Larry Cates Featured on Cyber Defense TV

Online Security Awareness Training

Larry Cates, CEO of Global Learning Systems (GLS), was recently featured on Cyber Defense TV in an interview with Gary Miliefsky, the publisher of Cyber Defense Magazine. In the interview, Miliefsky asked Cates, “what’s missing in so many companies today when it comes to cyber security?”

The answer according to Cates, is ongoing security awareness training that focuses on changing user behavior. While many companies offer annual or even semi-annual training, it’s not enough. Often, users believe that their individual actions don’t matter, but when it comes to cyber security, one user’s mistake can have significant consequences for the entire organization.

It’s here that the kind of training offered by GLS can make a difference. Cates emphasized that repeated training that engages the user and builds iteratively on their knowledge is key to reinforcing an organization’s human firewall. In addition to end user training, GLS also offers training targeted toward senior leaders that educates them on their responsibilities for leading a secure organization and promoting a security culture.

Miliefsky and Cates agreed that the threats are getting more complex and insidious — it takes an organization-wide effort to combat them. Everyone must be constantly on guard, since the data shows that most breaches are human-related, whether from phishing attacks, unsecured devices or insider threats. GLS advocates for a layered solution of continuous training, phish testing and assessment that enables management to measure the success of the security awareness program.

Be sure to watch the video for the entire interview and more insights from Gary Miliefsky and Larry Cates.

 
 

What Can You Do?

Contact a GLS representative to learn more about continuous learning for security awareness in your organization.

GLS Logo
Front-End Exercises
React Angular Vue.js
Cross Site Request Forgery Cross Site Request Forgery Untrusted HTML Rendering XSS
Direct Dom Manipulation XSS Direct Dom Manipulation XSS Direct Dom Manipulation XSS
Components with Known Vulnerabilities Template Concatenation Cross Site Request Forgery
Untrusted HTML Rendering XSS Sanitization Misuse XSS Untrusted Template Usage XSS
GLS Logo
OWASP Top 10 – API – 2019
ID Topic Covered in SecureDev Modules Programming Languages Available
API1:2019 Broken Object Level Authorization Broken Object Level Authorization JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
API2:2019 Broken User Authentication Broken User Authentication
API3:2019 Excessive Data Exposure Excessive Data Exposure
API4:2019 Lack of Resources & Rate Limiting Lack of Resources & Rate Limiting
API5:2019 Broken Function Level Authorization Broken Function Level Authorization
API6:2019 Mass Assignment Mass Assignment
API7:2019 Security Misconfiguration Security Misconfiguration
API8:2019 Injection Injection
API9:2019 Improper Assets Management Improper Assets Management
API10:2019 Insufficient Logging & Monitoring Insufficient Logging & Monitoring
GLS Logo
OWASP Top 10 – 2021
ID Topic Covered in SecureDev Modules Programming Languages Available
A01:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
A02:2021 Cryptographic Failures Weak Randomness
A03:2021 Injection SQL Injection Command Injection Header Injection XML Injection
A04:2021 Insecure Design User Enumeration
A05:2021 Security Misconfiguration Leftover Debug Code
A06:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation
A07:2021 Vulnerable and Outdated Components Session Fixation Forced Browsing
A08:2021 Software and Data Integrity Failures Reflected XSS
Forced Browsing
Stored Cross-Site Scripting
Insecure URL Redirect
Clickjacking
Directory Traversal
DOM XSS
Cross-site Request Forgery
A09:2021 Security Logging and Monitoring Failures PII Data in URL
Token Exposure in URL
A10:2021 Server-Side Request Forgery (SSRF) Server-Side Request Forgery
GLS Logo

Your download is complete!

Need more training?