This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
Name: Marco Fernandes Title: Lead Security Solutions Architect Employer: Hewlett Packard Enterprise Location: Dallas/Ft. Worth, Texas, U.S.A. Degree: Bachelor of Science in Business Computer Information Systems Years in IT: 4 Years in information security: 8 Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I grew up with a love of technology and cybersecurity, along with a curiosity for business. So when I got to college, I wasn’t sure what I should major in. My brilliant brother, Roger Fernandes, encouraged me to pursue a degree in Business Computer Information Systems (BCIS). After seeing news of so many... Continue reading
Posted yesterday at (ISC)² Blog
Image
This year marks the first ever (ISC)² EMEA Information Security Leadership Awards (ISLA), a chance for our community to recognise fellow information security and management professionals going the extra mile to enhance security across Europe, the Middle East and Africa. Overall, we received a staggering number of impressive submissions, over 200, and these were shortlisted down to our finalists by our judges, members of the Europe, Middle East and Africa Advisory Council (EAC). Winners will be announced at our Secure Summit UK on 12 December 2017. In the meantime, we have been sharing their stories on the blog over the... Continue reading
Posted 2 days ago at (ISC)² Blog
Image
Security experts and practitioners from around the world gathered at the 11th annual SecTor conference in Toronto last week. Among other highlights, there was a lot of focus on the evolution of technology in addressing cybersecurity challenges. In his keynote address, IBM Resilient CTO Bruce Schneier called for increased government regulations in order to improve cybersecurity. If you were side tracked by the industry news coming out of SecTor, there might have been some happenings that flew under your radar. Here’s a look at other interesting headlines to help get you up to speed on different news worthy stories across... Continue reading
Posted 3 days ago at (ISC)² Blog
Image
If you are a cloud service provider (CSP), much of your credibility will come from your transparency. Clients will constantly worry about your ability to remain secure and reliable in all areas of operations, and they will compare it to what they know best – their own in-house system. Bedside manner and customer experience are vital components of a CSP’s offerings, but they are underused commodities. Cloud Tweaks most recent blog, How Security Certification Helps Cloud Service Providers Stay Transparent and Credible, reveals how partnering up with a Certified Cloud Security Professional (CCSP) can make all the difference in ensuring... Continue reading
Posted 7 days ago at (ISC)² Blog
Image
If earning a professional certification were easy, everyone would have one. The truth is, making the decision to advance your career is a major undertaking. Planning for the process is the best way to set yourself up for success on the certifications you need to advance your infosec career. In order to manage your expectations, it is important to be realistic about the commitment you’re making. Following these five steps will set you up for success by ensuring that you are choosing the certifications you need based on the skills you currently have and where you want to take your... Continue reading
Posted Nov 15, 2017 at (ISC)² Blog
Hi Jan! We don't know how many have programs, no. But we are hoping to see more growth as the success of the professionals coming through programs like that - and in turn the success of those organizations - is appreciated!
Image
By Kaya Kazmirci, Managing Director, Kazmirci Associates Kaya will be hosting the session Mobile Payment Systems: Disruptive Development and Cyber Risks at (ISC)² Secure Summit MENA, between 21st and 22nd November 2017. Two fundamental shifts in traditional payment methods are changing the landscape of spending. Emerging blockchain-based currencies and alternative payment channels are disrupting time honored cash and credit card-based transaction service providers. Enabling cheap transactions when traditional banking services are expensive is critical for supporting business growth, especially in the developing world, where banking services are not always cheap or available. At the same time, ensuring appropriate privacy, security... Continue reading
Posted Nov 14, 2017 at (ISC)² Blog
Image
This year marks the first ever (ISC)² EMEA Information Security Leadership Awards (ISLA), a chance for our community to recognise fellow information security and management professionals going the extra mile to enhance security across Europe, the Middle East and Africa. Overall, we received a staggering number of impressive submissions, over 200, and these were shortlisted down to our finalists by our judges, members of the Europe, Middle East and Africa Advisory Council (EAC). Winners will be announced at our Secure Summit UK on 12 December 2017. In the meantime, we will be sharing their stories on the blog. Here is... Continue reading
Posted Nov 13, 2017 at (ISC)² Blog
Image
New guidelines, increased government oversight, and mounting stress in cybersecurity With the 4th quarter underway, we are starting to see lots of predictions about what the cybersecurity industry can expect to see come 2018. Thinking about the future makes it easy to forget about what is happening right now, though. Let’s take a look back at the news that happened this week to remind us of where we are, before we focus too much on where we’re going. Arguably the biggest industry-wide news of the week was the Senate Commerce Committee hearing, “Protecting Consumers in the Era of Major Breaches.... Continue reading
Posted Nov 10, 2017 at (ISC)² Blog
Image
By Tony Chebli, Senior Manager, Information Security Department/Risk Management Division, Credit Libanais S.A.L Tony will be hosting the session ISO 27001 Between the Reality and the Myth at (ISC)² Secure Summit MENA in Dubai on the 21st and 22nd November 2017. It seems like yesterday, but actually it has been over 13 years, since I obtained my ISO 27001 Lead Auditor certification and started travelling from country to country around the Middle East, preaching the benefits of ISO 27001 certification and its importance to companies that are looking to secure their information assets. I admit it was (and still is)... Continue reading
Posted Nov 9, 2017 at (ISC)² Blog
Image
Name: Greg Harris Title: Senior Security Consultant and Adjunct Professor Employer: Big 4 Firm and Kennesaw State University Location: Alpharetta, Georgia, U.S.A. Degree: MBA, MS in Information Systems, BS in Computer Science & Mathematics Years in IT: 15+ Years in cybersecurity: 13+ Cybersecurity certifications: CISSP, CCSP, CRISC, CISM, CISA, GCFA How did you decide upon a career in cybersecurity? McKesson Corporation hired me as a Security Infrastructure Engineer through a campus-recruiting program at Kennesaw State University in 2003. My undergraduate degree was a Bachelor of Science with a double major in Computer Science and Mathematics. With my Navy Electronic Warfare... Continue reading
Posted Nov 8, 2017 at (ISC)² Blog
Image
This year marks the first ever (ISC)² EMEA Information Security Leadership Awards (ISLA), a chance for our community to recognise fellow information security and management professionals going the extra mile to enhance security across Europe, the Middle East and Africa. Overall, we received a staggering number of impressive submissions, over 200, and these were shortlisted down to our finalists by our judges, members of the Europe, Middle East and Africa Advisory Council (EAC). Winners will be announced at our Secure Summit UK on 12 December 2017. In the meantime, we will be sharing their stories on the blog. Here is... Continue reading
Posted Nov 7, 2017 at (ISC)² Blog
Image
By Lorna Trayan, Associate Partner Security at IBM Security Services Lorna will be hosting the session Security Threats and Trends - Middle East Region at (ISC)² Secure Summit MENA in Dubai on the 21st and 22nd November 2017. I’m one of those speakers that every year presents a topic that has the same title. I wonder if people at some point ask themselves ‘Is she presenting this topic again?!’. I started this in 2010 and have been repeating it every year since then. What’s this miraculous topic that never gets old you wonder? The topic is Security Trends and Threats... Continue reading
Posted Nov 4, 2017 at (ISC)² Blog
Image
James Bond has entertained millions for decades. While he’s engaged in many battles and comes out victorious, his name is not a good password. Hopefully end users can learn from Manaford’s poor password practices. As the Facebook, Google, and Twitter hearings came to a close, Mark Zuckerberg assured the public that company earnings take a back seat to security. In a public announcement Zuckerberg said, “We're investing so much in security that it will impact our profitability. Protecting our community is more important than maximizing our profits." Hopefully the rest of the community follows suit. Looking at the other news... Continue reading
Posted Nov 3, 2017 at (ISC)² Blog
Image
(ISC)² Community weighs in on Cyber Shield Act of 2017 Senator Ed Markey (D-Mass) has long been concerned about securing new technology as it bleeds into our everyday lives. In 2015, Sen. Markey, a member of the Commerce, Science and Transportation Committee, released the report, Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk. Since then, smart cars have made frequent headlines, which has had the residual effect of bringing securing connecting cars to front of mind for the auto industry. We posed the question, “What do you think?” to members of the (ISC)² Community, and received... Continue reading
Posted Nov 1, 2017 at (ISC)² Blog
Image
Name: Richard Carpenter Title: Information Security Manager Employer: Global Media and Entertainment Location: Devon, United Kingdom Years in IT: 10 Years in cybersecurity: 7 Cybersecurity certifications: CISSP How did you decide upon a career in cybersecurity? In my previous role supporting Identity and Access Management, a certain amount of due diligence was required when auditing user accounts, logon usage, permissions and security best practices for Access brokers. This sparked my interest in a cybersecurity practice outside the traditional ‘Security Operations’ role. Why did you get your CISSP®? While reviewing the market for training opportunities to upskill in my new chosen... Continue reading
Posted Nov 1, 2017 at (ISC)² Blog
Image
This year marks the first ever (ISC)² EMEA Information Security Leadership Awards (ISLA), a chance for our community to recognise fellow information security and management professionals going the extra mile to enhance security across Europe, the Middle East and Africa. Overall, we received a staggering number of impressive submissions, over 200, and these were shortlisted down to our finalists by our judges, members of the Europe, Middle East and Africa Advisory Council (EAC). Winners will be announced at our Secure Summit UK on 12 December 2017. In the meantime, we will be sharing their stories on the blog. Here is... Continue reading
Posted Oct 31, 2017 at (ISC)² Blog
Image
This week’s National Cybersecurity Awareness campaign focused on feeding the pipeline to narrow the skills gap in the cybersecurity workforce. While StaySafeOnline declared “The Internet Wants You: Consider a Career in Cybersecurity,” Ransomware hopped to the headlines. Rabbit on the run ‘Bad Rabbit’, the third global outbreak of the year with similarities to NotPetya, struck companies throughout Russia and Eastern Europe with file-encrypting malware. This strand of ransomware metaphorically knocks on the user’s door by way of a malicious pop-up offering a Flash update. Though the outbreak was first reported, it’s suspected that the group behind the attack has been... Continue reading
Posted Oct 27, 2017 at (ISC)² Blog
Image
This year marks the first ever (ISC)² EMEA Information Security Leadership Awards (ISLA), a chance for our community to recognise fellow information security and management professionals going the extra mile to enhance security across Europe, the Middle East and Africa. Overall, we received a staggering number of impressive submissions, over 200, and these were shortlisted down to our finalists by our judges, members of the Europe, Middle East and Africa Advisory Council (EAC). Winners will be announced at our Secure Summit UK on 12 December 2017. In the meantime, we will be sharing their stories on the blog. Here is... Continue reading
Posted Oct 26, 2017 at (ISC)² Blog
Image
October is Cyber Security Awareness Month, as well as National Bullying Prevention Month, which means it’s the perfect time to get up-to-date on the activities of the Center for Cyber Safety and Education! Their third lesson of the Garfield’s Cyber Safety Adventuresin the Safe and Secure Online program, “Be Kind Online!” launched this month and is now available for purchase on https://www.cybersafetykits.org/ The focus of the episode is on cyberbullying. The Center now offers a new Digital subscription to the cartoon lessons featuring Garfield and his furry friends are available for your family at just $9.99 per year. The Center’s... Continue reading
Posted Oct 25, 2017 at (ISC)² Blog
Image
Name: Tiffany Temple Title: Cyber Security Analyst Employer: City of Greensboro Location: Greensboro, North Carolina, U.S.A. Education: Bachelor of Science in Management Information Systems - East Carolina University, Master of Science in Information Technology Management - University of North Carolina at Greensboro Years in IT: 5 Years in information security: 4 Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I was encouraged by my current boss to transition from Help Desk duties to an Information Security role after she saw in me the analytical skills necessary to succeed. It was a seamless transition for me and... Continue reading
Posted Oct 23, 2017 at (ISC)² Blog
Image
This year marks the first ever (ISC)² EMEA Information Security Leadership Awards (ISLA), a chance for our community to recognise fellow information security and management professionals going the extra mile to enhance security across Europe, the Middle East and Africa. Overall, we received a staggering number of impressive submissions, over 200, and these were shortlisted down to our finalists by our judges, members of the Europe, Middle East and Africa Advisory Council (EAC). Winners will be announced at our Secure Summit UK on 12 December 2017. In the meantime, we will be sharing their stories on the blog. Here is... Continue reading
Posted Oct 21, 2017 at (ISC)² Blog
It’s rare to have a day go by without some security news making headlines. This week saw #KRACK trending on social media, which raised lots of questions about the security of cybersecurity. Here’s a look at what went on this week in passwords, automation, and more. The big flaw. Undoubtedly, the most notable news in security this week was the Krack attack, which impacted millions of Wi-Fi users. Around the world, businesses and homes were vulnerable because of flaws in Wi-Fi networks that use the (WPA)2 protocol. The good news, according to Anthony Lim, member of the (ISC)2 Asian Advisory... Continue reading
Posted Oct 20, 2017 at (ISC)² Blog
Image
Name: Tony Harris Title: Consultant, Cyber Security Employer: KPMG LLP Location: Vancouver, Canada Education: MSc, Cyber Security (in progress) from the University of Liverpool, and Bachelor of Arts in American Studies & International Relations from the University of British Columbia Years in IT: 8 Years in cybersecurity: 7 Cybersecurity certifications: CISSP, CISM How did you decide upon a career in cybersecurity? I began my career in general IT processes eight years ago as your typical jack-of-all-trades IT. I wanted to narrow my focus into a specialty that I'd be interested in and cybersecurity ultimately was that choice. The reason was... Continue reading
Posted Oct 18, 2017 at (ISC)² Blog
Image
John McCumber is the newest member of the (ISC)² family. He joined the team last month and will be our first ever director of cybersecurity advocacy. John is based out of our North America Region office in Alexandria, Virginia and will be supporting the (ISC)² membership by advocating for them and the profession across the U.S. and Canada. John got his start in infosec in late 1986, when – in the middle of the night – he received a call that the DEC VAX 11/780 he was responsible for was under attack. Someone had figured out the vulnerability for the... Continue reading
Posted Oct 17, 2017 at (ISC)² Blog