Security Awareness Blog: Author - lspitzner

CyberSmart Parents Workshop in San Francisco

As some of you know, the folks at RSA Conference have a philanthropic program called CyberSmart Kids. Started last year, the goal of this program is to leverage the 35,000+ cyber security professionals that attend RSA every year and help secure today's online kids. Called "I'm In R U", if every one of us attending … Continue reading CyberSmart Parents Workshop in San Francisco


A Primer on Risk and Security Awareness

We talk alot about human risk in the world of security awareness, but rarely have I seen it defined, especially at a high level that anyone can understand. As such, I wanted to take a step back and give you a simple overview of what exactly risk is, and the role security awareness plays in … Continue reading A Primer on Risk and Security Awareness


US Security Awareness Summit - Call for Presentations

Folks, planning has begun for the 3rd annual US Security Awareness Summit to be held 03/04 August in San Francisco. This is THE event to network and learn from your peers on how to take your security awareness program to the next level. Due to demand, this year's summit has been expanded to two days, … Continue reading US Security Awareness Summit - Call for Presentations


Ukrainian Power Grid Attack -- Not Hype

Editor's Note: This Guest Blog postis byTed Gutierrez, a member of the SANSICS & NERC CIP team. When reports of a December 23, 2015 Ukrainian power outage linked to a coordinated malware attack first began to surface, I was skeptical. I'd previously written about vulnerabilities inherent in the US electric grid but had cautioned against … Continue reading Ukrainian Power Grid Attack -- Not Hype


Leveraging the Human to Break the Cyber Kill Chain

A kill chain is a term used by the US military to describe the steps or stages an adversary takes to attack you. The fascinating paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains by Lockheed Martin applies the same concept but to cyber security, a Cyber Kill Chain. … Continue reading Leveraging the Human to Break the Cyber Kill Chain