This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
Name: Paul Bryant Title: CIO Employer: phew! Cyber Security Location: Auckland, New Zealand Education: MCom (Hons), LLB (Hons) Years in IT: 20 Years in cybersecurity: 15 Cybersecurity certifications: CISSP How did you decide upon a career in cybersecurity? In my roles designing and managing financial services technology infrastructures and leading technology teams I had a good deal of both technical and non-technical exposure to information security considerations and solutions. It is a complex and ever-changing area that bridges business and technology, and requires both technical and commercial engagement. It is also an area that is under-served in industry. Why did... Continue reading
Posted 7 days ago at (ISC)² Blog
Image
(ISC)² Bangalore Chapter 7th Security Meet The (ISC)² Bangalore Chapter conducted its 7th Security Meet on 17th March, 2018 at Honeywell Technology Solutions. The event offered its fellow security professionals an opportunity to hear from and discuss with security experts from various industries. The chapter has picked up pace and matured with respect to its steadily growing membership count in quality and quantity. Currently at the count of 73 members and counting, this chapter promises to sincerely promote its purpose and vision of building a strong network of security professionals. The half day event featured three major keynote presentations along... Continue reading
Posted 7 days ago at (ISC)² Blog
Image
Finalists have been announced for the 2018 Information Security Leadership Awards (ISLA®) Government. The ISLA Government program recognizes the ongoing commitment and achievements of individuals and teams whose initiatives, processes or projects have led to significant improvements in the security posture of a U.S. department, agency or government (state, local or federal). "Some projects are not well-known to either the public or the information security professional community. Recognizing a practitioner through the ISLA awards provides awareness of some of the important projects happening throughout the government." - Kris Thomas, CISSP, 2018 Nominator The awards ceremony will take place at the... Continue reading
Posted Apr 16, 2018 at (ISC)² Blog
Thank you for volunteering! We are working our way through the volunteers, so it will take several weeks before we can provide updates. Once you've sent in your information, though, you are in our database to work through as we organize the workshops. You'll be contacted when we have an updated. I confirmed and we do have you in our system, although I am not privy to the selection process or status of individuals.
Toggle Commented Apr 16, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Please send your (ISC)² ID# to examdevelopment@isc2.org and they will put you on the list of volunteers. Thank you!!
Toggle Commented Apr 16, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Image
Name: Thien Phan (ISC)² Exams Passed: CISSP and CCSP Title: Cybersecurity, Privacy and IT Risk Associate Employer: PricewaterhouseCoopers (PwC) Location: New York City, NY, U.S.A. Education: MBA degree and Bachelor’s Degree in Management Information Systems (MIS) from Binghamton University Years in IT: 1 year Years in cybersecurity: 1 year Cybersecurity certifications: Security+, CCNA Cyber Ops How did you decide upon a career in cybersecurity? It was back in my third year of college when I interned for a multimedia company as a database administrator. I did not know much about how different technologies worked together. I was introduced to the... Continue reading
Posted Apr 11, 2018 at (ISC)² Blog
Image
(ISC)²’s theme for 2018 is Enrich. Enable. Excel. In an effort to enable our members to be the best in their field, we have partnered with A Cloud Guru to offer a one-month free membership to A Cloud Guru. This benefit allows members exclusive access to cloud security education from A Cloud Guru, which delivers an array of cloud security courses to enable cybersecurity professionals to better defend their data in the cloud. Cloud security was identified as the number one skill security professionals needed to acquire or strengthen to advance their career, according our 2017 Global Information Security Workforce... Continue reading
Posted Apr 9, 2018 at (ISC)² Blog
I have shared your info w/our exam development team, Dr. Louis - thank you!
Toggle Commented Apr 5, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Hello! Instructors are prohibited from participating in item writing workshops due to exposure to exam content. You must wait two years after being an item writer before you can become eligible to act as an instructor. I hope this helps!
Toggle Commented Apr 5, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Image
By Kwinton Scarbrough, CISSP In the midst of the business and technology merge, organizations of all industries have started their journey into the cognitive era of cybersecurity. In this era, it is essential for a business to have an IT security strategy to govern how the organization will protect itself from internal and external cyber threats. However, what commonly fails to align to IT security strategy is the organization’s overall security culture. IT security strategy can only be effective if there is a strong security culture embedded into the very fabric of the company’s operations. Today, I will cover the... Continue reading
Posted Apr 2, 2018 at (ISC)² Blog
Image
To ensure the CISSP exam remains up-to-date and relevant to the industry, we are constantly working on the exam items (aka “questions”), and that process is 100% member-driven! (ISC)² spoke with Lisa Vaughan, CISSP, about her experience in a recent Item Writing Workshop. Lisa is the Chief Information Officer for the Mississippi Department of Environmental Quality and it was her first-time volunteering as an item writer. She was a participant in a CISSP Item Writing Workshop that took place in Tampa, Florida. The workshop spans three days, taking these dedicated member volunteers away from their jobs and family for a... Continue reading
Posted Mar 30, 2018 at (ISC)² Blog
Image
Name: Debi Carr Title: CEO and Consultant Employer: D. K. Carr and Associates, LLC Location: Christmas, FL, U.S.A. Years in IT: 28 years Years in cybersecurity and/or privacy: 20 years Cybersecurity certifications: HCISPP, CAHIMS How did you decide upon a career in healthcare security and/or privacy? As a practice manager of a healthcare practice, I was appointed the “Privacy and Security” Officer when HIPAA went into effect. I was also responsible for overseeing the technology in the practice through the years. As a result, I began educating myself on security and privacy protocols. Why did you decide to pursue your... Continue reading
Posted Mar 29, 2018 at (ISC)² Blog
Image
There’s no question cybersecurity professionals are busy people, but what takes up their time at work? According to recent (ISC)2 research, the skills they most employ each day are network monitoring, security analysis and security administration, while forensics and penetration analysis rank at the bottom. But if you ask those who are actively looking for a new job, the daily task that comes up most often is user awareness training. Some 38% of respondents who said they’d be starting a job search within six months revealed they conduct user training every day, while 31% do it two to three times... Continue reading
Posted Mar 20, 2018 at (ISC)² Blog
Image
Non-white cybersecurity workers outnumber their white counterparts in advanced education degrees (master’s and higher), but they are still underrepresented in managerial positions. As a group, minority professionals also get paid less than Caucasians, according to a new report from (ISC)2. The report, Innovation Through Inclusion: The Multicultural Cybersecurity Workforce suggests ethnic and racial minority professionals face barriers to advancement that don’t seem to apply to Caucasians. The same is true when it comes to salaries, as Caucasian workers significantly out-earn their multicultural peers. Minority workers make up 26% of the U.S. cybersecurity workforce, just five points above the overall minority... Continue reading
Posted Mar 15, 2018 at (ISC)² Blog
(ISC)² Management is now following Wesley Simpson
Mar 15, 2018
Image
Focused on “Securing Ghana’s Digital Journey,” the Republic of Ghana’s Ministry of Communications recently united representatives from multiple international bodies for National Cyber Security Week (NCSW). Members of the (ISC)2 Ghana Chapter played key roles in ensuring the event’s success. Opened by Ghana President H.E. Nana Addo Dankwah Akufo-Addo, the weeklong forum gathered participants from the Council of Europe (GLACY +), the United States/Security Governance Initiative, the United Nations, ECOWAS, African Union Commission, and others. (ISC)2 Ghana Chapter Treasurer Alexander Oppong, CISSP, served on the NCSW Planning Committee responsible for the event’s funding, exhibiting, sponsor selection, and physical/cyber security. Ghana... Continue reading
Posted Mar 15, 2018 at (ISC)² Blog
Image
Name: Bryan Bell Title: Senior Director, P2PE Employer: Coalfire Systems, Inc. Location: Alpharetta, Georgia, U.S.A. Education: Clayton State University, Computer Science Years in IT: 25+ Years in cybersecurity and/or privacy: 12+ Cybersecurity certifications: HCISPP, HITRUST CSF, ISO 27001 Lead Auditor, CFCP, PCI QSA (PA-P2PE) How did you decide upon a career in healthcare security and/or privacy? I’ve enjoyed working within information technology since high school and through college where I was developing applications and learning systems design and networking. I’ve always been drawn to healthcare security, because there is a continuing dilemma from healthcare providers to balance technology and information... Continue reading
Posted Mar 13, 2018 at (ISC)² Blog
By now, you’ve heard that the CISSP exam format has changed from linear to Computer Adaptive Testing (CAT). This change to the English language exam started in December of 2017. If have questions about what this change means for you, as you’re preparing for your CISSP, we’ve got answers in our latest video: Looking for even more information? Check out our CISSP CAT FAQs. Continue reading
Posted Mar 6, 2018 at (ISC)² Blog
Image
By Wesley Simpson, COO, (ISC)² Some have called the skills gap in IT and cybersecurity a national security crisis. Yet, it’s one that most everyone in the industry doesn’t know how to solve. Many look to automation and other technologies as a solution to the problem. Others foster relationships that will fill the pipeline and attract new talent. But there is no ONE solution. Instead, organizations need to both build and buy the talent they need. The growing gap between skills needed and qualified candidates is not a problem that technology alone can solve, but it is one that is... Continue reading
Posted Mar 2, 2018 at (ISC)² Blog
Image
Every year, (ISC)² and The Centre for Cyber Safety and Education award a range of scholarships to individuals pursuing, or planning to pursue a degree in cybersecurity or information security. Addressing the cybersecurity skills gap The aim of these initiatives are to help bridge the cybersecurity workforce skills gap - which our research predicts to reach a 1.8 million shortfall in the next four years - and improve diversity within the profession; by providing future information security professionals with Undergraduate, Graduate or Women’s scholarships to assist them in preparing for their rewarding career in this vital sector. How the scholarship... Continue reading
Posted Mar 1, 2018 at (ISC)² Blog
Image
Even though 85% of cybersecurity professionals would consider new job opportunities, it’s getting harder for employers to attract and retain qualified candidates. There just aren’t enough experienced cybersecurity workers to hire, and those already employed are constantly being wooed by recruiters. Only 15% of currently employed cybersecurity workers are planning to stay put, according to recently completed (ISC)2 research. Among the rest, 14% are actively looking for a new job and 75% are open to opportunities. This means we will likely see a hubbub of activity in the cybersecurity job market throughout 2018. Employers face an uphill battle. You not... Continue reading
Posted Feb 28, 2018 at (ISC)² Blog
Image
By John McCumber, Director of Cybersecurity Advocacy, (ISC)² North America Region I am thoroughly stoked to announce The Lexicon Project has finally come to fruition. The first thousand copies are being printed as I type this. It has taken several months, and the support of our full team here at (ISC)², but it has happened. I also want to acknowledge the critical advice from our North American Advisory Council (NAAC) for their input to the lexicon. But, why would we take this on as one of the first projects for the new Cybersecurity Advocate’s role? The third week of my... Continue reading
Posted Feb 26, 2018 at (ISC)² Blog
Image
By Tamer Gamali, CISSP, CISO and member, (ISC)² EMEA Advisory Council As a Chief Information Security Officer (CISO) based in Dubai with 15 years working in financial services, and a member of (ISC)²’s EMEA Advisory Council I am keen to help companies develop a deeper understanding of how operational risks are evolving with cyberthreats. I have become aware of a growing body of opinion within cybersecurity circles that suggests the senior management tier represents a significant threat to their businesses today. They are a group that understands and works hard to mitigate risk, but, as more and more companies move... Continue reading
Posted Feb 22, 2018 at (ISC)² Blog
Image
Name: Rachel Phillips, PMP, Assoc. (ISC)² (ISC)² Exam(s) Passed: CISSP Title: Cybersecurity Analyst Location: Seattle, WA, U.S.A. Education: M.S. Information Technology (Security and Assurance) and B.S. Business Administration (New Media and Internet), Kaplan University Years in IT: 10 Years in Cybersecurity: 3 Cybersecurity Certifications: Associate of (ISC)² Rachel Phillips, PMP, Assoc. (ISC)² is an influencer and sought-after contributor for her views and leadership in technology and security. She holds a Master’s in IT with emphasis in Information Security and Assurance, and a Bachelor’s in Business Administration from Kaplan University. As a cybersecurity analyst, she provides oversight and assurance of meeting... Continue reading
Posted Feb 21, 2018 at (ISC)² Blog
Image
In this ever-changing field, you’re constantly required to learn about new tools, vulnerabilities and threats. We know that time and financial resources may get in the way of participating in CPE offerings that help you sharpen your skills and hone your craft. We are committed to enabling our members to become the most well-rounded and effective cybersecurity practitioners around so we’ve compiled a list of CISSP CPE opportunities that will work for your busy schedule. Online CPE Opportunities: Read InfoSecurity Professional Magazine (and take the quiz) Watch a CPE webinar (including any of our cybersecurity webinar series: ThinkTank, e-Symposium, From... Continue reading
Posted Feb 19, 2018 at (ISC)² Blog