This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
A data breach hits headquarters at 3 a.m. Are your critical assets secure? Hire (ISC)²-certified cybersecurity professionals to prepare for, prevent and recover from attacks. Continue reading
Posted 3 days ago at (ISC)² Blog
Image
by Tamer Gamali, CISSP, CISO Mashreq Bank, and member of the (ISC)² EMEA Advisory Council Is the CISO well positioned to mitigate operational risk? (ISC)² will be asking this probing question of Security leaders at the kick-off session for Infosecurity Europe’s Leaders Programme in London next month. A round table discussion conducted under the Chatham House Rule, the session creates an opportunity to offer up frank comment and illuminate the challenges currently hampering companies from appreciating and truly gaining control of cyber risks. Infosecurity Europe’s Leaders Programme is open to CISOs and Heads of Information Security, who are the final... Continue reading
Posted 4 days ago at (ISC)² Blog
Image
Name: Kreesan Govender Title: Information Security Risk and Compliance Specialist Employer: MiWay Insurance (Santam Group) Location: Johannesburg, South Africa Education: National Diploma Computer Network Engineering Years in IT: 5 Years in Cybersecurity: 4 Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I have always found hacking and data breaches interesting since my days at campus, and when I was given the opportunity to start my career within the cybersecurity field, I jumped at the opportunity. Since starting my career in cybersecurity, I have enjoyed every bit and have never looked back. How did you decide to... Continue reading
Posted 6 days ago at (ISC)² Blog
Image
Nearly 900 cybersecurity professionals attended Secure Summit DC at the beautiful MGM National Harbor hotel. The two-day training event included more than 35 sessions in four tracks. Keynote speakers covered topics from resourcefulness to security culture, sociology to workforce development and beyond. A noteworthy theme evolved throughout the event, as speakers from both the private and public sectors – including many from the (ISC)² Board of Directors – acknowledged the need for a greater understanding of the cybersecurity basics both inside and outside the industry. “We’re in the golden age of threats,” said John McCumber, director of cybersecurity advocacy at... Continue reading
Posted May 10, 2018 at (ISC)² Blog
Image
By and large, female and male cybersecurity professionals share the same workplace values, priorities and aspirations. Both place about the same level of importance on matters such as salary and working close to home – and both apply roughly the same skills to their work and view protecting people and data as their primary function, according to recent (ISC)2 research. In a survey of 250 cybersecurity professionals, (ISC)2 also discovered the number of men and women looking for new employment is exactly the same: 85 percent of cybersecurity workers are open to new employment opportunities, including 14 percent who are... Continue reading
Posted May 4, 2018 at (ISC)² Blog
Image
Name: Paul Bryant Title: CIO Employer: phew! Cyber Security Location: Auckland, New Zealand Education: MCom (Hons), LLB (Hons) Years in IT: 20 Years in cybersecurity: 15 Cybersecurity certifications: CISSP How did you decide upon a career in cybersecurity? In my roles designing and managing financial services technology infrastructures and leading technology teams I had a good deal of both technical and non-technical exposure to information security considerations and solutions. It is a complex and ever-changing area that bridges business and technology, and requires both technical and commercial engagement. It is also an area that is under-served in industry. Why did... Continue reading
Posted Apr 19, 2018 at (ISC)² Blog
Image
(ISC)² Bangalore Chapter 7th Security Meet The (ISC)² Bangalore Chapter conducted its 7th Security Meet on 17th March, 2018 at Honeywell Technology Solutions. The event offered its fellow security professionals an opportunity to hear from and discuss with security experts from various industries. The chapter has picked up pace and matured with respect to its steadily growing membership count in quality and quantity. Currently at the count of 73 members and counting, this chapter promises to sincerely promote its purpose and vision of building a strong network of security professionals. The half day event featured three major keynote presentations along... Continue reading
Posted Apr 19, 2018 at (ISC)² Blog
Image
Finalists have been announced for the 2018 Information Security Leadership Awards (ISLA®) Government. The ISLA Government program recognizes the ongoing commitment and achievements of individuals and teams whose initiatives, processes or projects have led to significant improvements in the security posture of a U.S. department, agency or government (state, local or federal). "Some projects are not well-known to either the public or the information security professional community. Recognizing a practitioner through the ISLA awards provides awareness of some of the important projects happening throughout the government." - Kris Thomas, CISSP, 2018 Nominator The awards ceremony will take place at the... Continue reading
Posted Apr 16, 2018 at (ISC)² Blog
Thank you for volunteering! We are working our way through the volunteers, so it will take several weeks before we can provide updates. Once you've sent in your information, though, you are in our database to work through as we organize the workshops. You'll be contacted when we have an updated. I confirmed and we do have you in our system, although I am not privy to the selection process or status of individuals.
Toggle Commented Apr 16, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Please send your (ISC)² ID# to examdevelopment@isc2.org and they will put you on the list of volunteers. Thank you!!
Toggle Commented Apr 16, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Image
Name: Thien Phan (ISC)² Exams Passed: CISSP and CCSP Title: Cybersecurity, Privacy and IT Risk Associate Employer: PricewaterhouseCoopers (PwC) Location: New York City, NY, U.S.A. Education: MBA degree and Bachelor’s Degree in Management Information Systems (MIS) from Binghamton University Years in IT: 1 year Years in cybersecurity: 1 year Cybersecurity certifications: Security+, CCNA Cyber Ops How did you decide upon a career in cybersecurity? It was back in my third year of college when I interned for a multimedia company as a database administrator. I did not know much about how different technologies worked together. I was introduced to the... Continue reading
Posted Apr 11, 2018 at (ISC)² Blog
Image
(ISC)²’s theme for 2018 is Enrich. Enable. Excel. In an effort to enable our members to be the best in their field, we have partnered with A Cloud Guru to offer a one-month free membership to A Cloud Guru. This benefit allows members exclusive access to cloud security education from A Cloud Guru, which delivers an array of cloud security courses to enable cybersecurity professionals to better defend their data in the cloud. Cloud security was identified as the number one skill security professionals needed to acquire or strengthen to advance their career, according our 2017 Global Information Security Workforce... Continue reading
Posted Apr 9, 2018 at (ISC)² Blog
I have shared your info w/our exam development team, Dr. Louis - thank you!
Toggle Commented Apr 5, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Hello! Instructors are prohibited from participating in item writing workshops due to exposure to exam content. You must wait two years after being an item writer before you can become eligible to act as an instructor. I hope this helps!
Toggle Commented Apr 5, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Image
By Kwinton Scarbrough, CISSP In the midst of the business and technology merge, organizations of all industries have started their journey into the cognitive era of cybersecurity. In this era, it is essential for a business to have an IT security strategy to govern how the organization will protect itself from internal and external cyber threats. However, what commonly fails to align to IT security strategy is the organization’s overall security culture. IT security strategy can only be effective if there is a strong security culture embedded into the very fabric of the company’s operations. Today, I will cover the... Continue reading
Posted Apr 2, 2018 at (ISC)² Blog
Image
To ensure the CISSP exam remains up-to-date and relevant to the industry, we are constantly working on the exam items (aka “questions”), and that process is 100% member-driven! (ISC)² spoke with Lisa Vaughan, CISSP, about her experience in a recent Item Writing Workshop. Lisa is the Chief Information Officer for the Mississippi Department of Environmental Quality and it was her first-time volunteering as an item writer. She was a participant in a CISSP Item Writing Workshop that took place in Tampa, Florida. The workshop spans three days, taking these dedicated member volunteers away from their jobs and family for a... Continue reading
Posted Mar 30, 2018 at (ISC)² Blog
Image
Name: Debi Carr Title: CEO and Consultant Employer: D. K. Carr and Associates, LLC Location: Christmas, FL, U.S.A. Years in IT: 28 years Years in cybersecurity and/or privacy: 20 years Cybersecurity certifications: HCISPP, CAHIMS How did you decide upon a career in healthcare security and/or privacy? As a practice manager of a healthcare practice, I was appointed the “Privacy and Security” Officer when HIPAA went into effect. I was also responsible for overseeing the technology in the practice through the years. As a result, I began educating myself on security and privacy protocols. Why did you decide to pursue your... Continue reading
Posted Mar 29, 2018 at (ISC)² Blog
Image
There’s no question cybersecurity professionals are busy people, but what takes up their time at work? According to recent (ISC)2 research, the skills they most employ each day are network monitoring, security analysis and security administration, while forensics and penetration analysis rank at the bottom. But if you ask those who are actively looking for a new job, the daily task that comes up most often is user awareness training. Some 38% of respondents who said they’d be starting a job search within six months revealed they conduct user training every day, while 31% do it two to three times... Continue reading
Posted Mar 20, 2018 at (ISC)² Blog
Image
Non-white cybersecurity workers outnumber their white counterparts in advanced education degrees (master’s and higher), but they are still underrepresented in managerial positions. As a group, minority professionals also get paid less than Caucasians, according to a new report from (ISC)2. The report, Innovation Through Inclusion: The Multicultural Cybersecurity Workforce suggests ethnic and racial minority professionals face barriers to advancement that don’t seem to apply to Caucasians. The same is true when it comes to salaries, as Caucasian workers significantly out-earn their multicultural peers. Minority workers make up 26% of the U.S. cybersecurity workforce, just five points above the overall minority... Continue reading
Posted Mar 15, 2018 at (ISC)² Blog
(ISC)² Management is now following Wesley Simpson
Mar 15, 2018
Image
Focused on “Securing Ghana’s Digital Journey,” the Republic of Ghana’s Ministry of Communications recently united representatives from multiple international bodies for National Cyber Security Week (NCSW). Members of the (ISC)2 Ghana Chapter played key roles in ensuring the event’s success. Opened by Ghana President H.E. Nana Addo Dankwah Akufo-Addo, the weeklong forum gathered participants from the Council of Europe (GLACY +), the United States/Security Governance Initiative, the United Nations, ECOWAS, African Union Commission, and others. (ISC)2 Ghana Chapter Treasurer Alexander Oppong, CISSP, served on the NCSW Planning Committee responsible for the event’s funding, exhibiting, sponsor selection, and physical/cyber security. Ghana... Continue reading
Posted Mar 15, 2018 at (ISC)² Blog
Image
Name: Bryan Bell Title: Senior Director, P2PE Employer: Coalfire Systems, Inc. Location: Alpharetta, Georgia, U.S.A. Education: Clayton State University, Computer Science Years in IT: 25+ Years in cybersecurity and/or privacy: 12+ Cybersecurity certifications: HCISPP, HITRUST CSF, ISO 27001 Lead Auditor, CFCP, PCI QSA (PA-P2PE) How did you decide upon a career in healthcare security and/or privacy? I’ve enjoyed working within information technology since high school and through college where I was developing applications and learning systems design and networking. I’ve always been drawn to healthcare security, because there is a continuing dilemma from healthcare providers to balance technology and information... Continue reading
Posted Mar 13, 2018 at (ISC)² Blog
By now, you’ve heard that the CISSP exam format has changed from linear to Computer Adaptive Testing (CAT). This change to the English language exam started in December of 2017. If have questions about what this change means for you, as you’re preparing for your CISSP, we’ve got answers in our latest video: Looking for even more information? Check out our CISSP CAT FAQs. Continue reading
Posted Mar 6, 2018 at (ISC)² Blog
Image
By Wesley Simpson, COO, (ISC)² Some have called the skills gap in IT and cybersecurity a national security crisis. Yet, it’s one that most everyone in the industry doesn’t know how to solve. Many look to automation and other technologies as a solution to the problem. Others foster relationships that will fill the pipeline and attract new talent. But there is no ONE solution. Instead, organizations need to both build and buy the talent they need. The growing gap between skills needed and qualified candidates is not a problem that technology alone can solve, but it is one that is... Continue reading
Posted Mar 2, 2018 at (ISC)² Blog
Image
Every year, (ISC)² and The Centre for Cyber Safety and Education award a range of scholarships to individuals pursuing, or planning to pursue a degree in cybersecurity or information security. Addressing the cybersecurity skills gap The aim of these initiatives are to help bridge the cybersecurity workforce skills gap - which our research predicts to reach a 1.8 million shortfall in the next four years - and improve diversity within the profession; by providing future information security professionals with Undergraduate, Graduate or Women’s scholarships to assist them in preparing for their rewarding career in this vital sector. How the scholarship... Continue reading
Posted Mar 1, 2018 at (ISC)² Blog