Remove 2015 Remove Education Remove Meeting Remove Military Remove Training
article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

My reporting trip included meetings with Michigan-based cybersecurity vendors pursuing leading-edge innovations, as well as a tour of a number of thriving public-private cybersecurity incubator and training programs. I had the chance to meet briefly with two-term Gov. It was the latter that jumped out at me. They answered, yes.

article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

In this episode of The Hacker Mind, we return to where we started in Episode One: Why is West Point -- and for that matter, others -- Training Hackers? I’m training and running the marathon to improve my health, to improve my own personal record. Vamosi: So, not everyone is in a military academy. What else is needed?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

In the moment you’ll meet someone who’s been gamifying infosec for years. Hammond: I tend to explain Capture the Flag is sort of gamified cybersecurity education. So I originally had kind of participated in cyber stakes, way back in 2015. It’s more than you might think. But first, how does he describe CTFs?

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

In the moment you’ll meet someone who’s been gamifying infosec for years. Hammond: I tend to explain Capture the Flag is sort of gamified cybersecurity education. So I originally had kind of participated in cyber stakes, way back in 2015. It’s more than you might think. But first, how does he describe CTFs?