This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Name: Guy Bertrand Kamga Title: Senior Security Analyst Employer: Nokia Location: Paris, France Degree: Master in Computer Science Engineering Years in IT: 14 Years in cybersecurity: 7 Cybersecurity certifications: CISSP, CCSK, CCSP How did you decide upon a career in cybersecurity? I decided to focus in cybersecurity when I realized that due to the rapid development of new technologies (e.g. social networks, cloud) and the proliferation of mobile devices, it will be more and more challenging to efficiently protect personal data and other sensitive information. Why did you get your CCSP®? I decided to take the CCSP exam to challenge... Continue reading
Posted 2 days ago at (ISC)2 Blog
In a recent blog post, I encouraged our U.S. government members to think short-term and be cautious to draw conclusions within the first 90 days of the Trump Administration. I also mentioned that one of (ISC)²’s immediate goals was to deliver a set of recommendations to the presidential team. In advance of the new administration’s 100th day in office next week, the following list of recommendations was delivered to White House Chief of Staff Reince Priebus and others on the Trump team as well as to the Subcommittee on Information Technology during a congressional hearing on April 4. With this... Continue reading
Posted 5 days ago at (ISC)2 Blog
Name: Yong Shi Title: Lecturer Employer: Shanghai JiaoTong University Location: Shanghai, China Education: Master Years in IT: 13 years Years in cybersecurity: 13 years Cybersecurity certifications: CISSP, CISA, ISO27001LA, Cobit Foundation, ITIL V3 Foundation How did you decide upon a career in cybersecurity? I studied information security during my undergraduate degree at Shanghai JiaoTong University. After graduating, I stayed to teach cybersecurity. The field of cybersecurity is enigmatic and it is a knowledge difficult to be fathomed, so I believe that is why some young people are interested in it. When I was still pursuing my studies, I volunteered as... Continue reading
Posted Apr 13, 2017 at (ISC)2 Blog
Name: Adam Gorecki Title: System Administrator/Information Security Analyst Employer: Mountain View County Location: Didsbury, Alberta, Canada Years in IT: Over 10 years Years in information security: 1 Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? Information security has been something that has always interested me. It has been at the forefront of my mind during my career as a network analyst and a system administrator. When the opportunity arose for me to take on an information security analyst role, I jumped at it. Why did you get your SSCP®? I wanted to get a designation that... Continue reading
Posted Apr 10, 2017 at (ISC)2 Blog
Thank you! Corrected!
Earlier this week, (ISC)² Managing Director for North America, Dan Waddell provided expert testimony to the Subcommittee on Information Technology during a hearing Reviewing Federal IT Workforce Challenges and Possible Solutions. The hearing aimed to examine the development, recruitment, and retention of the United States federal government’s IT and cybersecurity workforce and to discuss the potential for forming an industry-government rotational workforce. During his testimony, Mr. Waddell provided the Subcommittee members and others in attendance a short list of recommendations that the (ISC)² executive management team has gathered since the election. A complete list of recommendations will be released via... Continue reading
Posted Apr 6, 2017 at (ISC)2 Blog
A data breach can cause a loss of revenue, destroy shareholder value, erode consumer trust and even open you up to legal consequences, whereas better security can add value to a company by preventing attacks, detecting breaches faster and mitigating the damage caused by cyber threats. The Ponemon Institute's 2016 Cost of Data Breach Study estimates that the average consolidated total cost of a data breach is $4 million; so why do we still view cybersecurity simply as an operating cost? Unfortunately, cybersecurity is often viewed as the organization that always says no versus the organization that makes the business... Continue reading
Posted Apr 5, 2017 at (ISC)2 Blog
Name: Shashana Campbell Title: Manager, Cyber Risk Advisory Employer: Grant Thornton LLP Location: Philadelphia, Pennsylvania, U.S.A. Education: Master of Science in Information Systems from Drexel University and Bachelor of Science in Management Information Systems from Pennsylvania State University Years in IT: 7 Years in information security: 7 Cybersecurity certifications: CISSP, CISA How did you decide upon a career in cybersecurity? I began my career in risk consulting, providing IT Auditing and Advisory service. I think once you build a foundation in understanding, assessing and implementing IT security controls, the next step is learning how to further strengthen those controls and... Continue reading
Posted Apr 4, 2017 at (ISC)2 Blog
Name: Chris Sellards Title: Senior Security Architect Employer: Harland Clarke Holdings Location: San Antonio, Texas Degree: Master of Science, Information Security. Currently pursuing a Doctor of Science in Cybersecurity at Capitol Technology University Years in IT: 21 Years in cybersecurity: 17 Cybersecurity certifications: CISSP-ISSAP, CCSP, CAP, CCSK, CEH, CHFI, GCWN, NSA IAM, NSA IEM, Tripwire Enterprise Administration How did you decide upon a career in cybersecurity? Even before officially being employed in the IT field, I was fascinated with security. I ran my first blog in the mid-1990s where I covered various security topics. I worked as an engineer for... Continue reading
Posted Mar 30, 2017 at (ISC)2 Blog
We are excited to announce the final speaker agenda for our 5th annual CyberSecureGov training event being held May 9-11, 2017, at the Marriott Wardman Park in Washington, D.C. This year, we are offering a 3-day event, which means more great sessions and more CPEs! “If you work for the U.S. government – either as a contractor or direct hire – cybersecurity is now your job,” said Dan Waddell, CISSP, CAP, PMP, managing director, North America Region, and director of U.S. government affairs, (ISC)². “More and more, government agencies are requiring good cyber hygiene practices in contracts, job descriptions, performance... Continue reading
Posted Mar 23, 2017 at (ISC)2 Blog
Name: Wendy Larsen Title: Security Consultant Employer: Weidenhammer Location: Reading, Pennsylvania, U.S.A. Years in IT: 27 Years in information security: 5 Cybersecurity certifications: SSCP, Security+, ITIL, VCP, MCSE How did you decide upon a career in cybersecurity? I have been working for an information technology consulting organization for 27 years. They gave me many opportunities to expand my technical knowledge as a systems engineer. Over the past several years, I have been very interested in growing my skill set in cybersecurity. I came to discover that I have a passion for security – therefore, I took the bull by the... Continue reading
Posted Mar 23, 2017 at (ISC)2 Blog
Name: Tim Weil Title: Network Project Manager Employer: Alcohol Monitoring Systems Location: Denver, Colorado, U.S.A. Degree: BA in Sociology/Latin American Studies from Immaculate Heart College, MS in Computer Science from Johns Hopkins University Years in IT: 30+ Years in cybersecurity: 15+ Cybersecurity certifications: CCSP, CISSP, CISA, CRISC How did you decide upon a career in cybersecurity? Working in the telecommunications industry through the dot-com era, my core networking skills became less valuable when I obtained the CISSP in 2003. In the federal sector, I worked as a contractor for more than 10 years for more than 10 agencies, specializing in... Continue reading
Posted Mar 21, 2017 at (ISC)2 Blog
The 2017 Global Information Security Workforce Study (GISWS) Women in Cybersecurity report, co-authored by the Center for Cyber Safety and Education and the Executive Women's Forum on Information Security, Risk Management & Privacy, and presented by PricewaterhouseCoopers, LLC focuses on the unique attributes, as well as the challenges facing women in this industry. A few of the highlights from this year's Women in Cybersecurity report include: Women comprise only 11 percent of the information security workforce. Women reported higher levels of education than men. Women in cybersecurity earn less than men. A special thank you to the co-authors of this... Continue reading
Posted Mar 17, 2017 at (ISC)2 Blog
Dr. Heejo Lee 2016 Asia-Pacific ISLA Showcased Honoree (Information Security Educator) and Community Service Star Awardee with David Shearer (ISC)² CEO “It is a great honor to be the first showcased honoree of an ISLA award for educators and get the very prestigious recognition as the community service star at 2016. After receiving this award, our IoTcube project is getting a lot more attention and we will continue to develop internationally collaborative programs for better and safer IoT world.” Over the past 25 years, Dr. Heejo Lee has consistently contributed to the advancement of security technologies for academia, private industries,... Continue reading
Posted Mar 14, 2017 at (ISC)2 Blog
Name: Albert Torres Title: Cyber Security Project Manager Employer: Sempra Energy Utilities – contractor Location: San Diego, California, U.S.A. Education: M.S. in Information Security and Assurance from Western Governors University, B.A. in Management Information Systems (Summa Cum Laude) from Washington State University Years in IT: 26 Years in cybersecurity: 16 Cybersecurity certifications: CISSP, PMP, CEH, CHFI, ITIL v3 Foundation IT Management Certification How did you decide upon a career in cybersecurity? I had been in the IT industry for over 10 years and our company was creating its first software as a service (SaaS) software offering. The previous software we... Continue reading
Posted Mar 13, 2017 at (ISC)2 Blog
Name: Arlie Hartman Title: National Security Operations Manager - Cloud Location: Indianapolis, Indiana, U.S.A. Degree: Bachelor’s degree in Business, IT Management at WGU (in progress) Years in IT: 16 Years in cybersecurity: 11 Cybersecurity certifications: CCSP, CISSP, HCISPP, GSEC, PCIP How did you decide upon a career in cybersecurity? I was working as a quality analyst doing root cause analysis for unsatisfactory IT incident resolutions – I was, essentially, a complaints department. I saw a position available as a technical analyst for our regional security officer and I applied and got it. I started out supporting the RSA Ace server... Continue reading
Posted Mar 6, 2017 at (ISC)2 Blog
Name: Uzoma Nwankwo Title: Information Systems Security Officer Employer: Booz Allen Hamilton Location: National Business Park, Maryland, U.S.A. Education: MBA, BS in Computer Information Systems Years in IT: 12 Years in cybersecurity: 7 Cybersecurity certifications: CISSP, Certified Ethical Hacker (CEH), Comptia Security +, Project Management Professional (PMP) How did you decide upon a career in cybersecurity? I began my career as a systems administrator, supporting a project for a large government agency. When that project ended, I was presented with an opportunity to help another government agency with cybersecurity services in locations throughout the country. I travelled, met new people... Continue reading
Posted Mar 3, 2017 at (ISC)2 Blog
The job of an information security professional is difficult, to say the least, and (ISC)² wants to make sure your membership is valuable. We are always looking for new ways to create and provide member benefits – including offering service and subscription discounts. (ISC)² members are eligible to receive special pricing on a premium membership with Information Security Media Group (iSMG), the world’s largest media organization devoted solely to information security and risk management. The member price is US$99/month for the first year with a yearly membership, which is a discount of 70 percent. ISMG is known for its CPE-worthy... Continue reading
Posted Mar 1, 2017 at (ISC)2 Blog
The move to a paperless system to improve health and social care is an ambition central to many governments around the world. (ISC)² recently held a roundtable event in London, United Kingdom (UK) inviting several people who work within the sector and the country’s National Public Health Service (NHS) to explore a range of current issues, including the reasons why patients were showing a reluctance to trust efforts to protect their personal data. The aim was to bring together perspectives from many areas of the healthcare industry and give them the opportunity to talk freely and anonymously about the opportunities... Continue reading
Posted Feb 23, 2017 at (ISC)2 Blog
Hello Peter, RSAC submits CPEs on behalf of members automatically, if you registered with your (ISC)² ID number. If you don't see them on your account within 8 weeks of the event, please contact Member Services and we'll look into it for you.
Toggle Commented Feb 22, 2017 on (ISC)² at RSA Conference at (ISC)2 Blog
Name: Leon Kolthof Title: Information Security Officer Employer: Centric Netherlands B.V. Location: Breda Area, Netherlands Degree: Bachelor in Business IT & Management Years in IT: 9 Years in cybersecurity: 6 Cybersecurity certifications: CCSP, CISSP-ISSAP, CISSP-ISSMP, CISM, CCSK, CEH How did you decide upon a career in cybersecurity? My IT career started in the field of system/network engineering. From this field of practice, I developed my professionalism toward information security. Through formal education, hands-on experience, and my own interest in the field, I have extended my knowledge in this dynamic discipline. Continuously building your knowledge and being keen on self-improvement is... Continue reading
Posted Feb 21, 2017 at (ISC)2 Blog
The results from the eighth Global Information Security Workforce Study (GISWS) have been released this week. The workforce gap is estimated to be growing, with the projected shortage reaching 1.8 million professionals by 2022. While the gap is not news, the fact that it is growing is of great concern to an already exhausted workforce. The question of how to fill the gap has been answered, and millennials are an integral part of the plan. “For years, we’ve known about the impending shortage of the information security workforce, as evidenced by our study year over year,” said David Shearer, CEO,... Continue reading
Posted Feb 15, 2017 at (ISC)2 Blog
Name: Bin “Sinbad” Zhou Title: Incident Response Senior Manager Employer: Huawei Location: Beijing, China Education: Electronic and Information Engineering Years in IT: 16 Years in cybersecurity: 16 Cybersecurity certifications: CISSP, ISO27001 LA How did you decide upon a career in cybersecurity? When I was a student in university, I helped manage ‘telnet-style’ BBS which requires UNIX administration skills. I was quite good at it, but vulnerabilities in UNIX systems can be exploited to bypass security mechanisms such as access control. I found that it is more challenging to harden a secure system, so I started to learn what is behind... Continue reading
Posted Feb 13, 2017 at (ISC)2 Blog
This year’s (ISC)² Security Congress – with the theme “Leaders of Tomorrow” – will take place September 25-27 in Austin, Texas at the JW Marriott. For the first time, Security Congress will be a stand-alone event, without former partner ASIS International. “We value the partnership we had with ASIS International for the past six years, but it was time for Security Congress to stand on its own to address the programming needs expressed by our members,” says (ISC)² CEO David Shearer. The cybersecurity conference will host more than 90 educational sessions, as well as a town hall meeting, career center... Continue reading
Posted Feb 10, 2017 at (ISC)2 Blog
RSA Conference is less than a week away! The annual information security event will be held at the Moscone Center, February 13-17, in San Francisco, CA. On Thursday, February 16, (ISC)² will release the first in a series of reports from its’ 2017 Global Information Security Workforce Study. Focusing on the millennial workforce, a panel session entitled “Empower, Encourage, Recruit: Changing our Approach to Building the Workforce” will take place from 1:30-2:15 p.m. PST in Room 130 in Moscone North. Since its first release in 2004, the bi-annual study gauges the opinions of information security professionals from around the world,... Continue reading
Posted Feb 8, 2017 at (ISC)2 Blog