Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=V7lO7UgxQV4



Category:
Guide
Duration: 56:02
7,244 views
129


Improve your communication skills by avoiding the top 10 mistakes in cybersecurity writing. You'll learn by spotting and fixing problems in excerpts from security reports, emails, and other content you regularly create.

The mistakes you'll see in this video will span the key aspects of writing:

- Structure
- Look
- Words
- Tone
- Information

Discover how these elements work together to capture and hold your readers' attention and deliver your message. Learn how to be sure that you never make such mistakes. Benefit from the presentation author's experience of writing in cybersecurity for over two decades.

The presentation will not only help you write better, but also preview the techniques covered in the short SANS course SEC402: Cybersecurity Writing: Hack the Reader.

For information about the SEC402 visit: http://www.sans.org/SEC402

About the author:

Lenny Zeltser

Lenny has written his share of cybersecurity reports and other content during his tenure in the industry. He'll share with you the writing tips he has picked up along the way. Lenny is senior faculty member at SANS and VP of Products at Minerva Labs. Earlier in his career, he served as a Director of Product Management at a Fortune 500 company with a focus on security software and services. Previously, he led the enterprise security consulting practice at a major cloud services provider. A frequent public speaker and writer, Lenny has co-authored books on network security and malicious software. Lenny holds an MBA from MIT Sloan and a Computer Science degree from the University of Pennsylvania. He blogs at http://www.zeltser.com/blog




Other Videos By SANS Institute


2019-11-01John Hubbard - aspirations of becoming an engineer
2019-11-01Introducing John Hubbard
2019-10-30Security Awareness Recognition Program | SANS Security Awareness Summit
2019-10-30The Creative Process Behind Fun, Low-Budget Videos | SANS Security Awareness Summit
2019-10-30How to Build Your Own Escape Room | SANS Security Awareness Summit
2019-10-30Online Digital Scavenger Hunt: Engaging Security Awareness | SANS Security Awareness Summit
2019-10-30Latest Techniques in Hacking the Human | SANS Security Awareness Summit
2019-10-28What's it like being a SANS instructor
2019-10-28What sets SANS apart from other cyber security training providers
2019-10-02Classifying Evil: Lessons from Hunting Human Traffickers | SANS Threat Hunting & IR Summit
2019-09-23Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
2019-08-27SANS Pen Test HackFest Summit & Training 2019: Sneak Peek
2019-08-15What you need to know about SEC555: SIEM with Tactical Analysis
2019-08-14ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
2019-08-14Gaining Endpoint Log Visibility in ICS Environments - SANS ICS Security Summit 2019
2019-08-14What you need to know about SEC530: Defensible Security Architecture and Engineering
2019-08-13What you need to know about SEC503: Intrusion Detection In-Depth
2019-08-12What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
2019-08-06Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
2019-07-31Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
2019-07-30Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
lenny zeltser
sans sec402
sec402
cybersecurity writing
cyber security writing