This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
Data breaches are happening far too often. Stories about personal information being compromised are part of the daily news cycle. But even after the fact, many people are still not taking internet safety seriously. Let’s not forget that human error causes 90 percent of security incidents. Training employees about cybersecurity is essential but educating younger generations from the moment they gain access to the internet, should be a priority. This year, at (ISC)² Security Congress in New Orleans, cyber, information, software and infrastructure security professionals will learn about cyber safety education thanks to the Center for Cyber Safety and Education,... Continue reading
Posted 5 days ago at (ISC)² Blog
Image
Name: Dr. Mari Spina Title: Principal Cyber Security Engineer Employer: The MITRE Corporation Division: MITRE Cyber Security Technical Center Degree: BSME, MSEE, Doctor of Science Engineering Management Years in IT: 26 Years in cybersecurity: 9 Cybersecurity certifications: CISSP, ISSEP, CCSP How did you decide upon a career in cybersecurity? As a U.S. Government contractor since the late 80s, I’ve worked to combat an ever increasing, continuously morphing cyber warfare threat. Frankly, I want to be sure that the U.S. remains strong in its defenses on both military and industrial fronts. I feel this is simply the best way for me... Continue reading
Posted Jun 4, 2018 at (ISC)² Blog
Image
by Denise Murtagh-Dunne, Information Security Manager, PWC Ireland From my early childhood, I developed a passion for unravelling the mysteries of how machines worked. My father was a mechanic and, as a child, he would let me help taking car engines apart. This is where I first developed a fascination with getting “under the hood” of machines and understanding their inner mechanics. At school, I then took a computer module which triggered my interest in computing and I chose to study Computer Programming in college. I survived the period of the dot-com bubble bursting and landed an IT technical support... Continue reading
Posted May 29, 2018 at (ISC)² Blog
Image
On May 7th and 8th, (ISC)² hosted its annual Secure Summit D.C. (SSDC) cybersecurity conference. (ISC)² Secure Summit DC evolved from (ISC)² CyberSecureGov to assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. Three local (ISC)² Chapters were represented at the event: Quantico Chapter, National Capital Region (NCR) Chapter, and the NOVA Chartering Chapter. The chapters each hosted a table at the event, where 850+ attendees were able to ask questions, learn more about the (ISC)² Chapter Program, and even express interest in joining a local chapter. The (ISC)² National Capital Region (NCR)... Continue reading
Posted May 24, 2018 at (ISC)² Blog
Image
As investments in public cloud computing continue to grow, so do cloud-related security incidents. Over the past 12 months, 18 percent of organizations have experienced a cloud security incident, double the number reported in the previous 12-month period, according to a recent report. Not surprisingly, concerns over cloud security also are rising, with more than nine out of 10 cybersecurity professionals – 91 percent, to be exact – saying they are worried about it. This, too, represents an increase from the previous polling period, when 81 percent of cybersecurity professionals expressed similar fears, and reverses a multiple-year downward trend. The... Continue reading
Posted May 21, 2018 at (ISC)² Blog
A data breach hits headquarters at 3 a.m. Are your critical assets secure? Hire (ISC)²-certified cybersecurity professionals to prepare for, prevent and recover from attacks. Continue reading
Posted May 17, 2018 at (ISC)² Blog
Image
by Tamer Gamali, CISSP, CISO Mashreq Bank, and member of the (ISC)² EMEA Advisory Council Is the CISO well positioned to mitigate operational risk? (ISC)² will be asking this probing question of Security leaders at the kick-off session for Infosecurity Europe’s Leaders Programme in London next month. A round table discussion conducted under the Chatham House Rule, the session creates an opportunity to offer up frank comment and illuminate the challenges currently hampering companies from appreciating and truly gaining control of cyber risks. Infosecurity Europe’s Leaders Programme is open to CISOs and Heads of Information Security, who are the final... Continue reading
Posted May 16, 2018 at (ISC)² Blog
Image
Name: Kreesan Govender Title: Information Security Risk and Compliance Specialist Employer: MiWay Insurance (Santam Group) Location: Johannesburg, South Africa Education: National Diploma Computer Network Engineering Years in IT: 5 Years in Cybersecurity: 4 Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I have always found hacking and data breaches interesting since my days at campus, and when I was given the opportunity to start my career within the cybersecurity field, I jumped at the opportunity. Since starting my career in cybersecurity, I have enjoyed every bit and have never looked back. How did you decide to... Continue reading
Posted May 14, 2018 at (ISC)² Blog
Image
Nearly 900 cybersecurity professionals attended Secure Summit DC at the beautiful MGM National Harbor hotel. The two-day training event included more than 35 sessions in four tracks. Keynote speakers covered topics from resourcefulness to security culture, sociology to workforce development and beyond. A noteworthy theme evolved throughout the event, as speakers from both the private and public sectors – including many from the (ISC)² Board of Directors – acknowledged the need for a greater understanding of the cybersecurity basics both inside and outside the industry. “We’re in the golden age of threats,” said John McCumber, director of cybersecurity advocacy at... Continue reading
Posted May 10, 2018 at (ISC)² Blog
Image
By and large, female and male cybersecurity professionals share the same workplace values, priorities and aspirations. Both place about the same level of importance on matters such as salary and working close to home – and both apply roughly the same skills to their work and view protecting people and data as their primary function, according to recent (ISC)2 research. In a survey of 250 cybersecurity professionals, (ISC)2 also discovered the number of men and women looking for new employment is exactly the same: 85 percent of cybersecurity workers are open to new employment opportunities, including 14 percent who are... Continue reading
Posted May 4, 2018 at (ISC)² Blog
Image
Name: Paul Bryant Title: CIO Employer: phew! Cyber Security Location: Auckland, New Zealand Education: MCom (Hons), LLB (Hons) Years in IT: 20 Years in cybersecurity: 15 Cybersecurity certifications: CISSP How did you decide upon a career in cybersecurity? In my roles designing and managing financial services technology infrastructures and leading technology teams I had a good deal of both technical and non-technical exposure to information security considerations and solutions. It is a complex and ever-changing area that bridges business and technology, and requires both technical and commercial engagement. It is also an area that is under-served in industry. Why did... Continue reading
Posted Apr 19, 2018 at (ISC)² Blog
Image
(ISC)² Bangalore Chapter 7th Security Meet The (ISC)² Bangalore Chapter conducted its 7th Security Meet on 17th March, 2018 at Honeywell Technology Solutions. The event offered its fellow security professionals an opportunity to hear from and discuss with security experts from various industries. The chapter has picked up pace and matured with respect to its steadily growing membership count in quality and quantity. Currently at the count of 73 members and counting, this chapter promises to sincerely promote its purpose and vision of building a strong network of security professionals. The half day event featured three major keynote presentations along... Continue reading
Posted Apr 19, 2018 at (ISC)² Blog
Image
Finalists have been announced for the 2018 Information Security Leadership Awards (ISLA®) Government. The ISLA Government program recognizes the ongoing commitment and achievements of individuals and teams whose initiatives, processes or projects have led to significant improvements in the security posture of a U.S. department, agency or government (state, local or federal). "Some projects are not well-known to either the public or the information security professional community. Recognizing a practitioner through the ISLA awards provides awareness of some of the important projects happening throughout the government." - Kris Thomas, CISSP, 2018 Nominator The awards ceremony will take place at the... Continue reading
Posted Apr 16, 2018 at (ISC)² Blog
Thank you for volunteering! We are working our way through the volunteers, so it will take several weeks before we can provide updates. Once you've sent in your information, though, you are in our database to work through as we organize the workshops. You'll be contacted when we have an updated. I confirmed and we do have you in our system, although I am not privy to the selection process or status of individuals.
Toggle Commented Apr 16, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Please send your (ISC)² ID# to examdevelopment@isc2.org and they will put you on the list of volunteers. Thank you!!
Toggle Commented Apr 16, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Image
Name: Thien Phan (ISC)² Exams Passed: CISSP and CCSP Title: Cybersecurity, Privacy and IT Risk Associate Employer: PricewaterhouseCoopers (PwC) Location: New York City, NY, U.S.A. Education: MBA degree and Bachelor’s Degree in Management Information Systems (MIS) from Binghamton University Years in IT: 1 year Years in cybersecurity: 1 year Cybersecurity certifications: Security+, CCNA Cyber Ops How did you decide upon a career in cybersecurity? It was back in my third year of college when I interned for a multimedia company as a database administrator. I did not know much about how different technologies worked together. I was introduced to the... Continue reading
Posted Apr 11, 2018 at (ISC)² Blog
Image
(ISC)²’s theme for 2018 is Enrich. Enable. Excel. In an effort to enable our members to be the best in their field, we have partnered with A Cloud Guru to offer a one-month free membership to A Cloud Guru. This benefit allows members exclusive access to cloud security education from A Cloud Guru, which delivers an array of cloud security courses to enable cybersecurity professionals to better defend their data in the cloud. Cloud security was identified as the number one skill security professionals needed to acquire or strengthen to advance their career, according our 2017 Global Information Security Workforce... Continue reading
Posted Apr 9, 2018 at (ISC)² Blog
I have shared your info w/our exam development team, Dr. Louis - thank you!
Toggle Commented Apr 5, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Hello! Instructors are prohibited from participating in item writing workshops due to exposure to exam content. You must wait two years after being an item writer before you can become eligible to act as an instructor. I hope this helps!
Toggle Commented Apr 5, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Image
By Kwinton Scarbrough, CISSP In the midst of the business and technology merge, organizations of all industries have started their journey into the cognitive era of cybersecurity. In this era, it is essential for a business to have an IT security strategy to govern how the organization will protect itself from internal and external cyber threats. However, what commonly fails to align to IT security strategy is the organization’s overall security culture. IT security strategy can only be effective if there is a strong security culture embedded into the very fabric of the company’s operations. Today, I will cover the... Continue reading
Posted Apr 2, 2018 at (ISC)² Blog
Image
To ensure the CISSP exam remains up-to-date and relevant to the industry, we are constantly working on the exam items (aka “questions”), and that process is 100% member-driven! (ISC)² spoke with Lisa Vaughan, CISSP, about her experience in a recent Item Writing Workshop. Lisa is the Chief Information Officer for the Mississippi Department of Environmental Quality and it was her first-time volunteering as an item writer. She was a participant in a CISSP Item Writing Workshop that took place in Tampa, Florida. The workshop spans three days, taking these dedicated member volunteers away from their jobs and family for a... Continue reading
Posted Mar 30, 2018 at (ISC)² Blog
Image
Name: Debi Carr Title: CEO and Consultant Employer: D. K. Carr and Associates, LLC Location: Christmas, FL, U.S.A. Years in IT: 28 years Years in cybersecurity and/or privacy: 20 years Cybersecurity certifications: HCISPP, CAHIMS How did you decide upon a career in healthcare security and/or privacy? As a practice manager of a healthcare practice, I was appointed the “Privacy and Security” Officer when HIPAA went into effect. I was also responsible for overseeing the technology in the practice through the years. As a result, I began educating myself on security and privacy protocols. Why did you decide to pursue your... Continue reading
Posted Mar 29, 2018 at (ISC)² Blog
Image
There’s no question cybersecurity professionals are busy people, but what takes up their time at work? According to recent (ISC)2 research, the skills they most employ each day are network monitoring, security analysis and security administration, while forensics and penetration analysis rank at the bottom. But if you ask those who are actively looking for a new job, the daily task that comes up most often is user awareness training. Some 38% of respondents who said they’d be starting a job search within six months revealed they conduct user training every day, while 31% do it two to three times... Continue reading
Posted Mar 20, 2018 at (ISC)² Blog
Image
Non-white cybersecurity workers outnumber their white counterparts in advanced education degrees (master’s and higher), but they are still underrepresented in managerial positions. As a group, minority professionals also get paid less than Caucasians, according to a new report from (ISC)2. The report, Innovation Through Inclusion: The Multicultural Cybersecurity Workforce suggests ethnic and racial minority professionals face barriers to advancement that don’t seem to apply to Caucasians. The same is true when it comes to salaries, as Caucasian workers significantly out-earn their multicultural peers. Minority workers make up 26% of the U.S. cybersecurity workforce, just five points above the overall minority... Continue reading
Posted Mar 15, 2018 at (ISC)² Blog
(ISC)² Management is now following Wesley Simpson
Mar 15, 2018