Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

How To Get More Involved In The IT Security Community

Dark Reading Radio offers tips on how to network with your IT security peers, learn more about the industry and the profession, and participate in community outreach

Dark Reading has been on the Web for almost nine years now, and one of the things that has impressed us about IT security professionals is how much they care. They take pride in protecting their users and their organization's data, and they take it personally when their systems are breached. They reach out and talk to each other to commiserate and solve problems. They seek to educate others on the threats they see, whether those others are their users, senior citizens, or elementary school kids.

With so many passionate professionals in the industry, the information security arena offers a plethora of opportunities to network with your peers, work together on industry-wide initiatives, and educate users on new threats and Internet safety. On Wednesday Dark Reading Radio presented a live broadcast discussion with suggestions and insights on these opportunities and how you can get involved in them.

On the Dark Reading Radio show, Senior Editor Sara Peters and I spoke with Jennifer Minella and Joshua Corman, two of the IT security community's most well-known professional leaders, both of whom are involved in multiple initiatives that promote professional association as well as community outreach. We discussed trade associations such as (ISC)2, community initiatives such as I Am the Cavalry, and many other opportunities to network with your peers and advance the industry's message to end users and business leaders. You'll also have a chance to check out an online chat, where Jennifer, Joshua and others shared ways that security pros can get more involved to help build the community and advance their own careers.

If you're looking for ways to get more involved in your profession and the information security community, or if you are involved in an industry group that you'd like to chat about with others, Wednesday's show is for you. Register now -- and you can listen to the recorded show anytime afterward via the Dark Reading Radio archives. 

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/20/2015 | 8:55:56 AM
Re: Archived?
Yep! You have to register to access the radio show audio.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/20/2015 | 8:48:46 AM
Re: Archived?
Thanks Marilyn. I will defintely listen to it. It asks me to register, is this mandatory to hear the archive? Thanks,
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/19/2015 | 9:39:36 AM
Re: Archived?
It was an excellent broadcast, Ryan. Here's the link to the archive. It's defintely worth a listen and the chat thread has some great nuggets in it, too.  
av8r1s2fly
50%
50%
av8r1s2fly,
User Rank: Apprentice
2/18/2015 | 2:42:11 PM
Re: How to connect with your peers
Looks interesting. Thanks for sharing!
LimorE414
75%
25%
LimorE414,
User Rank: Apprentice
2/18/2015 | 2:33:18 PM
How to connect with your peers
The answer is actually simple - go to www.peerlyst.com where 17K+ security professionals can stay on top of new informaiton without any vendor spam (just follow the stuff you care about, and stop following what gets boring), collaborate with peers, exchange content, send private messages, and get useful guides without the need to fill forms or get spammed. We are an ad-free, hassle-free site, where value is higher than noise. You can find experts for specific topics and products, get and share reviews, and get security perks. The CISOs of Airbnb, Gap, Neiman Markus, Citibank, Visa, Lockheed Marten, Aetna and many more are already there. You? 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/18/2015 | 2:14:15 PM
Archived?
I was not able to make this time. Was the broadcast archived?
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/27/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8603
PUBLISHED: 2020-05-27
A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or ...
CVE-2020-8604
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations.
CVE-2020-8605
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.
CVE-2020-8606
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.
CVE-2020-11075
PUBLISHED: 2020-05-27
In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a...