This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
January is a time for setting goals and planning for the new year. Professional development is a valuable cornerstone – so why not resolve to speak at a cybersecurity event in 2018! Check off a resolution (and rack up some CPEs) by speaking at one of these four (ISC)2 events in the U.S. this year. Secure Summit Phoenix – March 9 Deadline: January 30 CPEs: 9 This one-day event is focused on (Re)Emerging Threats. Ransomware and phishing are among threats that just won’t go away. Share your insight with fellow practitioners on how we can take new approaches to these... Continue reading
Posted 14 hours ago at (ISC)² Blog
Image
Name: David Schneider Title: Senior Cyber Security Threat Engineer Employer: Garmin International Location: Olathe, KS, U.S.A. Degree: BA, BS, MS Years in IT: 20 Years in cybersecurity: 12 Cybersecurity certifications: CCSP, CISSP, CISM, CISA, GWAPT, CIS LI How did you decide upon a career in cybersecurity? I became interested in cybersecurity while doing software development. When working as a developer, I started becoming interested in secure coding methods and what I could do to make what I was working on more secure from both a technical and end-user perspectives. I started enjoying other aspects around information security and felt that... Continue reading
Posted 5 days ago at (ISC)² Blog
Image
(ISC)2 webinars are an easy way to keep up-to-date with your CPEs and keep your finger on the pulse of the cybersecurity industry. We know your time is valuable, so these one-hour sessions are focused on topics and issues relevant to your day-to-day operations. Cloud security remains at the forefront of security conversations today. Here are the top ten webinars for securing cloud services (in the North America region) for 2017: Office 365 Security & Performance - Proven Deployment Strategy Combining CASB + SWG Security Briefings Part 3: Compliance Checkup - HIPAA & the Cloud Security Briefings - Compliance Checkup... Continue reading
Posted 7 days ago at (ISC)² Blog
Image
“My exam ended after exactly 100 questions and took me a little more than an hour to complete.” – Keith Yanachik The CISSP exam changed to CAT format in December 2017. We spoke to one of the first to take the CISSP CAT exam, Keith Yanachik, to ask him about his experience. Keith is an Enterprise Architect and has a bachelor’s degree in information systems management, as well as an MBA. Why did you decide to pursue the CISSP certification? I pursued the CISSP certification as a means to recognize my cybersecurity skills and to confirm that I know what... Continue reading
Posted Jan 10, 2018 at (ISC)² Blog
Image
Name: Sohail Awad Title: Engineer Employer: Freelancer Location: U.K. Degree: Master of Science in Computer Security Years in IT: 16 Years in information security: 12 Cybersecurity certifications: SSCP, CCNA Security, CCNA R/S What security skills and knowledge would you count as relevant to your current role, and ambitions for the future? Every skill or bit of knowledge I gain is relevant to my role as they help me to see the big picture and better tailor the solutions I create and develop. The SSCP, in essence, is designed to deliver that vision. I have found the secure programming techniques, data... Continue reading
Posted Jan 8, 2018 at (ISC)² Blog
Image
Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)²’s new look two-day Secure Summits bring multi-subject sessions from hands on practical workshops to keynotes and panel discussions, featuring local and international industry experts to maximise the learning experience and CPE opportunities. Serving the entire (ISC)² EMEA professional community with five regional events, the Summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members. Read on for insights from one of our popular Secure Summit UK sessions: (ISC)²... Continue reading
Posted Jan 4, 2018 at (ISC)² Blog
Image
Organizations, individuals feel pain of breaches, critics silenced, and China outraged. As analysts and cybersecurity experts make predictions about the future of cyber and the advancements we can expect to see in artificial intelligence (AI), it’s worth taking a moment to think about the power of machines and their impact on human emotions. AI holds the promise that someday computers will possess emotional intelligence, but will computers ever really be able to mimic our natural human emotions? Everything from mere words, names, and numbers evokes strong feelings in people, and few names elicit the strong emotional response as that of... Continue reading
Posted Jan 2, 2018 at (ISC)² Blog
Image
Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)²’s new look two-day Secure Summits bring multi-subject sessions from hands on practical workshops to keynotes and panel discussions, featuring local and international industry experts to maximise the learning experience and CPE opportunities. Serving the entire (ISC)² EMEA professional community with five regional events, the Summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members. Read on for insights from one of our popular Secure Summit UK sessions: Day... Continue reading
Posted Jan 2, 2018 at (ISC)² Blog
Image
UPS, FedEx, USPS and other delivery workers have been on overdrive for weeks. Online shopping can ease the stress of the season, but is it safer to confront the crowds? Let’s be honest, consumers are not waiting until off hours to fill their digital carts. Hackers prey on the knowledge that it’s ever more difficult for end users to distinguish the difference between fraudulent and valid emails, which presents security issues to the enterprise as well. For the cybersecurity of end users (and the companies where they work) many headlines this week, have shared tips on how to avoid falling... Continue reading
Posted Dec 22, 2017 at (ISC)² Blog
Image
By Lorna Trayan, Associate Partner Security at IBM Security Services As I realized that the year is almost over, I had a thought: wouldn’t it be great if we could get a crystal ball and see what the future holds for us? Although I would love to know about my personal life, it’s the cybersecurity world I’m referring to here! Alas, since that’s not possible, we will all have to settle on reading the reports coming out and talking about future “predictions” of the security realm. Predictions, even if sometimes don’t come exactly true, would still assist us in taking... Continue reading
Posted Dec 21, 2017 at (ISC)² Blog
Image
Starting December 18, 2017 all English CISSP exams will be administered in a Computer Adaptive Testing (CAT) format. But what does this actually mean for those preparing for the exam? Let’s look at 4 things to expect when you sit for the CISSP CAT exam: The passing score is the same. You still need to score 700 out of 1000 to pass the CISSP exam. The content is exactly the same as the “old” (linear-based) exam format. The questions come from the same bank, and the pass rate will be unchanged by this format update. You can still take breaks.... Continue reading
Posted Dec 20, 2017 at (ISC)² Blog
Image
Name: Todd A. Painter Title: Network Engineer Employer: UNG, Inc. Location: Boiling Springs, SC (USA) Years in IT: 7 Years in information security: 3 Cybersecurity certifications: SSCP, Security+, working on CISSP How did you decide upon a career in cybersecurity? Looking at the current scope of IT, it was apparent to me that the IT security field would have the largest growth in the coming years. With that in mind, I knew that I had a good chance at becoming a valuable asset to any company that needed a security expert, or someone with more of a security mindset rather... Continue reading
Posted Dec 19, 2017 at (ISC)² Blog
Image
Though more attention has come to the security industry, cyber crime continues to challenge defense. Cybersecurity can no longer be ignored. In case you missed the press release last week, we’re letting you know that (ISC)² announced an open call for expert cybersecurity speakers for our 2018 Security Congress. In fact, there was lots of news coming out of (ISC)² last week. We are also welcoming nominations for the 2018 Information Security Leadership Award – Government. It’s the end of the year, which means the start of a new one. With the new year comes the promise of growth and... Continue reading
Posted Dec 18, 2017 at (ISC)² Blog
Image
This week saw the first-ever (ISC)² EMEA Information Security Leadership Awards (ISLA) take place at Secure Summit UK in London. The awards offered the chance for our community to recognise peers going the extra mile to enhance security in the region. Individuals could be nominated in four categories: Senior Information Security Professional, Information Security Practitioner, Up-and-Coming Information Security Professional and Woman Information Security Professional; with submissions being judged by members of the Europe, Middle East and Africa Advisory Council (EAC). Impressively, over 200 submissions were received and after much deliberation, the nominations were shortlisted down to the four winners; after... Continue reading
Posted Dec 15, 2017 at (ISC)² Blog
Image
(ISC)²’s 2018 Security Congress will take place October 8-10 in New Orleans. Last year’s sold-out event was in Austin and included 185 speakers and 2,000 attendees. We expect Congress in the Big Easy, as New Orleans is called, to be even bigger! “Security Congress is built by the most prominent professionals in the cybersecurity industry – our members,” said (ISC)² Managing Director for North America Brian Correia. “It’s an annual event that’s uniquely aimed at the day-to-day cybersecurity practitioner. We had record attendance last year at our first independent Security Congress with 2,000 attendees, and we hope to grow the... Continue reading
Posted Dec 14, 2017 at (ISC)² Blog
Image
Understanding which certification is right for you can be a daunting task. (ISC)² itself has a portfolio of credentials related to cybersecurity, with specializations in certain areas. Credential Engine hopes to help people navigate the sometimes-cloudy world of certifications. Launched on December 7, 2017, Credential Engine is a nonprofit organization dedicated to promoting transparency and literacy in the credential marketplace, to make it easier for people to figure out what certification is best for them no matter where they find themselves in their career. The organization came out of the Credential Transparency Initiative (CTI) which started back in 2013. While... Continue reading
Posted Dec 12, 2017 at (ISC)² Blog
Image
Name: James Packer Title: Security and Cloud Specialist Employer: Big 4 Firm Location: London, UK Education: Information Technology and Security Years in IT: 10 Years in Cybersecurity: 5 Cybersecurity Certifications: CISSP, CCSP, CIS F ISO27001 How did you get in to a career in cybersecurity? I’d say I’m like countless security professionals out there, I first started in IT and security was just a part of my job, inherent in every role I performed. I started in desktop support, progressing through the service desk lines to a managerial role, before moving in to projects and architecture- “solutionising” as I call... Continue reading
Posted Dec 11, 2017 at (ISC)² Blog
Image
If leadership truly does come from the top, having Kirstjen Neilsen as the newest Homeland Security secretary may prove promising when it comes to filling the jobs gap. After all, she’s the first person to bring industry experience to the role. Few things have the ability to obliterate people’s passion for their work like a terrible boss, especially when that boss lacks the knowledge and skills needed to guide an organization’s growth. But Kirstjen Neilsen certainly has the potential to really reform and improve the Department of Homeland Security. It’s exciting times, but that is not all the notable news... Continue reading
Posted Dec 8, 2017 at (ISC)² Blog
Image
When Uber’s massive data breach made it to the public’s ears recently, it became a member of an infamous group of companies who not only had vital customer data stolen, but who sat on the story and did not inform the public or the media until much later. The reasons for data breaches vary, but are heavily tinted by human errors and the presence of unprotected files or weaknesses on cloud servers. This is something that should make all cloud service providers (CSPs) sit up and take notice. Bad PR for one is bad PR for all. The fact is,... Continue reading
Posted Dec 7, 2017 at (ISC)² Blog
Image
By Cevn Vibert, ICS Industrial Cyber Physical Security Advisor Cevn will be hosting the session Grass Roots Industrial Control Security at (ISC)² Secure Summit UK, between 12th and 13th December 2017. The industrial cybersecurity market is facing rapid changes as more threats are discovered, more impact is felt by end-users and cybersecurity vendors vie for leadership. My session will highlight both alerts and advice for end-users of automation and control systems (ICS/OT), as well as selected advisory notes for practitioners of Industrial Cyber Physical Security. Strategic methodologies and programmes of activities for mitigation of impacts on IIOT, IOT and how... Continue reading
Posted Dec 6, 2017 at (ISC)² Blog
Image
Name: Mario Damar Bardowell Title: Security Analyst Employer: Leidos Location: Orlando, Florida, U.S.A. Degree: B.S. in Network Systems Communications Years in IT: 8 Years in information security: 2 Cybersecurity certifications: SSCP, CISSP, CompTIA’s CASP and Security +, CEH How did you decide upon a career in cybersecurity? The decision to pursue a career in cybersecurity was made due to the impression I received when I got a chance to work with an information security professional in my very first role as a help desk analyst. The man was sharp and always did things by the book. He didn't cut corners... Continue reading
Posted Dec 5, 2017 at (ISC)² Blog
Image
It’s not only the tech sector that’s talking about cybersecurity. The cybersecurity industry has been advocating for awareness training for the better part of the last decade, and since the Equifax breach, security has gone mainstream. With its new popularity, cybersecurity has evolved into a hot political issue as well. One result of the attention is increased regulations, which has many defense contractors scrambling to meet the December 31, 2017 deadline for Defense Federal Acquisition Regulation Supplement (DFARS) compliance. In a year of many major breaches, legislators are eager to move forward on the Consolidated Audit Trail (CAT) project to... Continue reading
Posted Dec 1, 2017 at (ISC)² Blog
Image
Following the jubilant moment of finding out you have achieved a passing score on your (ISC)² exam, you’re now ready for the endorsement process – but what does that actually mean? First, believe us when we say that the hard part is over! You’ve already passed the exam, and there’s no reason to be anxious or delay your endorsement. Especially if you’ve heard any of the endorsement myths below we are about to bust. Endorsement isn’t important It sure is! Becoming a certified member of (ISC)² is more than simply passing an exam, no matter how rigorous and challenging that... Continue reading
Posted Nov 29, 2017 at (ISC)² Blog
Image
The (ISC)² EMEA Secure Webinar series features live and on-demand online events where industry thought leaders, (ISC)² members and solution providers share their views on a variety of topics to help cybersecurity professionals in tackling the current threats and challenges they may be facing today. From GDPR to malware, the themes vary greatly, offering valuable insight into a wide range of areas concerning information security. The webinars are also free to members and non-members, timed conveniently for European, Middle East and African audiences and provide opportunities to earn CPEs. If you’re not familiar with the series or are perhaps interested... Continue reading
Posted Nov 28, 2017 at (ISC)² Blog
Image
In light of Uber’s most recent breach news, that comes on the heels of several other notable breaches, some question whether the cybersecurity industry is able to keep up. Brian Krebs engaged a wide audience on Twitter when he asked whether Uber’s choice to pay hackers to cover up a major breach was any different from paying a ransomware fee to have files decrypted. Optimists hope that the recent attacks will serve to raise the bar in cybersecurity policies and practices. Yet, here we are at the start of the holidays, bombarded with lists of ways to beware of cyber... Continue reading
Posted Nov 27, 2017 at (ISC)² Blog