would consider the team that
I work on to be very diverse. We have a lot of different people
from different backgrounds. One of the benefits that I feel from
having a diverse team is that you can have these different
perspectives on a problem. That if all of you had
the same background for, you might not come up
with this new solution. Having someone that’s new to the team,
maybe new to the industry, and having that perspective can really help to
make things more accessible for everyone. It’s important to continue to learn in
the field of cybersecurity because things change all the time. What was once a big threat a few years ago
might not be the same as it is for today. Trying to keep pace with how things
are changing all the time is something that is a core
part of my job role. To support my continued education
in security, I take courses, try to get certificates if I can along the
way, but a lot of it is just keeping up on current industry news, whether that be
a new blog post about a breach that has happened or a detailed analysis of
a new malware that has been released. Try to keep at least
a surface level knowledge of the different trends in the industry. I often go to BSides Conferences. These are smaller and
locally organized conferences. So you have more of a chance to interact
with your local security community, which is something you wouldn’t get at a huge
conference like, say, DEFCON or Black hat. Meeting people locally is a great way
to see what’s out there in your area, and meet other folks that are local
that you can talk to more consistently, that are also interested in security. Before I got into my role, I wish that I knew that it was okay
that you don’t know everything. You don’t have to know everything. You have teammates and other people that
can help you with areas that you’re weak in, so don’t feel stressed if you don’t
know everything there is about security, because no one does. Working in security is a lot of fun. A lot of things can happen. It’s never the same day to day. So if you like things that are dynamic and
always changing, then security is the right field for you.
Reading: Activity: Explore cybersecurity organizations
Reading
Completed Exemplar
To review the exemplar for this course item, click the following link and select Use Template.
Link to exemplar: Security organization worksheet
Assessment of Exemplar
Compare the exemplar to your completed security organization worksheet. Review your work using each of the criteria in the exemplar. What did you do well? Where can you improve? Use your answers to these questions to guide you as you continue to progress through the course.
Note: The exemplar represents one possible way to complete the activity. Yours will likely differ in certain ways. What’s important is that you’re able to identify what your interests are in security and match those interests with the appropriate organization that focuses on your interests in security.
The exemplar details specific areas in cybersecurity that may be of interest to an individual who is interested in cloud computing, data protection, and incident response. It also lists three specific security organizations that an individual with these interests can join. Both the types of interest in security and the chosen security organization may differ from what you may find appropriate to your situation. However, the important concept to keep in mind is aligning your interests in security with those of a security organization that focuses on the same topics. For example, if you’re interested in incident response, it would be a good idea to find a security organization that focuses on various incident response strategies, concepts, and objectives.
There are an endless amount of security organizations you can be a part of. Finding the right one depends on your specific interests within cybersecurity!
Key Takeaways
Security organizations are a great way to stay engaged with the security community. Doing so helps you to meet other security professionals, learn security strategies, tips, and other information that can be used in your roles as an analyst.
Build your cybersecurity network
Video: Engage with the cybersecurity community in a meaningful way
Building Your Security Career Ladder: Connecting with the Community
Leveraging Social Media:
- Follow industry leaders: Learn from CISOs and security experts by reading their posts and interviews.
- Connect with fellow analysts: Find and connect with security professionals on LinkedIn®, using targeted search terms and sending personalized connection requests.
- Join relevant groups and events: Find groups and online events about your area of interest within cybersecurity.
Beyond Social Media:
- Seek out security associations: Research and join industry associations aligned with your career goals.
Remember:
- Be mindful of online information sharing, especially on social media.
- LinkedIn® is ideal for professional networking within the security field.
Actionable steps:
- Follow a CISO on LinkedIn®
- Connect with security analysts
- Search for cybersecurity organizations to join
Take the initiative to connect with the security community and climb your career ladder!
Building Your Security Career Ladder: Connecting with the Community
Welcome, aspiring security champions! This tutorial equips you with the strategies to build a robust network within the vibrant security community, propelling your career growth. Remember, a strong foundation of connections can open doors to valuable opportunities, mentorships, and career-defining roles.
The Power of Community:
Imagine a vast jungle gym of knowledge and support, teeming with experienced security professionals. That’s the essence of the security community. By actively engaging with its members, you gain:
- Exposure to Cutting-Edge Trends: Stay ahead of the curve by learning from industry leaders and pioneers.
- Mentorship and Guidance: Seek advice and support from seasoned professionals who have walked the path before you.
- Collaboration and Knowledge Sharing: Bounce ideas off peers, brainstorm solutions, and learn from diverse perspectives.
- Job Opportunities: Network with potential employers and discover hidden gems through community connections.
Building Your Network Ladder:
Level 1: Social Media Savvy:
- Follow the Trailblazers: Identify and follow CISOs, security researchers, and thought leaders on platforms like LinkedIn® and Twitter. Engage with their content, ask insightful questions, and participate in discussions.
- Connect with Your Tribe: Search for security analyst groups and communities on LinkedIn® and Facebook. These platforms offer excellent opportunities to connect with like-minded individuals, share experiences, and learn from each other.
- Join the Conversation: Actively participate in online discussions, webinars, and conferences related to your area of interest within cybersecurity. Showcase your knowledge, ask questions, and build your online presence.
Level 2: Beyond the Screen:
- Seek Out Associations: Research and join professional cybersecurity associations aligned with your career goals. These organizations often host events, workshops, and networking opportunities that connect you with industry experts and potential employers.
- Volunteer Your Expertise: Offer your skills and knowledge to volunteer projects within the community. This could involve contributing to open-source security initiatives, mentoring junior professionals, or speaking at security meetups.
- Attend Industry Events: Immerse yourself in the vibrant atmosphere of security conferences, hackathons, and meetups. These events provide invaluable networking opportunities, allow you to learn from industry leaders, and showcase your skills to potential employers.
Level 3: Building Lasting Connections:
- Nurture Relationships: Go beyond initial introductions. Engage in meaningful conversations, offer help and support to others, and actively build genuine connections with individuals within the community.
- Seek Mentorship: Identify experienced professionals you admire and approach them for mentorship. Express your interest in learning from their experience and seek guidance on your career path.
- Become a Contributor: Share your knowledge and expertise by writing blog posts, presenting at conferences, or even starting your own security-focused podcast or YouTube channel.
Remember:
- Authenticity is Key: Be genuine and transparent in your interactions with the community. People connect with those who are true to themselves and passionate about security.
- Give Back to the Community: Actively contribute to the community by sharing your knowledge, helping others, and supporting initiatives that advance the field.
- Continuous Learning: The security landscape is ever-evolving. Stay committed to ongoing learning and skill development to remain valuable and relevant within the community.
By strategically building your network within the security community, you open doors to a world of possibilities. Embrace the power of connection, nurture relationships, and watch your career ladder reach new heights!
Additional Resources:
- SANS Institute: https://www.sans.org/
- OWASP: https://owasp.org/
- International Council on E-Commerce Consultants (EC-Council): https://www.eccouncil.org/
- Black Hat: https://www.blackhat.com/
- DEF CON: https://www.blackhat.com/us-23/defcon.html
Start climbing your security career ladder today! Build your network, embrace the community, and let your passion for security guide your مسیر professional journey.
Earlier we discussed the importance of
staying up-to-date on security trends and news. In this video, we’re going to share ways
to establish and advance your career in security by connecting with people
who are already in the industry. Social media is a great way to connect
to other security professionals in the industry. However, it’s important to be mindful of
the information you share on your social media page and when responding to
messages from people you don’t know. With that in mind, let’s discuss ways
to effectively use social media to establish or advance your security career. One way to use social
media is to follow, or read the posts of, leaders
in the security industry. Chief Information Security Officers, for
example, are great individuals to follow. They often post interviews they’ve
done in the security space and share articles they’ve read or
contributed to. Here’s a question you
might be asking yourself: How can I find CISOs to
follow on social media? The best way would be to conduct an
internet search for the name of the CISO of a popular organization or an organization
you’re interested in working for. After you find their name, you can simply
go to a social media site to look them up. Ideally, you want to use LinkedIn® when
following security professionals. That’s because the LinkedIn® platform
focuses on connecting professionals with other professionals in the same or
similar field. Another way to use social
media to establish or advance your career in the security
industry is to connect with other security analysts currently employed in the field. On social networks like LinkedIn®,
you can find security professionals by searching for cybersecurity
analysts, or a similar search term, then filtering for people and people
who talk about #cybersecurity. Once you’ve found other professionals
you’d like to connect with, you can send a connection request
with a brief comment such as: Hi, I’d like to connect to
learn more about why you became interested in security and
your experiences as an analyst. Additionally, you can set your
filter to locate events and groups that focus on security
related topics that interest you. While social media platforms
like LinkedIn® are excellent for connecting with professionals, some people are more comfortable with
being active on social media than others. For those of us who aren’t very active
on social media, there are other ways to connect with security professionals or
find mentors in the industry. Joining different security associations
is a good way to connect with others. There are many associations out there, so you’re going to have to do a little bit of
research to find the best ones for you. Here’s a tip! In your internet
search engine, type: cybersecurity industry associations. This search term will populate
a variety of different associations, so be sure to select ones that align
with your professional goals. Now that we’ve discussed ways to
engage with the security community, consider following a CISO on LinkedIn®,
connecting with other analysts, or searching for
cybersecurity organizations to join. That’s all for now.
I’ll meet you in the next video!
Reading: Connect with other cybersecurity professionals
Reading
You’ve learned the importance of staying engaged with the cybersecurity community after completing this certificate program. The security industry is always evolving, so it’s important that security professionals continue to learn about the field.
This reading will focus on providing more tips to help you stay engaged with the security community and advance your career by engaging with the cybersecurity community.
LinkedIn® with CISOs
Earlier in the program, you learned about Chief Information Security Officers, also known as CISOs. It’s their job to be up-to-date on every aspect of security, including all of the latest trends and news in the security world. With this in mind, it’s a great idea to follow CISOs on LinkedIn® professional networking services. When you follow a CISO on social media, you’ll have an opportunity to discover the kinds of information they share with their audience. That information might provide you with useful tips and relevant news. Staying informed about security news and trends can help progress your cybersecurity career because it helps sharpen your security mindset.
Finding other security professionals on LinkedIn®
Whether you’d like to connect with other entry-level analysts or more seasoned professionals, LinkedIn® is a great way to connect with others. When connecting with others, it’s important to send a well-written message. This message can help the person understand your intentions. It also helps people determine that you’re not a scammer looking to exploit them. Here are a few tips to help you write your first message in a way that engages and interests the recipient:
- Use a conversational tone.
- Provide a clear reason for wanting to connect.
- Avoid spelling and grammatical errors.
Here is an example of an effective LinkedIn® message to send to a security professional:
“Hi, Tim. I recently completed the Google Cybersecurity Certificate program, and I’d like to connect with other security professionals. It seems like you have a lot of experience in the security industry that I can learn from. Let’s keep in touch!”
This example provides a clear reason for why you want to connect with this person and is presented in a conversational tone. You also did not give the impression that you are a scammer by asking the person to do something suspicious to connect with you, like downloading an unusual file attachment.
Key takeaways
Attackers are always developing new ways to compromise corporate and personal data. Connecting with other cybersecurity professionals on social media is a great way to stay ahead of the latest trends in security. CISOs are great professionals to connect with because they are responsible for all aspects of an organization’s security. Because of that, CISOs tend to share important security tips, news, and trends on their social media pages that could be valuable to you as a newcomer to industry.
Video: Sarah: Network in the cybersecurity community
Sarah’s Cybersecurity Journey: From Newbie to Leader
Finding her tribe: Sarah, initially overwhelmed by cybersecurity, discovered the supportive haven of “Women in Cybersecurity.” Through their webinars, forums, and conferences, she gained knowledge and confidence.
Beyond degrees: Sarah’s lack of traditional qualifications didn’t hold her back. Her passion, networking, and exploration of personal interests paved her path to success and advancement.
A welcoming community: Sarah emphasizes that cybersecurity welcomes diverse backgrounds and experiences, urging everyone to find their space and thrive.
Networking for success: Sarah highlights the importance of connecting with peers for motivation, knowledge sharing, and potential career opportunities. BSides conferences are mentioned as fun and accessible entry points for networking.
Embrace the unknown: Sarah reminds us that nobody knows everything. Stepping into the field without all the answers is perfectly acceptable, and your unique value will be recognized.
Sarah’s story is a testament to the welcoming and rewarding nature of the cybersecurity community. Anyone with passion and dedication can find their place and make a meaningful contribution.
[MUSIC] Hi everyone, I’m Sarah and
I am a senior program manager on Google’s privacy safety and
security engineering team. One of the communities I’m most
involved in is a group called Women in Cybersecurity. And so I found that community really
helpful to me when I first joined because, I felt super new and slightly overwhelmed. I listened to a lot of their webinars, I kind of look in on
their forum board, now I always attend their conference and
actually I just joined their board, which I’m super excited about. One of the things that I find
most exciting is that ability to be within cybersecurity
without this long history. I don’t have a computer science degree, I
don’t have a masters, I don’t have a PhD. But through networking and figuring
out where my areas of interest lie, I actually was able to get into this field
and grow and advance within this field. I’ve really found that, it is a welcoming
community that is looking and needs more people to be a part of it. There’s a huge range of people that are
coming into this again with the big wide range of experiences, and
I think everyone has found or is exploring what their passions
and the areas they want to dig in. Networking is really important to be able
to meet peers who might be at the same stage as you or people who might
have hiring opportunities. I definitely recommend connecting with
your peers in the certificate program, it’s a great form of motivation for
yourself and to motivate others. Having these points where you’re either
talking about the specific content or just doing a check in is
going to be really helpful for you to continue through
the course program and to help others continue through
the course program as well. There’s also the series of conferences
that exist called BSides. So these are super informal security
conferences that take place in communities around the world.
Many also have virtual components. They’re kind of a fun
place to meet people. A big piece of advice is,
to not let yourself get overwhelmed, and don’t feel nervous that you don’t know
all the answers, because you know what, nobody knows all the answers. It’s okay to come into this with not
a ton of background in computer science, not a ton of background in tech and still,
you will bring value to the field.
Practice Quiz: Test your knowledge: Build your cybersecurity network
Which of the following methods can be used to build your cybersecurity network? Select three answers.
Join cybersecurity associations. Attend cybersecurity conferences. Connect with security professionals using social media.
Connecting with security professionals using social media, attending cybersecurity conferences, and joining cybersecurity associations are methods that can be used to build your cybersecurity network.
Fill in the blank: A security professional can sign up for _____ to keep up with key trends and topics in the industry.
security mailing lists
A security professional can sign up for security mailing lists to keep up with key trends and topics in the industry.
Which of the following strategies can an aspiring security analyst use to connect with security professionals? Select two answers.
- Join security associations.
- Leverage professional social media sites such as LinkedIn®.
Aspiring security analysts can connect with other security professionals by leveraging professional social media sites such as LinkedIn® and joining security associations.
How can engaging with the security community help newcomers establish a security career? Select two answers.
- By staying informed about the latest security news
- By connecting with other security professionals
Engaging with the security community helps newcomers establish a security career by staying informed about the latest security news and connecting with other security professionals.
Review: Engage with the cybersecurity community
Video: Wrap-up
Building Your Security Future: Review and Exciting Next Steps
Congratulations! You’ve mastered staying informed, engaging with the community, and even laying the groundwork for your cybersecurity career.
Here’s a quick recap:
- Reliable resources: You have access to top-notch security blogs, websites, and conferences to stay ahead of the curve.
- Community connections: You learned how to use social media, professional groups, and events to connect with other security pros and find mentors.
- Career advancement: You explored strategies like following CISOs, joining associations, and building your online presence to impress potential employers.
We’re almost there! Get ready for the final act:
- Job search prep: Learn how to craft a killer resume, ace interviews, and navigate the application process like a pro.
So buckle up, future security rockstars! The next section will equip you with the tools and confidence to land your dream job in cybersecurity. Onward and upward!
Great job! Now you’ve had an opportunity to learn about
different ways to stay engaged with the security community. Let’s take a moment to
review what we’ve covered. First, we identified
reliable security resources. Then, we discussed different ways to
engage with the security community. We also explored the usefulness of social
media to connect with other security professionals and stay informed
about current topics of interest. Finally, we shared ways to establish
and advance a career in security, including following a CISO on social media
or joining a professional organization. We’ve come a long way in this journey. You should be proud of your progress and
how far you’ve come. I’m certainly proud of you. In the final section of this course,
we’ll take the time to prepare you for the job search and interviewing process. How exciting is that!?
Reading: Glossary terms from module 4
Terms and definitions from Course 8, Module 4
OWASP Top 10: A globally recognized standard awareness document that lists the top 10 most critical security risks to web applications
Quiz: Weekly challenge 4
Fill in the blank: The _____ is a standard awareness document that lists the top 10 most critical security risks to web applications.
OWASP
Which well-known security website was created by former Washington Post reporter, Brian Krebs?
Krebs on Security
Fill in the blank: _____ provides news, analysis, and research on various security and risk management topics.
CSO Online
Which security resource provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT)?
Dark Reading
You’ve recently completed the Google Cybersecurity Certificate and decide it’s time to connect with other security professionals. Which of the following is a great way to connect with security professionals?
Searching for them on social media
You’ve recently completed the Google Cybersecurity Certificate and decide it’s time to connect with other security professionals. Which of the following is a great way to connect with security professionals on social media? Select two answers.
- Read and comment on the social media posts of leaders in the security industry
- Follow leaders in the security industry
Which of the following is a good first step to finding a CISO to follow on social media?
Conduct an internet search for the name of the CISO of an organization
What is a good way to find other security analysts in the industry to follow on social media?
Search for cybersecurity analysts on LinkedIn®
What is a great way to connect with security professionals or find mentors in the security industry without using social media?
Join different security associations
What is the best search term to use to find a security organization to join?
“Cybersecurity industry associations”