This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
We are excited to announce the final speaker agenda for our 5th annual CyberSecureGov training event being held May 9-11, 2017, at the Marriott Wardman Park in Washington, D.C. This year, we are offering a 3-day event, which means more great sessions and more CPEs! “If you work for the U.S. government – either as a contractor or direct hire – cybersecurity is now your job,” said Dan Waddell, CISSP, CAP, PMP, managing director, North America Region, and director of U.S. government affairs, (ISC)². “More and more, government agencies are requiring good cyber hygiene practices in contracts, job descriptions, performance... Continue reading
Posted 5 days ago at (ISC)2 Blog
Image
Name: Wendy Larsen Title: Security Consultant Employer: Weidenhammer Location: Reading, Pennsylvania, U.S.A. Years in IT: 27 Years in information security: 5 Cybersecurity certifications: SSCP, Security+, ITIL, VCP, MCSE How did you decide upon a career in cybersecurity? I have been working for an information technology consulting organization for 27 years. They gave me many opportunities to expand my technical knowledge as a systems engineer. Over the past several years, I have been very interested in growing my skill set in cybersecurity. I came to discover that I have a passion for security – therefore, I took the bull by the... Continue reading
Posted 5 days ago at (ISC)2 Blog
Image
Name: Tim Weil Title: Network Project Manager Employer: Alcohol Monitoring Systems Location: Denver, Colorado, U.S.A. Degree: BA in Sociology/Latin American Studies from Immaculate Heart College, MS in Computer Science from Johns Hopkins University Years in IT: 30+ Years in cybersecurity: 15+ Cybersecurity certifications: CCSP, CISSP, CISA, CRISC How did you decide upon a career in cybersecurity? Working in the telecommunications industry through the dot-com era, my core networking skills became less valuable when I obtained the CISSP in 2003. In the federal sector, I worked as a contractor for more than 10 years for more than 10 agencies, specializing in... Continue reading
Posted 7 days ago at (ISC)2 Blog
Image
The 2017 Global Information Security Workforce Study (GISWS) Women in Cybersecurity report, co-authored by the Center for Cyber Safety and Education and the Executive Women's Forum on Information Security, Risk Management & Privacy, and presented by PricewaterhouseCoopers, LLC focuses on the unique attributes, as well as the challenges facing women in this industry. A few of the highlights from this year's Women in Cybersecurity report include: Women comprise only 11 percent of the information security workforce. Women reported higher levels of education than men. Women in cybersecurity earn less than men. A special thank you to the co-authors of this... Continue reading
Posted Mar 17, 2017 at (ISC)2 Blog
Image
Dr. Heejo Lee 2016 Asia-Pacific ISLA Showcased Honoree (Information Security Educator) and Community Service Star Awardee with David Shearer (ISC)² CEO “It is a great honor to be the first showcased honoree of an ISLA award for educators and get the very prestigious recognition as the community service star at 2016. After receiving this award, our IoTcube project is getting a lot more attention and we will continue to develop internationally collaborative programs for better and safer IoT world.” Over the past 25 years, Dr. Heejo Lee has consistently contributed to the advancement of security technologies for academia, private industries,... Continue reading
Posted Mar 14, 2017 at (ISC)2 Blog
Image
Name: Albert Torres Title: Cyber Security Project Manager Employer: Sempra Energy Utilities – contractor Location: San Diego, California, U.S.A. Education: M.S. in Information Security and Assurance from Western Governors University, B.A. in Management Information Systems (Summa Cum Laude) from Washington State University Years in IT: 26 Years in cybersecurity: 16 Cybersecurity certifications: CISSP, PMP, CEH, CHFI, ITIL v3 Foundation IT Management Certification How did you decide upon a career in cybersecurity? I had been in the IT industry for over 10 years and our company was creating its first software as a service (SaaS) software offering. The previous software we... Continue reading
Posted Mar 13, 2017 at (ISC)2 Blog
Name: Arlie Hartman Title: National Security Operations Manager - Cloud Location: Indianapolis, Indiana, U.S.A. Degree: Bachelor’s degree in Business, IT Management at WGU (in progress) Years in IT: 16 Years in cybersecurity: 11 Cybersecurity certifications: CCSP, CISSP, HCISPP, GSEC, PCIP How did you decide upon a career in cybersecurity? I was working as a quality analyst doing root cause analysis for unsatisfactory IT incident resolutions – I was, essentially, a complaints department. I saw a position available as a technical analyst for our regional security officer and I applied and got it. I started out supporting the RSA Ace server... Continue reading
Posted Mar 6, 2017 at (ISC)2 Blog
Image
Name: Uzoma Nwankwo Title: Information Systems Security Officer Employer: Booz Allen Hamilton Location: National Business Park, Maryland, U.S.A. Education: MBA, BS in Computer Information Systems Years in IT: 12 Years in cybersecurity: 7 Cybersecurity certifications: CISSP, Certified Ethical Hacker (CEH), Comptia Security +, Project Management Professional (PMP) How did you decide upon a career in cybersecurity? I began my career as a systems administrator, supporting a project for a large government agency. When that project ended, I was presented with an opportunity to help another government agency with cybersecurity services in locations throughout the country. I travelled, met new people... Continue reading
Posted Mar 3, 2017 at (ISC)2 Blog
Image
The job of an information security professional is difficult, to say the least, and (ISC)² wants to make sure your membership is valuable. We are always looking for new ways to create and provide member benefits – including offering service and subscription discounts. (ISC)² members are eligible to receive special pricing on a premium membership with Information Security Media Group (iSMG), the world’s largest media organization devoted solely to information security and risk management. The member price is US$99/month for the first year with a yearly membership, which is a discount of 70 percent. ISMG is known for its CPE-worthy... Continue reading
Posted Mar 1, 2017 at (ISC)2 Blog
Image
The move to a paperless system to improve health and social care is an ambition central to many governments around the world. (ISC)² recently held a roundtable event in London, United Kingdom (UK) inviting several people who work within the sector and the country’s National Public Health Service (NHS) to explore a range of current issues, including the reasons why patients were showing a reluctance to trust efforts to protect their personal data. The aim was to bring together perspectives from many areas of the healthcare industry and give them the opportunity to talk freely and anonymously about the opportunities... Continue reading
Posted Feb 23, 2017 at (ISC)2 Blog
Hello Peter, RSAC submits CPEs on behalf of members automatically, if you registered with your (ISC)² ID number. If you don't see them on your account within 8 weeks of the event, please contact Member Services and we'll look into it for you.
Toggle Commented Feb 22, 2017 on (ISC)² at RSA Conference at (ISC)2 Blog
Image
Name: Leon Kolthof Title: Information Security Officer Employer: Centric Netherlands B.V. Location: Breda Area, Netherlands Degree: Bachelor in Business IT & Management Years in IT: 9 Years in cybersecurity: 6 Cybersecurity certifications: CCSP, CISSP-ISSAP, CISSP-ISSMP, CISM, CCSK, CEH How did you decide upon a career in cybersecurity? My IT career started in the field of system/network engineering. From this field of practice, I developed my professionalism toward information security. Through formal education, hands-on experience, and my own interest in the field, I have extended my knowledge in this dynamic discipline. Continuously building your knowledge and being keen on self-improvement is... Continue reading
Posted Feb 21, 2017 at (ISC)2 Blog
Image
The results from the eighth Global Information Security Workforce Study (GISWS) have been released this week. The workforce gap is estimated to be growing, with the projected shortage reaching 1.8 million professionals by 2022. While the gap is not news, the fact that it is growing is of great concern to an already exhausted workforce. The question of how to fill the gap has been answered, and millennials are an integral part of the plan. “For years, we’ve known about the impending shortage of the information security workforce, as evidenced by our study year over year,” said David Shearer, CEO,... Continue reading
Posted Feb 15, 2017 at (ISC)2 Blog
Image
Name: Bin “Sinbad” Zhou Title: Incident Response Senior Manager Employer: Huawei Location: Beijing, China Education: Electronic and Information Engineering Years in IT: 16 Years in cybersecurity: 16 Cybersecurity certifications: CISSP, ISO27001 LA How did you decide upon a career in cybersecurity? When I was a student in university, I helped manage ‘telnet-style’ BBS which requires UNIX administration skills. I was quite good at it, but vulnerabilities in UNIX systems can be exploited to bypass security mechanisms such as access control. I found that it is more challenging to harden a secure system, so I started to learn what is behind... Continue reading
Posted Feb 13, 2017 at (ISC)2 Blog
Image
This year’s (ISC)² Security Congress – with the theme “Leaders of Tomorrow” – will take place September 25-27 in Austin, Texas at the JW Marriott. For the first time, Security Congress will be a stand-alone event, without former partner ASIS International. “We value the partnership we had with ASIS International for the past six years, but it was time for Security Congress to stand on its own to address the programming needs expressed by our members,” says (ISC)² CEO David Shearer. The cybersecurity conference will host more than 90 educational sessions, as well as a town hall meeting, career center... Continue reading
Posted Feb 10, 2017 at (ISC)2 Blog
Image
RSA Conference is less than a week away! The annual information security event will be held at the Moscone Center, February 13-17, in San Francisco, CA. On Thursday, February 16, (ISC)² will release the first in a series of reports from its’ 2017 Global Information Security Workforce Study. Focusing on the millennial workforce, a panel session entitled “Empower, Encourage, Recruit: Changing our Approach to Building the Workforce” will take place from 1:30-2:15 p.m. PST in Room 130 in Moscone North. Since its first release in 2004, the bi-annual study gauges the opinions of information security professionals from around the world,... Continue reading
Posted Feb 8, 2017 at (ISC)2 Blog
Image
Name: Olayinka Ladeji Job Title: Management Consultant, Information & Cybersecurity and IT Advisory Employer: Enaxis Consulting Location: Houston, Texas, U.S.A. Degree: Bachelor’s degree in Electrical and Electronics Engineering Years in IT: 14 Years in cybersecurity: 12 Cybersecurity certifications: CCSP, CISSP, CISM, CBCP How did you decide upon a career in cybersecurity? Information security has always been my passion. I was working at a financial organization after college, but didn’t get the opportunity to work in the field of information security until an independent information security department was set up there shortly after I joined. I was drafted into the department,... Continue reading
Posted Feb 6, 2017 at (ISC)2 Blog
Image
Last year’s America’s Information Security Leadership Awards (ISLA®) ceremony and dinner was a highlight at Security Congress. Diego Andrés Zuluaga Urrea was one of the evenings honorees, winning the ISLA for Senior Information Security Professional. Diego started his career working as a systems administrator, while still studying in university, for the first ISP in Colombia. He saw malicious hackers working against the systems, on one occasion seeing nine university servers attacked in a single evening. After witnessing the vulnerabilities, he decided to learn more about information security on his own. Diego learned that creating a culture of security was just... Continue reading
Posted Feb 3, 2017 at (ISC)2 Blog
Image
Are you looking to start an (ISC)² Chapter in your area? The enrollment period for chapters in the Europe, Middle East and Africa (EMEA) and North America regions is now open through February 5. Through the chapter program, (ISC)² members and other information security professionals further advance the organization’s vision to inspire a safe and secure cyber world by sharing knowledge, raising security awareness and advancing information security in local communities around the world. To be eligible to start a chapter, you will need to meet the following requirements: Be an (ISC)² member in good standing for a minimum of... Continue reading
Posted Feb 1, 2017 at (ISC)2 Blog
Image
During its first few weeks, the Trump administration issued several executive orders that left heads spinning, with many federal personnel unclear of the implications. One particular order that is causing significant anxiety among federal cybersecurity personnel – including thousands of (ISC)² members -- is the hiring freeze. How is the freeze impacting our U.S. government member community and the government’s overall cyber progress? After numerous conversations with federal cybersecurity leaders, one thing is clear - there is an abundance of unknowns and a unanimous sentiment of unpredictability. Yet, when outcomes are hard to predict, sometimes it helps to know that... Continue reading
Posted Jan 31, 2017 at (ISC)2 Blog
Image
Name: Robert Kato Title: IT Specialist Employer: African Development Bank Education: Bachelor’s Degree in Information Technology and Master’s Degree in Information Systems Years in IT: 10 Years in cybersecurity: 5 Cybersecurity certifications: CISSP, CCNA Security How did you decide upon a career in cybersecurity? I started my career mostly doing systems administration and networking roles. At that time, especially in Africa, connectivity and system performance were the most important aspects. We had servers that had 128GB of memory and a 64 Kpbs DSL link and would cost $500 monthly. However, with the increase in computing power and high speed internet... Continue reading
Posted Jan 30, 2017 at (ISC)2 Blog
Image
Yves Le Roux, co-chair and public policy workgroup lead, (ISC)2 EMEA Advisory Council This Saturday marks the 10th anniversary for Data Protection Day, celebrated each year on 28 January – which is the date the Council of Europe’s data protection convention, known as “Convention 108”, was established. Data Protection Day, known as Privacy Day outside of Europe, is now celebrated globally, raising awareness of people’s rights as they relate to the automatic processing of their data. Each year, events are held around the world to both arm citizens with the information they need to understand and protect their rights, while... Continue reading
Posted Jan 27, 2017 at (ISC)2 Blog
Image
Yes, you did read the headline right. It is the conclusion of a United Kingdom’s Government review (Cyber security regulation and incentives review) published right at the end of 2016. Here, the UK Government concludes that the EU General Data Protection Regulation (GDPR), with its reporting requirements and financial penalties represents a significant call to action, so no further regulation is required at this time. This decision is to be applauded for four reasons. First, many UK-based organisations are also having to prepare for the European Union Network Information Security (NIS) Directive. Both NIS and GDPR are placing significant resource... Continue reading
Posted Jan 25, 2017 at (ISC)2 Blog
Image
Name: Nanditha Rao Title: Information Systems Security Principal Employer: CSRA, LLC Degree: Master of Science in Computer Science Years in IT: 14 Years in cybersecurity: 11 Cybersecurity certifications: CCSP, CISSP How did you decide upon a career in cybersecurity? I found myself in the field due to the encouragement from my supervisors who believed that I had the analytical skills to move from IT risk management to IT security and cybersecurity. It was a natural transition for me, and I really enjoyed working in the domain. Since my start in the security field, I have actively worked to learn new... Continue reading
Posted Jan 23, 2017 at (ISC)2 Blog
Image
Let's pretend you're planning a big trip, and you need a nice place to stay. After considering different options online, you find a place that sounds great. The photos appear perfect. So, here's the question. When you arrive, will the lodging match your expectations...or is it just too good to be true? When you're choosing among CISSP® training providers, we know you're sorting through a variety of companies and often times, big, beautiful claims. To ensure you aren't surprised when you reach the CISSP certification exam, here are three myths debunked. Myth #1: Pass rates of 90%+ are guaranteed. What... Continue reading
Posted Jan 17, 2017 at (ISC)2 Blog