Showing posts with label EC-Council. Show all posts
Showing posts with label EC-Council. Show all posts

Thursday, 27 November 2014

How the new Sony hack proves security isn’t taken seriously


By 


Sony Pictures was crippled this week when cybercriminals forced the shutdown of their internal systems.

Imagine getting into work on Monday morning, booting-up your PC and being greeted with this:


It feels like something out of a cheesy 90’s spy-thriller but this is the reality that Sony Pictures employees had to deal with on Monday…and are still dealing with 4 days later.

Yes, Sony’s internal network had become the next victim of cybercrime in this recent spate of hacking. It’s a clear message for organisations: invest in your cybersecurity or this could happen to you.

Warning messages threatening to release data ‘secrets’, if undisclosed demands were not met, appeared on all internal computers, preventing login. The message also displayed ‘#GOP’ – pointing to a group named Guardians of Peace.

As of Thursday morning, the network remains down on many Sony offices and according to information reportedly shared by employees, it could be down for weeks.

Hackers also targeted Twitter accounts associated with Sony Pictures, leaving the same message and calling out Sony Pictures CEO:
























You, the criminals including Michael Lynton will surely go to hell. Nobody can help you.

If that wasn’t enough, the digital image also showed Michael Lynton’s head, edited into some form of Night Of The Living Dead landscape. These hackers clearly want to capitalise on the fear they can strike into the world’s biggest businesses.

One reddit user, posted a copy of a message allegedly displayed on the hacked network. The redditor explained, “I used to work for Sony Pictures. My friend still works there and sent me this. It's on every computer all over Sony Pictures nationwide.”

The post explained how the public could gain access to the 217.6mb .ZIP file, allegedly containing lists pulled from the organisations internal network.: “These two files are the lists of secret data we have acquired from SPE,” and that “Anyone who needs the data, send an email titled To the Guardians of Peace to the following email addresses.” A list of e-mail addresses attached to anonymous email services like Yopmail and Disgard.email followed.

Reddit users jumped at the opportunity to scour the allegedly leaked filed. A thread on the breach claims that the .ZIP file contains passwords of Sony employees, copies of passports of actors associated with Sony films and masses of Outlook archival data.

How Sony responded

In the typical damage-mitigating style of big companies experiencing big problems, Sony issued a statement saying the firm is investigating the ‘IT matter.’
Well that’s a relief.

Hack me once, shame on you

Sony is no stranger to being hacked. The infamous PlayStation Network hack of 2011, in which 77 million personal details were stolen, resulted in complete outage of the service for 24 days.
At the time it was one of the largest data breaches in history and remains a black mark on the Japanese company’s reputation.

As recently as August 2014 we watched as another major attack, once again, befell the PlayStation network. The service was forced offline once more, though this time for a single day.

Could your business survive a hacking attack?

Clearly, Sony has failed to invest sufficiently in their cybersecurity and organisations must learn from their costly mistakes.

Organisations need to begin investing in professionals with the skills necessary to prevent intrusions like Sony’s from ever happening.

Qualifications like EC-Council’s Certified Ethical Hacker (CEH) are valuable to keep organisations secure. By employing or training professionals and helping them to achieve certifications like the CEH, businesses can proactively defend and prevent these crippling attacks.

Ethical hackers can conduct staged penetration tests against your business – will your defences hold up against a real hacker? Either way, you’ll get real insight into how you can improve your security and protect your organisations valuable data. After all, the techniques that Ethical hackers use are identical to those employed by cybercriminals.

The need for certified ethical hackers is real and with every data breach this point is hammered home.
20% of small and medium sized businesses have been targeted by cybercriminals in the past year, costing the global economy $500 billion annually. And it’s getting worse: reports already predict an increase in cybercrime next year.

In fact, with more advanced hacking tools, we can expect more targeted attacks on businesses small and large.

Sony’s latest breach is a strong message to businesses: invest in cybersecurity or face the consequences.  

About the Author:        
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

Thursday, 30 October 2014

Firebrand win big at EC-Council Global Awards 2014

 By 





View EC-Council Instructor Awards 2013ATC of the Year EC-Council 2012

We're delighted to announce that Firebrand Training picked up two accolades at the EC-Council Global Awards 2014Firebrand has been named EC-Council Accredited Training Centre of the Year - for a record breaking sixth year in a row!

Firebrand Instructor, Richard Millet, was also honored claiming the impressive Instructor of the Year Award. This is the second time Richard picked up an EC-Council Global Award being named in Instructor Circle of Excellence category back in 2011.

Jay Bavisi, President of EC-Council, said this of the awards:

We have some of the best training organizations representing EC-Council across the globe and they have again demonstrated the commitment to high quality training, winning them awards again this year

Picking up the Auhtorized Training Centre of the Year (Europe) and Instructor of the Year (Europe), Firebrand was selected from EC-Council's extensive Training Partner network which spans the globe with over 700 training centers across 107 countries, and a vast pool of Certified EC-Council Instructors. After meeting the extensive and stringent criteria set by the EC-Council Awards Committee, Firebrand was chosen as the best in both categories for Europe.

The Authroized Training Centre of the Year award recognizes the training centers most successful in providing top-level information security training programs, whilst the Instructor of the Year, honors the instructors who guide students to deeper understanding and enhanced skills.


Here's what President of EC-Council, Jay Bavisi had to say about Firebrand Training when we caught up with him at Hacker Halted 2012:


Author

As part of Firebrand's global marketing team, Edward actively works to serve the IT community with news, reviews and technical how to guides. Working in the industry for almost 3 years, Edward has a wide variety of experience with Microsoft Technologies including SharePoint, Windows Server and Exchange Server. Edward is an active member of the IT community contributing to a variety of tech publications including Microsoft TechNet, Channel Pro and PC Advisor.

Monday, 11 August 2014

What your cert’s worth: security salaries under scrutiny


By 
Security roles have always been in the top half of the “IT salary hierarchy” and it seems unlikely to change anytime soon. According to a recent article on Tripwire business are investing more than ever, in order to protect themselves from security threats. Of course these investments include the recruitment and/or training of capable IT security staff.

Infographic created by the University of Alabama

With IT security becoming a top priority for businesses, certifications like the CISSP, CISA or CISM are gaining even more recognition. So if you’ve got one of these acronyms next to year name, you’re off to a great start in earning a high salary. Here are some of the average salaries in the UK for jobs requiring the following IT security certs, according to ITJobswatch.com
  1. ISACA CGEIT - £45,000
  2. EC-Council CEH - £49,000
  3. EC-Council CHFI - £51,500
  4. ISACA CISM - £55,000
  5. ISACA CRISC - £55,000
  6. (ISC)2 CISSP - £55,000
  7. ISACA CISA - £55,750
  8. ISACA COBIT - £57,500
ISACA Certified in the Governance of Enterprise IT (CGEIT) - £45,000

Certified in the Governance of Enterprise IT (CGEIT) is a program designed for professionals directing, managing and supporting enterprise IT governance. Holders of CGEIT are experts in risk management, performance measurement, value delivery and the governance and management of IT. As a CGEIT, you’ll earn an average salary of £45,000.

EC-Council Certified Ethical Hacker (CEH) - £49,000

Beat a hacker, by thinking like one. With EC-Council’s Certified Ethical Hacker certification you’ll know how to defend against the latest techniques used to exploit your organisation’s vulnerabilities. The CEH stretches far beyond the field of penetration testing and into everyday application and network security. Certified Ethical Hackers on average earn around £49,000.


Image courtesy of hyena reality/freedigitalphotos.net

EC-Council Computer Hacking Forensics Investigator (CHFI) - £51,500

EC-Council’s CHFI certification teaches you the use of forensics tools, analytical techniques, and procedures involved in obtaining, maintaining, and presenting computer forensic evidence and data in a court of law. Computer Forensics experts with a CHFI can earn £51,500 on average.

ISACA Certified Information Security Manager (CISM) - £55,000

CISM by ISACA is a widely recognised credential for IT security professionals specialising in managing, developing and overseeing information security systems and for developing best security practices. CISM certified professionals have proven skills in risk management, governance and incident management as well as program development and management. Similarly to CRISC, CISM holders have good prospects of earning an average salary of £55,000 a year.

ISACA Certified in Risk and Information Systems Control (CRISC) - £55,000


ISACA’s CRISC is for experienced IT professionals working in the fields of technology risk management and Information Systems Control. CRISC-holders can manage risk design and oversee response measures, scan and monitor systems for risk, and meet their organisation's risk management strategies. The average salary offer for CRISC certified professionals is around £55,000.



Image courtesy of njaj/freedigitalphotos.net

(ISC)2 Certified Information Systems Security Professional (CISSP) - £55,000

(ISC)2’s CISSP demonstrates your expert skills in developing, guiding, and managing security standards, policies, and procedures within your organisation. The certification is considered to be one of the most prominent and prestigious security credentials out there, which is due to its rather demanding prerequisites. As a Certified Information Systems Security Professional you can be earning an average salary of £55,000.

ISACA Certified Information Systems Auditor (CISA) - £55,750

CISA is a globally renowned credential for Information Systems audit and security experts. CISA certified professionals possess the necessary skills, knowledge and expertise to identify and manage vulnerabilities and risks within their organisations, while implementing solutions to deal with them. The average salary for CISA holders is around £55,750 per annum.

ISACA Control Objectives for Information and Related Technology (COBIT) - £57,500

ISACA’s COBIT framework helps you to maximise the value of Information Technology within your organisation. With this certification under your belt, you’ll know how to achieve strategic goals and minimise risks, whilst optimising the cost of IT services. COBIT certified professionals earn an average salary of £57,500.

There you have it, the worth of some of the top security certs expressed in monetary terms. And don’t forget, the more experience you have, the closer you get to making these numbers even bigger.

About the Author:       
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

Thursday, 17 October 2013

Hacker Halted Europe Interviews - Jay Bavisi


By 


In October, EC-Council’s Hacker Halted came to Europe for the first time. Firebrand attended the conference in Reykjavik, Iceland and interviewed industry experts about the hottest topics in cyber security.

The first speaker is EC-Council’s co-founder and president Jay Bavisi, who summarises the main points of his presentation, entitled “The Cyber Security Quagmire: Finding the Panacea”.


His keynote speech compared the challenges faced by IT security companies to those faced by pharmaceutical companies. Mr Bavisi pointed out that while the pharmaceutical industry already managed to overcome diseases such as small pox through vaccinations, the IT security industry is still struggling to achieve similar success against the threats of cyberspace.


He also added that EC-Council would be launching new secure coding courses, as well as a different E|CSA & L|PT exam in 2014. The new exam will be 100% practical, requiring students to perform a penetration test on EC-Council’s virtual bank.




Make sure you check the blog regularly, as we'll post more interviews from Hacker Halted Europe 2013.

About the Author:       
Peter writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself.

Tuesday, 9 July 2013

President of EC-Council and creator of the CEH program honored by NSA Colloquium


By 

EC-Council logo
President of EC-Council, Jay Bavisi, was awarded the National Security Agency Colloquium 2013 Award for Industry Leadership.

The award is given out to only the top leaders in Cyberspace who are recognised for outstanding leadership and accomplishment in the field of Cyber Security Education and influence.

EC-Council has worked hard to continue to add more value to their collection of powerful certifications and credentials. They have continued to work with Governments and education systems all around the world to show the need for Cyber Security Education and proactive security measures.

The award followed Jay Bavisi’s recent keynote at the NSA  Colloquium in Mobile titled "The Cyber Security Quagmire: Finding the Panacea". The keynote explained the information security industry’s successes, failures, and future. He also talked about outside the box solutions that the cyber security industry can implement as they learn from the pharmaceutical industry in their fight against diseases.

Watch the keynote here:




Congratulations Jay on this great achievement.

About the Author:
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry.

Thursday, 20 June 2013

CEH v8 released!


By 



EC-Council have finally released the much awaited CEH v8, which now contains 20 of the most up-to-date hacking domains you'll need. Whether it's to strengthen the security of your company or start your own Ethical Hacking career.

The new enhancements includes: core content updates, new content flow, new concepts and attacks, the latest hacking techniques, pentesting components, and many more. Here are some of the latest updates v8 will focus on:
  • Security issues in the latest operating systems. Including Windows 8 and Windows Server 2012
  • Existing threats to operating environments dominated by Windows 7 and other operating systems
  • The latest hacking attacks targeted to mobile platform and tablet computers and countermeasures to secure mobile infrastructures
To beat a hacker, you must think like on and this is exactly what being a Certified Ethical Hacker is all about. Hacking has quickly moved from being something weird and rebellious to a clear sign of power and intelligence. It is now one of the most desired information securities training programs every professional wants.

The course covers all domains needed to test system vulnerabilities and employ countermeasures. The attempts are made using the same methods and techniques as a Hacker.

The objective is to ensure your organisations vulnerabilities and security flaws are found before they are exploited by hackers. Ethical hackers mimic the approach adopted by hackers with minimum disruption in services. The extent of the tests depends on the contract between the ethical hacker and the organisation.

CEH v8 - EC-Council logo

The Certified Ethical Hacker certification is vendor neutral and enhances the skill sets of security administrators, network administrators, security auditors and other IT professionals. 

Master the ethical hacking methodology and use it in penetration testing or in as ethical hacking situation. Finf out more about the Certified Ethical Hacker v8 certification here.

Jay Bavisi, Co-Founder and President of EC-Council, recently spoke to us about the highly anticipated Version 8 of the Certified Ethical Hacker (CEH v8) credential. Watch below:




To embed this video copy the text in the box below:


About the Author:
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry.

Monday, 20 May 2013

How to defend yourself and your company from a DDoS attack


By 


DDoS mitigation


DDoS stands for Distributed Denial-of-Service attacks. They have become increasingly popular and have gone up in scale, intensity and frequency.

DDoS Map
Image Courtesy of 24hourhelpdesk.com.au
There are a wide range of reasons for DDoS attacks, including political (hacktivism), criminal, or just simply for their own amusement; which makes anyone with an online presence a potential target.

If you find that your site or organization is under attack, it’s important that you report such attacks quickly to parties that are best positioned to help you mitigate, weather, and restore normal service.

Here are some steps you can take to take out the sting

Simulate your own DDoS attacks


Create a simulated DDoS attack on your network. This will help you or your management see the best options to mitigate when under a real attack. Here’s a simple video of how to perform your own DDoS attack.



Manage communications


If you do get a DDoS attack, make sure you are prepared to have a single point of contact streamless information sharing. This contact can keep more of the organisation up to date with short updates so everyone understands the situation. By already completing the simulation process mentioned above, everyone in the team will know their specific roles in the mitigation process and how they can continue ‘business as usual’.

Make a plan, and keep planning again


Make a call tree, keep it updated and in the same place so it is easily referenced. Call trees are an important part of every disaster recovery plan. They are a telecommunications chain for notifying specific individuals of an event. It is very helpful if you need to reach certain employees after hours to notify them of a situation. This is in order to make sure the mitigation process is contained and in order. It helps turn an attack into an incident as everyone will know their role after the simulation and the plan created from it. You should also have teleconference bridges (where engineers can coordinate response efforts), a troubleshoot bridge for application owners to report issues, and a security and forensics bridge. This will help with the confusion and add speed again.

In April 2013, Prolexic (a DDoS mitigation service provider) mitigated a sustained DDoS attack peaking at 160 GBPS and 120 million packets per second - which is a very heavy attack. In the video below they explain and show you how they did it.


Source: Prolexic


Defend your business with a Certified Ethical Hacker (CEH) professional

EC-Council CEH logo

You too can learn how to perform DDoS attacks and help companies like PayPal defend themselves against it. Become a Certified Ethical Hacker (CEH) and earn on average £42,750 in the UK (ITjobswatch.co.uk). The CEH certification from the EC-Council is widely recognised as the entry into the hacking world. As an ethical hacker, you’d attempt to penetrate the networks or computers of your organisation or any organisation that hires you. "White hat" ethical hackers are widely sought after to help find and fix the vulnerabilities that would otherwise be exploited by "black hat" criminal hackers.

About the Author:
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry.

Thursday, 28 February 2013

Video: The best accelerated training for CEH?



By 

Firebrand Training - Accredited Training Centre of the Year award - EC-Council
Firebrand Training has once again won the EC-Council Accredited Training Centre of the Year award - for a fourth time in a row!

Jay Bavisi, President of EC-Council congratulated us personally, stating in the video that we are the largest supplier of Certified Ethical Hackers in Europe and that it gave him no doubt in knowing that “Firebrand has one of the best residential accelerated training for the Certified Ethical Hacker program in Europe”.


To embed this video copy the text in the box below:





Jay Bavisi, President of EC-Council stated: “The annual EC-Council Awards highlight the commitment and achievements of our global partners and trainers that have contributed to the information security community I congratulate all of the winners for their achievements and dedication to the Information Security industry in their respective region”

When we went to Miami to pick up the Training Centre of the Year award from EC-Council at the Hacker Halted conference, we learned some pretty scary facts from the last year:

  • 174 million data records were stolen
  • 96% of hacks weren't even slightly difficult
  • 85% took two weeks or more to discover
  • 92% were discovered by a third party (how embarrassing is that?!)


About the Author:
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry.

Video: C|CISO by EC-Council



By 

What is a CISO?

CISO stands for Chief Information Security Officer and is a title given to those responsible for the IT security and are at the highest level of that field.

EC-Council released its C|CISO accreditation to develop skills in executing an information security management strategy in alignment with organisational goals.
CISO - Certified Chief Information Security Officer

“CISO equips information security leaders with tools to protect against security breaches by actively improving the current information technology security solutions, enforcing regulatory requirements and aligning IS with the strategic needs and goals of their business. This skill set enables the CISO to be the best guardian of their organization’s digital assets.”

Benefits of becoming a certified CISO

Getting a CISO certification will make you stand out from others in the competitive ranks of senior IS Professionals. CISO provides your employers with the assurance that as a CISO certified executive leader, you possess the proven skills, knowledge and experience to plan and oversee information security for the whole company.

CISO is regarded as the highest title within the information security profession.

Jay Bavisi, the President of EC-Council, talks about the CISO credential and why it's becoming a vital certification for organisations to have in order to protect their systems. Watch below.


To embed this video copy the text in the box below:




“CISO is a unique designation that has been designed in cooperation with industry leaders to identify a solid blend of functional and executive IT job roles and skill requirements.” Jay Bavisi, President of EC-Council.


About the Author:
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry.

Video: CEH v8 - Certified Ethical Hacker



By 

Certified Ethical Hacker - CEH v8 CEHv8 logo


Jay Bavisi, Co-Founder and President of EC-Council, gave us some information on the highly anticipated Version 8 of the powerful Certified Ethical Hacker (CEH v8) credential. Watch below.



To embed this video copy the text in the box below:



If you want to enter the IT security industry (the fastest growing sector in the IT industry), CEH is the one to go for. As an ethical hacker, you’d attempt to penetrate the networks or computers of the organisation you work for. Why would you do this? "White hat" ethical hackers are widely sought after to help find and fix the vulnerabilities that would otherwise be exploited by "black hat" criminal hackers. Demand for CEH professionals continues to grow. Due to the alarming increase in cyber attacks over the past decade, organisations are looking for ways to protect themselves and tighten their security. The CEH course and certification covers all that is needed to identify system vulnerabilities and countermeasures.


Video Transcript:
My name is Jay Bavisi, and I'm the President and co-founder of EC-Council, the owners and creators of the Certified Ethical Hacking credential. I think what's interesting about the Certified Ethical Hacker Version 8 are a couple of things.

First and foremost, it's the credential of EC-Council that has obtained the prestigious ANSI17024 ISO/IEC 17024 accreditation status. We are one of the very few organizations in the world that have obtained this very rigorous accreditation standard, and we're very proud of that. We're now going to be able to offer the same experience to the users that are going to be actually attaining this credential through our training partners across the world.

There are many structural changes that we have brought in with Certified Ethical Hacker Version 8 to ensure that the entire user experience, the entire learning experience is really enhanced and improved. To mention a few, Certified Ethical Hacker Version 8 will see massive immersion of the
user to skills based competency from the previous knowledge based competency, and we have done that by the introduction of the EC-Council iLab environment, which requires the student to actually do what they claim they think they can do, both in a classroom environment and  eventually when they attain the certification.

So students will actually be sitting in a classroom, no longer just understanding the theory or the concepts or the tools that they play with. But they'll actually be experiencing a real life scenario through the complex iLab environment. We're talking of an entire IT infrastructure that's collaborative in nature, where you will have different students actually planting flags. Some of them are playing defense, some of them are playing attack, and some of them are conducting actual penetration tests right there in the classroom. That's what the Certified Ethical Hacker
Version 8 brings to the table that we were never able to do without the iLab's technology.

The second most interesting thing about Certified Ethical Hacker Version 8 is that we're the first organization in the world to have actually mapped our course to the newly released Microsoft Windows 8 and Microsoft Server 2012 platform. So students will not be dealing with archaic technology and archaic vulnerabilities, but they will actually be dealing with the real life environment of what they're going to be facing in their employment in the months to come, from the time they obtain the certification.

The third and the most interesting thing about the learning of the Certified Ethical Hacker Version 8 is that we have understood that a student needs to experience far more learning than beyond the five days that they experience in a classroom environment. We think that the only way
you will reduce the gaps of information security leaks that organizations face is if we can have a learning experience that goes throughout the year and throughout the lifespan of the information security professional.

We're doing that by launching a brand new platform called Aspen. It's code name Aspen, and you can google aspen.eccouncil.org. You'll be able to see that we're able to provide a holistic student experience, where a student will get to a classroom, they will then be able to print the evaluations and be able to take the exams. They'll be able to get to a bookstore that provides them with courses beyond the five day CH program. They'll be able to see some of the most cutting edge videos, so that they can increase their knowledge after they have attained their Certified Ethical Hacker credential. They will have, through this platform, ability to be able to interact and connect with other information security experts from around the world.

So it's a completely aggressive, expansive platform that will allow the learner to actually learn throughout their lifespan, and we're very excited to be able to bring that experience to the user through our respected and highly accredited training partners from all across the world.


About the Author:
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry.

Tuesday, 26 February 2013

Video: EC-Council and its Ethical Hackers



By 


EC-Council LogoJay Bavisi is the Co-Founder and President of EC-Council, a global leader in information security education, training, and certification.

The EC-Council was formed after 9/11, and has since addressed the issues of cyber security.

They’re also the vendor and developer of the world famous Certified Ethical Hacker (CEH) certification. They also own the Computer Hacking Forensic Investigator (CHFI), Secure Analyst (ECSA), and Licensed Penetration Tester (LPT) certification programs.

His audiences include executives of the most successful companies in the world such as Merrill Lynch, Microsoft, Shell, HSBC, Hewlett Packard, IBM, American Express, Royal Australian Air Force, Government of Zhuhai, China Mobile and A&T Solutions, among others.

Mr Bavisi regularly shares his insights with law & policy makers at various international conferences and seminars such as, Interop Las Vegas, CSI, Techno Security, Techno Forensics and most recently the world renowned Hacker Halted which is hosted by EC-Council.

As mentioned in a previous post, we went to the 2012 Hacker Halted in Miami to pick up the Training Centre of the Year award from EC-Council. While we were there, we managed to get an interview with Jay Bavisi himself who spoke to us about EC-Council, cyber security and their credentials.


To embed this video copy the text in the box below:



Jay has appeared regularly on several local and international television shows and print medias, including being interviewed by CNN and Fox Business News regarding information security and ethical hacking. His views have been sought by internationally acclaimed publications including Time, Washington Post, The Herald Tribune, The Wall Street Journal, The Gazette and The Economic Times. His views were also featured by ABC News, USA Today, The Christian Science Monitor, Boston and Gulf News. 

Want to see more of Jay Bavisi's interviews? Check out EC-Councils Hacker videos here: www.eccouncil.org/home/hacking_videos


Video Transcript:

My name is Jay Bavasi, and I'm the President and Co-Founder of the International Council of E-commerce Consultants, commonly known as the EC-Council. EC Council was founded ten years ago with one mission in mind and that is to raise the level of awareness and capability in the wall of cyber- security. There was a time when 9/11 had just happened and a lot of out of the box questions in cyber-security were raised. What would organizations do and what would governments do to address challenges that they face in a new era of cyber-war?

At that point in time, obviously, cyber war was very much a topic of Hollywood fiction, and as the world has seen it's no longer the case. The escalation of challenges that countries and governments are facing is real and the importance of a certification bodies like EC Council is to address the gaps that exist in these spaces.

So EC Council has got multiple certifications like the Certified Ethical Hacker, Certified Hacking Forensics Investigator, the License Penetration Testing Certifications. All of these credentials are meant to create cyber-security professionals that are actually out there to defend institutions, to defend organizations and to defend governments across the world.


About the Author:
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, IT training, IT certification trends, project management, certification, careers advice and the IT industry itself. Sarah has 11 years of experience in the IT industry.

Monday, 25 February 2013

Video: The Global CyberLympics



By 


Global CyberLympics LogoThe Global Cyberlympics is an international cybersecurity competition where teams from different countries compete to take the title of the number one cybersecurity team in the world.

The Global CyberLympics was thought up by the President of EC-Council - Jay Bavisi. He created the global competition to make ethical hacking more accepted, practiced and demonstrated without any discrimination around the world.

In just 2 years, there are over 2,500 participants representing 52 countries. And to the surprise of many, cybersecurity experts were coming from all over the globe, including small countries like Mongolia.

Holland are the champions for the second time running in the CyberLympics winning the 2011 and 2012 games.

This year’s competition is set to start in July with 1200 participants per continent. Round one is based around Forensics. Round 2 is CND-Lite. Round 3 is Pen test. And the final round which is held in Atlanta, USA is the world championships and is based around all areas of cybersecurity.

To find out more about how you can join and represent your country in the CyberLympics, click here.

Jay Bavisi, President of EC-Council talks about the Global CyberLympics and how it was started. Watch the full interview below.


To embed this video copy the text in the box below:

Global CyberLympics - Cyber Olympics


About the Author:
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, IT training, , IT certification trends, project management, certification, careers advice and the IT industry itself. Sarah has 11 years of experience in the IT industry.