Four Data Points Every CISO Needs

Four Data Points Every CISO Needs From Their Security Training Provider

Four Data Points Every CISO Needs From Their Security Training Provider 1200 628 N2K

Most security training providers have basic analytics for performance and attendance, and they call it data. But how do they…

read more
What you need to know before selecting a cybersecurity training partner

What To Know Before Selecting A Cybersecurity Training Provider

What To Know Before Selecting A Cybersecurity Training Provider 1200 628 N2K

N2K research shows that some security leaders believe enterprise cybersecurity training is time-consuming, not always relevant to the company’s needs,…

read more
Role-Based vs Certification Training: Which is best for my team?

Cybersecurity Role-Based vs. Certification Training: Which is best for my team?

Cybersecurity Role-Based vs. Certification Training: Which is best for my team? 1200 628 N2K

The number of enterprise cybersecurity training providers and format options can be overwhelming to choose from. Many providers offer certification…

read more

N2K and CEO Simone Petrella Named Winners of Global InfoSec Awards at RSA 2022

N2K and CEO Simone Petrella Named Winners of Global InfoSec Awards at RSA 2022 1200 628 N2K

N2K has been honored with two Global Infosec Awards Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine.…

read more

Security’s Seat at the Table: SEC’s New Proposal for Cybersecurity Risk Management for Boards

Security’s Seat at the Table: SEC’s New Proposal for Cybersecurity Risk Management for Boards 1200 628 N2K

Cybersecurity professionals are on the cutting edge of new cyber attack tactics, techniques, and procedures.  After all, the landscape changes…

read more
N2K Blog: FAQs about Vulnerability Assessment & Management

Frequently Asked Questions about Vulnerability Assessment & Management

Frequently Asked Questions about Vulnerability Assessment & Management 1200 628 N2K

What is Vulnerability Assessment and Management? The common misconception is it’s only about vulnerability scanning and penetration tests. Vulnerability assessment…

read more
N2K Blog: 5 scenarios that waste your cybersecurity training budget

Five scenarios that waste your cybersecurity training budget

Five scenarios that waste your cybersecurity training budget 1200 628 N2K

Some training methods may be costing you more than you realize.

read more
N2K Blog - Can Data Solve Cyber's Diversity Problem?

Can data solve cyber’s diversity problem?

Can data solve cyber’s diversity problem? 1024 585 N2K

Written by Simone Petrella The Aspen Institute’s September 2021 report addresses diversity, equity, and inclusion in the field of cybersecurity.…

read more
N2K Blog - Expanding Cloud Services don't overcast the need for cloud security

Expanding Cloud Services Don’t Overcast Need for Cloud Security

Expanding Cloud Services Don’t Overcast Need for Cloud Security 1200 628 N2K

Written by George Monsalvatge and Joshua Hester As more and more organizations are integrating cloud services within their infrastructure, ensuring…

read more
Thoughts on the White House Cyber Meeting by N2K CEO Simone Petrella

Thoughts on the White House Cyber Meeting

Thoughts on the White House Cyber Meeting 1400 800 N2K

Written by Simone Petrella The cybersecurity workforce finally got a seat at the table…but it still needs a voice. Last…

read more