“We need these changes now; we are out of time to reoptimize our forces to meet the strategic challenges in a time of Great Power Competition.” - Secretary of the Air Force Frank Kendall
We are at an historical inflection point in the AF...elevating AFCYBER to a standalone service component command and introducing Warrant Officers for our critical Cyber and IT workroles.
There are many ways to serve...choose one and join the 67th Cyberspace Wing
Follow 67th Cyberspace Wing for critical updates as they unfold. We will be moving FAST.
#gunslingernation#greatplacetoserve#lightemup
United States Air Force made big announcements for Air Force cyber yesterday at #AFAColorado. One of which is to re-introduce warrant officer tracks for IT and cyber career fields!
We need technical tracks because we are in a race for technical superiority with a formidable pacing challenge. Establishing robust and effective pathways, such as technical tracks, for individuals in specialized critical areas is vital to maintaining the competitive edge we need.
If you are looking for a technical career in cyber, now is the time to look at working with America's PREMIER cyber wing!
This Veterans Day, we celebrate, honor, and thank all Veterans that have served and sacrificed for our country’s freedom and safety. Are you a Veteran or know a Veteran looking to enter the cybersecurity workforce? With over 570,000 open cybersecurity positions across the U.S., veterans and those transitioning out of the military possess the knowledge, skills, and abilities needed to be successful in cyber. Explore the Cybersecurity for Veterans page below, which includes a variety of tools and resources to help Veterans begin/advance their career in cybersecurity.
https://lnkd.in/gdkYamJZ#Cybersecurity#Veterans#VeteransInCyber#TalPoint
🔐It's Cyber Security Awareness month and the latest episode of How Did You Get That Job? has a really interesting conversation with Neil Khatod, who recently left the US army having most recently served as COO of US Army Cyber Command. 🎧
Some great insights, not just on Cyber defence but also leadership and humility needed to operate at that level
CISO by Day, Your Mentor for Life 🏆| CISSP-ISSAP| CGRC| CCSP | CSSLP | CISM | CRISC | CISA | CDPSE | CIPM | CIPP/E
𝐎𝐧 𝐭𝐡𝐞 𝐨𝐜𝐜𝐚𝐬𝐢𝐨𝐧 𝐨𝐟 𝐈𝐧𝐝𝐢𝐚'𝐬 𝐈𝐧𝐝𝐞𝐩𝐞𝐧𝐝𝐞𝐧𝐜𝐞 𝐃𝐚𝐲, we explore Cybersecurity career options for Indian Armed Forces veterans: a new mission to safeguard our nation in the digital world. Dedicated to our brave soldiers—defending borders to defending bytes, your journey continues. This can be useful for those who retired and want to resume their journey in cybersecurity, even with limited funds and time.
#cybersecurity
Unlocking Ideal Neighborhoods in San Antonio! 🏡✨ From military bases to cybersecurity hubs, we've got the perfect spots for everyone. Whether it's the Northeast for military workers or the Northwest for cybersecurity jobs, find your match! 💼🌟
#realestate#realestateinvesting#passiveincome#wealth#RTRPodcast
📢CompTIA has announced eight certifications that are included in the U.S. Department of Defense’s Cyber Workforce Qualification Program.
This program aims to create, qualify and upskill a more diverse cyber workforce – including military personnel, civilian staff and government contractors – by offering them more targeted and flexible approaches and options for training and certification.
Read about it below! 👇 #cybersecurity#cyberdefense#comptia#itcertifications
Today's Two Minute Cyber Topic: Post-Incident Activities and Learning, August 25th, 2023
Today, let's discuss the concluding phase of Incident Response in #Cybersecurity🔒 - Post-Incident Activities and Learning. This phase is essential for improving future response efforts and preventing similar incidents.
You might ask, "What happens after an incident is resolved❓" Organizations need to conduct a post-incident review or "lessons learned" meeting. This meeting should analyze what happened, what was done to intervene, and what can be done better next time.
Documenting these findings is essential. This documentation should be accessible and used to update the Incident Response Plan. This cycle of learning and improving is central to evolving an organization's cybersecurity posture.
Beyond internal review, there may be legal or regulatory requirements for disclosure depending on the nature of the incident. Communicating with stakeholders and possibly reporting to regulatory bodies can be crucial steps in the post-incident phase.
Stay tuned for more in-depth knowledge on Cybersecurity this week. Remember, knowledge is power! 💪
Also, we will post a combined rollup article to the Cyber SPEAR newsletter that adds more depth to the daily topics on Friday. Subscribe to SPEAR on LinkedIn at https://lnkd.in/g5cKvYgF
Please follow Jason & Griffin to learn more about Cybersecurity!
Follow Jason: https://lnkd.in/gWxkRDVV
Follow Griffin Weaver: https://lnkd.in/gaanC4UV#InfoSec#DataProtection#DigitalSecurity#TechTalk#informationsecurity#cybersecurity#technology#careers#strategy#leadership#success#cyber#usarmy#usmarines#usmc#usairforce#airforce#usnavy#navy#uscg#coastguard#military#pilot#veterans#airlineindustry#cyber#security
Today's Two Minute Cyber Topic: Understanding Incident Response, August 21st, 2023
Today let's dive into a critical aspect of modern life – Understanding Incident Response in the realm of #Cybersecurity🔒. Incident Response is the structured approach and methodology to handle and manage the aftermath of a security breach or cyber attack. This process aims to limit the damage and reduce recovery time and costs.
You might wonder, "What constitutes an incident❓" An incident could range from a superficial malware infection to a large-scale data breach. Understanding Incident Response is crucial for organizations because it's not about "if" an incident will occur but "when." Having the skill to manage these incidents systematically can significantly lessen their impact.
By adopting an effective Incident Response strategy, organizations can address incidents in real-time and prepare for future ones. The Incident Response process typically involves six stages: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. Today, we will focus on the understanding part.
Understanding Incident Response means recognizing the importance of having a plan, knowing the threats your organization may face, and being aware of the laws and regulations that affect how you handle incidents. It also involves creating a culture that values security and training staff as the first line of defense.
Stay tuned for more in-depth knowledge on Cybersecurity this week. Remember, knowledge is power! 💪
Also, we will post a combined rollup article to the Cyber SPEAR newsletter that adds more depth to the daily topics on Friday. Subscribe to SPEAR on LinkedIn at https://lnkd.in/g5cKvYgF
Please follow Jason & Griffin to learn more about Cybersecurity!
Follow Jason: https://lnkd.in/gWxkRDVV
Follow Griffin Weaver: https://lnkd.in/gaanC4UV#InfoSec#DataProtection#DigitalSecurity#TechTalk#informationsecurity#cybersecurity#technology#careers#strategy#leadership#success#cyber#usarmy#usmarines#usmc#usairforce#airforce#usnavy#navy#uscg#coastguard#military#pilot#veterans#airlineindustry#cyber#security