Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.
Our resources

When AI Goes Rogue: API Security in the Age of AI Agents | Guest Sam Chehab

Why Medical Device Security Needs Transparency: The SBOM Revolution | Guest Ken Zalevsky

From CIA to CISO: AI security predictions and career strategies | Guest Ross Young

The ransomware paper: Real-life insights and predictions from the trenches

The ransomware paper: Real-life insights and predictions from the trenches

How to hack an API: A walkthrough | Guest Katie Paxton-Fear

Security+: How to explain threat actor types and attributes

Exploring food production cybersecurity threats | Guest Jonathan Braley

Cyber resiliency and national defense | Guest Georgianna "George" Shea

Why is Log4J still so successful? | Guest Etay Maor

Cybersecurity’s role in U.S. foreign relations | Guest Tom Siu

Unlocking data privacy: Insights from the data diva | Guest Debbie Reynolds

Revolutionizing digital identity, data privacy and data security

OT cybersecurity jobs are everywhere, so why is nobody taking them?

MGM Grand breach: How attackers got in and what it means for security

What's it like to be the CISO for the state of Connecticut?

Careers in operational technology: What does a security risk assessor do?

How to get started in industrial control systems cybersecurity

Working as a CIO and the challenges of endpoint security

Current manufacturing security issues and conversations
Modern industrial control system security issues | Guest Thomas Pace

A career in dental cybersecurity? Drilling down into this unique role

Are remote workers more security-savvy than on-premises? | Guest Joseph Nwanpka

45 billion cyberattacks a day?! Media myths and working in cybersecurity