This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
By Tamer Gamali, CISSP, CISO and member, (ISC)² EMEA Advisory Council As a Chief Information Security Officer (CISO) based in Dubai with 15 years working in financial services, and a member of (ISC)²’s EMEA Advisory Council I am keen to help companies develop a deeper understanding of how operational risks are evolving with cyberthreats. I have become aware of a growing body of opinion within cybersecurity circles that suggests the senior management tier represents a significant threat to their businesses today. They are a group that understands and works hard to mitigate risk, but, as more and more companies move... Continue reading
Posted 2 days ago at (ISC)² Blog
Image
Name: Rachel Phillips, PMP, Assoc. (ISC)² (ISC)² Exam(s) Passed: CISSP Title: Cybersecurity Analyst Location: Seattle, WA, U.S.A. Education: M.S. Information Technology (Security and Assurance) and B.S. Business Administration (New Media and Internet), Kaplan University Years in IT: 10 Years in Cybersecurity: 3 Cybersecurity Certifications: Associate of (ISC)² Rachel Phillips, PMP, Assoc. (ISC)² is an influencer and sought-after contributor for her views and leadership in technology and security. She holds a Master’s in IT with emphasis in Information Security and Assurance, and a Bachelor’s in Business Administration from Kaplan University. As a cybersecurity analyst, she provides oversight and assurance of meeting... Continue reading
Posted 3 days ago at (ISC)² Blog
Image
In this ever-changing field, you’re constantly required to learn about new tools, vulnerabilities and threats. We know that time and financial resources may get in the way of participating in CPE offerings that help you sharpen your skills and hone your craft. We are committed to enabling our members to become the most well-rounded and effective cybersecurity practitioners around so we’ve compiled a list of CISSP CPE opportunities that will work for your busy schedule. Online CPE Opportunities: Read InfoSecurity Professional Magazine (and take the quiz) Watch a CPE webinar (including any of our cybersecurity webinar series: ThinkTank, e-Symposium, From... Continue reading
Posted 5 days ago at (ISC)² Blog
Image
Last year’s Security Congress in Austin was our largest one yet with nearly 2,000 cybersecurity professionals in attendance. You know what they say, everything is bigger in Texas! Our first independent Congress featured 139 educational sessions, as well as vendors presenting in the Solutions Theater, (ISC)² member focus groups, Cloud Security Alliance (CSA) Summit and the Information Security Leadership Awards (ISLA) Americas ceremony and celebration. If you attended last year, you saw the excitement and enthusiasm from staff, speakers and attendees. If you were unable to attend, you’re in luck – you can watch some of the top sessions from... Continue reading
Posted Feb 15, 2018 at (ISC)² Blog
Name: Wai Sheng Cheng Title: Security Analyst Employer: Cboe Global Markets Location: Kansas, U.S.A. Degree: Master of Science, Information Systems Engineering, Johns Hopkins University Years in IT: 6 Years in information security: 3 Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I decided on a career in cybersecurity when my email account was first compromised in 2011. I learned about this when my friends and family called to ask if I had sent out emails asking for money. As an engineer-in-training, I was curious to know why and how this had happened. It was through this... Continue reading
Posted Feb 12, 2018 at (ISC)² Blog
Image
As cyber threats proliferate, organizations looking to fill cybersecurity vacancies need to take concrete steps to reboot recruiting and hiring efforts. Qualified candidates for cybersecurity jobs are scarce and getting scarcer, creating a challenge for companies to properly defend themselves against threats. By 2022, an estimated 1.8 million cybersecurity jobs will go unfilled, according to research by (ISC)2. It’s a classic supply-and-demand challenge, with too many vacancies for too few candidates. Currently it takes 55% of organizations at least three to six months to fill a cybersecurity vacancy, and 32% spend even more time to find qualified candidates, ISACA has... Continue reading
Posted Feb 6, 2018 at (ISC)² Blog
Image
Bruce Beam, CISSP recently join the (ISC)² family as our director of infrastructure and security. Bruce has more than 20 years of experience leading IT/ICT and security teams for large enterprises and the U.S. Navy. He is leading all aspects of (ISC)²’s global IT/ICT and cybersecurity operations. He is not only managing the (ISC)² “DETE” (digital-end-to-end) initiative, but also oversees our Global Data Protection Regulation preparations. Bruce has words of advice for surviving – and thriving – through GDPR: The GDPR sweat is now in full swing with the May 25 deadline looming. I have seen a lot of gloom... Continue reading
Posted Feb 5, 2018 at (ISC)² Blog
Image
The Center for Cyber Safety and Education was named the 2018 Nonprofit Organization of the Year by the Clearwater Regional Chamber of Commerce. The Center is the charitable foundation of (ISC)² and was previously known as the (ISC)² Foundation. They are committed to making the cyber world a safer place for everyone, particularly through their Safe and Secure Online program. The children’s materials feature Garfield and friends tackling cyber safety issues, including privacy, the dangers of posting online, online etiquette, cyberbullying and more. “We are deeply honored to receive this recognition, especially in our local community,” said Patrick Craven, director... Continue reading
Posted Feb 1, 2018 at (ISC)² Blog
Image
Name: Timothy Meryweather Title: IT Auditor Location: Greater Los Angeles Area Degree: Bachelor of Science Years in information security: 6 Cybersecurity certifications: SSCP (ISACA: CISA, CRISC) How did you decide upon a career in cybersecurity? Our Audit Department’s Senior IT Auditor needed help and I was transferred from Background Licensing. Right place, right time. I possess a guardian spirit and have mostly worked in similar areas of employment: U.S. Marine, Deputy Sheriff, Police Officer, Private Security/Life Safety, casino surveillance, background licensing investigator. With my investigative training background, it was a natural migration into auditing the cybersecurity of information technology. Why... Continue reading
Posted Jan 31, 2018 at (ISC)² Blog
Image
For a limited time, (ISC)² is excited to offer the opportunity for members to pilot an interactive, online, self-paced free CPE credit opportunity that incorporates a practical hands-on lab learning experience. This Cyber Forensics Incident Recovery lab is designed to provide you with a deeper understanding of how to extract evidence from a suspect’s hard drive. We are eager to offer this course, which includes demonstrations, hands-on lab practical application and concludes with an assessment to ensure understanding of the learning objectives. You’ll learn key concepts, watch demos, work through the hands-on lab and test your knowledge. Following completion of... Continue reading
Posted Jan 29, 2018 at (ISC)² Blog
Image
(ISC)²’s two-day Secure Summits bring multi-subject sessions from hands on practical workshops to keynotes and panel discussions, featuring local and international industry experts to maximise the learning experience and CPE opportunities. Serving the entire (ISC)² EMEA professional community with regional events, the Summits offer a wealth of educational value, networking opportunities, and a community forum for like-minded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members. Read on for insights from one of our popular Secure Summit UK sessions... You’re the CEO of an international oil and gas company. Business risk and risk management planning is... Continue reading
Posted Jan 26, 2018 at (ISC)² Blog
Image
Name: Simon Morgan Title: IT Systems Engineer Employer: LSA Systems Ltd. Location: Billericay, U.K. Degree: HND in Computing Years in IT: 15 Years in information security: 3 Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? Information security has always interested me. The ever-present risks that business and individuals face from cyber-attacks and threat actors drives me to try and help protect them to the best of my ability. It is an exciting field to be in that has new and interesting challenges on a daily basis. Not only this, but going forward in my career I... Continue reading
Posted Jan 24, 2018 at (ISC)² Blog
Image
January is a time for setting goals and planning for the new year. Professional development is a valuable cornerstone – so why not resolve to speak at a cybersecurity event in 2018! Check off a resolution (and rack up some CPEs) by speaking at one of these four (ISC)2 events in the U.S. this year. Secure Summit Phoenix – March 9 Deadline: January 30 CPEs: 9 This one-day event is focused on (Re)Emerging Threats. Ransomware and phishing are among threats that just won’t go away. Share your insight with fellow practitioners on how we can take new approaches to these... Continue reading
Posted Jan 22, 2018 at (ISC)² Blog
Image
Name: David Schneider Title: Senior Cyber Security Threat Engineer Employer: Garmin International Location: Olathe, KS, U.S.A. Degree: BA, BS, MS Years in IT: 20 Years in cybersecurity: 12 Cybersecurity certifications: CCSP, CISSP, CISM, CISA, GWAPT, CIS LI How did you decide upon a career in cybersecurity? I became interested in cybersecurity while doing software development. When working as a developer, I started becoming interested in secure coding methods and what I could do to make what I was working on more secure from both a technical and end-user perspectives. I started enjoying other aspects around information security and felt that... Continue reading
Posted Jan 17, 2018 at (ISC)² Blog
Image
(ISC)2 webinars are an easy way to keep up-to-date with your CPEs and keep your finger on the pulse of the cybersecurity industry. We know your time is valuable, so these one-hour sessions are focused on topics and issues relevant to your day-to-day operations. Cloud security remains at the forefront of security conversations today. Here are the top ten webinars for securing cloud services (in the North America region) for 2017: Office 365 Security & Performance - Proven Deployment Strategy Combining CASB + SWG Security Briefings Part 3: Compliance Checkup - HIPAA & the Cloud Security Briefings - Compliance Checkup... Continue reading
Posted Jan 15, 2018 at (ISC)² Blog
Image
“My exam ended after exactly 100 questions and took me a little more than an hour to complete.” – Keith Yanachik The CISSP exam changed to CAT format in December 2017. We spoke to one of the first to take the CISSP CAT exam, Keith Yanachik, to ask him about his experience. Keith is an Enterprise Architect and has a bachelor’s degree in information systems management, as well as an MBA. Why did you decide to pursue the CISSP certification? I pursued the CISSP certification as a means to recognize my cybersecurity skills and to confirm that I know what... Continue reading
Posted Jan 10, 2018 at (ISC)² Blog
Image
Name: Sohail Awad Title: Engineer Employer: Freelancer Location: U.K. Degree: Master of Science in Computer Security Years in IT: 16 Years in information security: 12 Cybersecurity certifications: SSCP, CCNA Security, CCNA R/S What security skills and knowledge would you count as relevant to your current role, and ambitions for the future? Every skill or bit of knowledge I gain is relevant to my role as they help me to see the big picture and better tailor the solutions I create and develop. The SSCP, in essence, is designed to deliver that vision. I have found the secure programming techniques, data... Continue reading
Posted Jan 8, 2018 at (ISC)² Blog
Image
Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)²’s new look two-day Secure Summits bring multi-subject sessions from hands on practical workshops to keynotes and panel discussions, featuring local and international industry experts to maximise the learning experience and CPE opportunities. Serving the entire (ISC)² EMEA professional community with five regional events, the Summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members. Read on for insights from one of our popular Secure Summit UK sessions: (ISC)²... Continue reading
Posted Jan 4, 2018 at (ISC)² Blog
Image
Organizations, individuals feel pain of breaches, critics silenced, and China outraged. As analysts and cybersecurity experts make predictions about the future of cyber and the advancements we can expect to see in artificial intelligence (AI), it’s worth taking a moment to think about the power of machines and their impact on human emotions. AI holds the promise that someday computers will possess emotional intelligence, but will computers ever really be able to mimic our natural human emotions? Everything from mere words, names, and numbers evokes strong feelings in people, and few names elicit the strong emotional response as that of... Continue reading
Posted Jan 2, 2018 at (ISC)² Blog
Image
Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)²’s new look two-day Secure Summits bring multi-subject sessions from hands on practical workshops to keynotes and panel discussions, featuring local and international industry experts to maximise the learning experience and CPE opportunities. Serving the entire (ISC)² EMEA professional community with five regional events, the Summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members. Read on for insights from one of our popular Secure Summit UK sessions: Day... Continue reading
Posted Jan 2, 2018 at (ISC)² Blog
Image
UPS, FedEx, USPS and other delivery workers have been on overdrive for weeks. Online shopping can ease the stress of the season, but is it safer to confront the crowds? Let’s be honest, consumers are not waiting until off hours to fill their digital carts. Hackers prey on the knowledge that it’s ever more difficult for end users to distinguish the difference between fraudulent and valid emails, which presents security issues to the enterprise as well. For the cybersecurity of end users (and the companies where they work) many headlines this week, have shared tips on how to avoid falling... Continue reading
Posted Dec 22, 2017 at (ISC)² Blog
Image
By Lorna Trayan, Associate Partner Security at IBM Security Services As I realized that the year is almost over, I had a thought: wouldn’t it be great if we could get a crystal ball and see what the future holds for us? Although I would love to know about my personal life, it’s the cybersecurity world I’m referring to here! Alas, since that’s not possible, we will all have to settle on reading the reports coming out and talking about future “predictions” of the security realm. Predictions, even if sometimes don’t come exactly true, would still assist us in taking... Continue reading
Posted Dec 21, 2017 at (ISC)² Blog
Image
Starting December 18, 2017 all English CISSP exams will be administered in a Computer Adaptive Testing (CAT) format. But what does this actually mean for those preparing for the exam? Let’s look at 4 things to expect when you sit for the CISSP CAT exam: The passing score is the same. You still need to score 700 out of 1000 to pass the CISSP exam. The content is exactly the same as the “old” (linear-based) exam format. The questions come from the same bank, and the pass rate will be unchanged by this format update. You can still take breaks.... Continue reading
Posted Dec 20, 2017 at (ISC)² Blog
Image
Name: Todd A. Painter Title: Network Engineer Employer: UNG, Inc. Location: Boiling Springs, SC (USA) Years in IT: 7 Years in information security: 3 Cybersecurity certifications: SSCP, Security+, working on CISSP How did you decide upon a career in cybersecurity? Looking at the current scope of IT, it was apparent to me that the IT security field would have the largest growth in the coming years. With that in mind, I knew that I had a good chance at becoming a valuable asset to any company that needed a security expert, or someone with more of a security mindset rather... Continue reading
Posted Dec 19, 2017 at (ISC)² Blog
Image
Though more attention has come to the security industry, cyber crime continues to challenge defense. Cybersecurity can no longer be ignored. In case you missed the press release last week, we’re letting you know that (ISC)² announced an open call for expert cybersecurity speakers for our 2018 Security Congress. In fact, there was lots of news coming out of (ISC)² last week. We are also welcoming nominations for the 2018 Information Security Leadership Award – Government. It’s the end of the year, which means the start of a new one. With the new year comes the promise of growth and... Continue reading
Posted Dec 18, 2017 at (ISC)² Blog