This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
Name: Leon Kolthof Title: Information Security Officer Employer: Centric Netherlands B.V. Location: Breda Area, Netherlands Degree: Bachelor in Business IT & Management Years in IT: 9 Years in cybersecurity: 6 Cybersecurity certifications: CCSP, CISSP-ISSAP, CISSP-ISSMP, CISM, CCSK, CEH How did you decide upon a career in cybersecurity? My IT career started in the field of system/network engineering. From this field of practice, I developed my professionalism toward information security. Through formal education, hands-on experience, and my own interest in the field, I have extended my knowledge in this dynamic discipline. Continuously building your knowledge and being keen on self-improvement is... Continue reading
Posted 2 hours ago at (ISC)2 Blog
Image
The results from the eighth Global Information Security Workforce Study (GISWS) have been released this week. The workforce gap is estimated to be growing, with the projected shortage reaching 1.8 million professionals by 2022. While the gap is not news, the fact that it is growing is of great concern to an already exhausted workforce. The question of how to fill the gap has been answered, and millennials are an integral part of the plan. “For years, we’ve known about the impending shortage of the information security workforce, as evidenced by our study year over year,” said David Shearer, CEO,... Continue reading
Posted 6 days ago at (ISC)2 Blog
Image
Name: Bin “Sinbad” Zhou Title: Incident Response Senior Manager Employer: Huawei Location: Beijing, China Education: Electronic and Information Engineering Years in IT: 16 Years in cybersecurity: 16 Cybersecurity certifications: CISSP, ISO27001 LA How did you decide upon a career in cybersecurity? When I was a student in university, I helped manage ‘telnet-style’ BBS which requires UNIX administration skills. I was quite good at it, but vulnerabilities in UNIX systems can be exploited to bypass security mechanisms such as access control. I found that it is more challenging to harden a secure system, so I started to learn what is behind... Continue reading
Posted Feb 13, 2017 at (ISC)2 Blog
Image
This year’s (ISC)² Security Congress – with the theme “Leaders of Tomorrow” – will take place September 25-27 in Austin, Texas at the JW Marriott. For the first time, Security Congress will be a stand-alone event, without former partner ASIS International. “We value the partnership we had with ASIS International for the past six years, but it was time for Security Congress to stand on its own to address the programming needs expressed by our members,” says (ISC)² CEO David Shearer. The cybersecurity conference will host more than 90 educational sessions, as well as a town hall meeting, career center... Continue reading
Posted Feb 10, 2017 at (ISC)2 Blog
Image
RSA Conference is less than a week away! The annual information security event will be held at the Moscone Center, February 13-17, in San Francisco, CA. On Thursday, February 16, (ISC)² will release the first in a series of reports from its’ 2017 Global Information Security Workforce Study. Focusing on the millennial workforce, a panel session entitled “Empower, Encourage, Recruit: Changing our Approach to Building the Workforce” will take place from 1:30-2:15 p.m. PST in Room 130 in Moscone North. Since its first release in 2004, the bi-annual study gauges the opinions of information security professionals from around the world,... Continue reading
Posted Feb 8, 2017 at (ISC)2 Blog
Image
Name: Olayinka Ladeji Job Title: Management Consultant, Information & Cybersecurity and IT Advisory Employer: Enaxis Consulting Location: Houston, Texas, U.S.A. Degree: Bachelor’s degree in Electrical and Electronics Engineering Years in IT: 14 Years in cybersecurity: 12 Cybersecurity certifications: CCSP, CISSP, CISM, CBCP How did you decide upon a career in cybersecurity? Information security has always been my passion. I was working at a financial organization after college, but didn’t get the opportunity to work in the field of information security until an independent information security department was set up there shortly after I joined. I was drafted into the department,... Continue reading
Posted Feb 6, 2017 at (ISC)2 Blog
Image
Last year’s America’s Information Security Leadership Awards (ISLA®) ceremony and dinner was a highlight at Security Congress. Diego Andrés Zuluaga Urrea was one of the evenings honorees, winning the ISLA for Senior Information Security Professional. Diego started his career working as a systems administrator, while still studying in university, for the first ISP in Colombia. He saw malicious hackers working against the systems, on one occasion seeing nine university servers attacked in a single evening. After witnessing the vulnerabilities, he decided to learn more about information security on his own. Diego learned that creating a culture of security was just... Continue reading
Posted Feb 3, 2017 at (ISC)2 Blog
Image
Are you looking to start an (ISC)² Chapter in your area? The enrollment period for chapters in the Europe, Middle East and Africa (EMEA) and North America regions is now open through February 5. Through the chapter program, (ISC)² members and other information security professionals further advance the organization’s vision to inspire a safe and secure cyber world by sharing knowledge, raising security awareness and advancing information security in local communities around the world. To be eligible to start a chapter, you will need to meet the following requirements: Be an (ISC)² member in good standing for a minimum of... Continue reading
Posted Feb 1, 2017 at (ISC)2 Blog
Image
During its first few weeks, the Trump administration issued several executive orders that left heads spinning, with many federal personnel unclear of the implications. One particular order that is causing significant anxiety among federal cybersecurity personnel – including thousands of (ISC)² members -- is the hiring freeze. How is the freeze impacting our U.S. government member community and the government’s overall cyber progress? After numerous conversations with federal cybersecurity leaders, one thing is clear - there is an abundance of unknowns and a unanimous sentiment of unpredictability. Yet, when outcomes are hard to predict, sometimes it helps to know that... Continue reading
Posted Jan 31, 2017 at (ISC)2 Blog
Image
Name: Robert Kato Title: IT Specialist Employer: African Development Bank Education: Bachelor’s Degree in Information Technology and Master’s Degree in Information Systems Years in IT: 10 Years in cybersecurity: 5 Cybersecurity certifications: CISSP, CCNA Security How did you decide upon a career in cybersecurity? I started my career mostly doing systems administration and networking roles. At that time, especially in Africa, connectivity and system performance were the most important aspects. We had servers that had 128GB of memory and a 64 Kpbs DSL link and would cost $500 monthly. However, with the increase in computing power and high speed internet... Continue reading
Posted Jan 30, 2017 at (ISC)2 Blog
Image
Yves Le Roux, co-chair and public policy workgroup lead, (ISC)2 EMEA Advisory Council This Saturday marks the 10th anniversary for Data Protection Day, celebrated each year on 28 January – which is the date the Council of Europe’s data protection convention, known as “Convention 108”, was established. Data Protection Day, known as Privacy Day outside of Europe, is now celebrated globally, raising awareness of people’s rights as they relate to the automatic processing of their data. Each year, events are held around the world to both arm citizens with the information they need to understand and protect their rights, while... Continue reading
Posted Jan 27, 2017 at (ISC)2 Blog
Image
Yes, you did read the headline right. It is the conclusion of a United Kingdom’s Government review (Cyber security regulation and incentives review) published right at the end of 2016. Here, the UK Government concludes that the EU General Data Protection Regulation (GDPR), with its reporting requirements and financial penalties represents a significant call to action, so no further regulation is required at this time. This decision is to be applauded for four reasons. First, many UK-based organisations are also having to prepare for the European Union Network Information Security (NIS) Directive. Both NIS and GDPR are placing significant resource... Continue reading
Posted Jan 25, 2017 at (ISC)2 Blog
Image
Name: Nanditha Rao Title: Information Systems Security Principal Employer: CSRA, LLC Degree: Master of Science in Computer Science Years in IT: 14 Years in cybersecurity: 11 Cybersecurity certifications: CCSP, CISSP How did you decide upon a career in cybersecurity? I found myself in the field due to the encouragement from my supervisors who believed that I had the analytical skills to move from IT risk management to IT security and cybersecurity. It was a natural transition for me, and I really enjoyed working in the domain. Since my start in the security field, I have actively worked to learn new... Continue reading
Posted Jan 23, 2017 at (ISC)2 Blog
Image
Let's pretend you're planning a big trip, and you need a nice place to stay. After considering different options online, you find a place that sounds great. The photos appear perfect. So, here's the question. When you arrive, will the lodging match your expectations...or is it just too good to be true? When you're choosing among CISSP® training providers, we know you're sorting through a variety of companies and often times, big, beautiful claims. To ensure you aren't surprised when you reach the CISSP certification exam, here are three myths debunked. Myth #1: Pass rates of 90%+ are guaranteed. What... Continue reading
Posted Jan 17, 2017 at (ISC)2 Blog
Image
Name: Miriam Celi Title: Technical Leader – Secure Coding IT Quality Assurance Employer: Humana, Inc. Years in IT: 20 Years in cybersecurity: 7 Cybersecurity certifications: CISSP, GISP How did you decide upon a career in cybersecurity? I got into a career in cybersecurity by chance. In early 2009, I joined a small startup that specialized in personal identity verification (PIV) solutions for the government. I was very fortunate that since the company was small, I was able to perform various roles, such as integrating products with various physical access control systems and biometric devices, representing the company in security conferences... Continue reading
Posted Jan 12, 2017 at (ISC)2 Blog
Image
In one month, the world will talk security at RSA Conference in San Francisco, CA. The annual information security event will be held at the Moscone Center February 13-17. (ISC)² team members can be found on the exhibit floor in booth S-342. Stop by to pick up a copy of the March/April issue of InfoSecurity Professional magazine, printed exclusively for RSA Conference. We will also have 2017 member pins, CISSP® t-shirts, lightsabers (yes, that’s right) and more. The times and dates of demonstrations at our booth – including Vulnerability Central sessions – can be viewed online. (ISC)² members who register... Continue reading
Posted Jan 11, 2017 at (ISC)2 Blog
Image
The 2016 Americas ISLA Ceremony and Gala honored the best and brightest in the field of cybersecurity. Held each year at the (ISC)² Security Congress, the dinner and awards presentation took place at Jimmy Buffet’s Margaritaville where Jim Davis, creator of Garfield, was the keynote speaker. James McQuiggan, CISSP, was the emcee of the evening. A long-time volunteer and advocate for the Center for Cyber Safety and EducationTM’s Safe and Secure Online® program, he kicked off the evening wearing a Safe and Secure t-shirt – later changing into a festive Hawaiian shirt and grass skirt – before embracing the “Florida... Continue reading
Posted Jan 6, 2017 at (ISC)2 Blog
Image
Name: Mahbubul Islam Title: Head of Secure Design Employer: U.K. Government Department Degree: B.Sc., M.Sc. Years in IT: 15 Years in cybersecurity: 10 Cybersecurity certifications: CCSP, CISM, SABSA, LCCP, ISO27001 LA How did you decide upon a career in cybersecurity? I started working for the U.K. government in 2001 and whilst working on various standard projects, I was successful in landing an apprentice role as an Information Assurance Manager. The role was very flexible, as it was the first of its kind which allowed myself and my colleagues to determine a structured plan to develop security skills within the fields... Continue reading
Posted Jan 3, 2017 at (ISC)2 Blog
Image
Name: Ceri Charlton Title: Group Information Security Manager Employer: Atradius Degree: M.Sc (Distinction) in Information Security and Computer Crime, 1st Class B.Sc., with Honours, in Computer Studies Years in IT: 14 Years in cybersecurity: 11 Cybersecurity certifications: CCSP, CISSP, Former QSA and PA-QSA, PCIP, Ethical Ninja (Grade 1) How did you decide upon a career in cybersecurity? When I first went into computing, I wanted to work on all aspects – and cybersecurity lets me remain involved in all areas. I also love how fast-paced and varied the field is, as you are always learning. I also foresaw, fairly accurately,... Continue reading
Posted Dec 30, 2016 at (ISC)2 Blog
Image
Adrian Davis, Managing Director, EMEA at (ISC)² explains how we can stop the ongoing proliferation of vulnerabilities in connected cars It’s clear that we are rapidly moving towards turning cars into rolling internet browsers, connecting to everything from traffic lights to household appliances. Future vehicles will get remote updates on traffic jams or weather, automatically alert emergency services to accidents as they happen, allow drivers to get over-the-air ‘upgrades’ without visiting a dealership and even warm up their kettles from their cars. Software updates can now give cars self-driving features, turn them into rolling Wi-Fi hotspots or even allow them... Continue reading
Posted Dec 27, 2016 at (ISC)2 Blog
Image
The (ISC)² staff received the following story about a young and talented information security professional who died at a very young age, just as his talents were starting to make a significant impact in the community. We wanted to share Ryan Bell’s story as a tribute to the many dedicated students and young professionals who are inspired to pursue this challenging career for the greater good. We often say in this profession, “It’s about the people.” Let Ryan’s story be a reminder for each of us to make strong connections within our workplaces, and to look out for one another... Continue reading
Posted Dec 22, 2016 at (ISC)2 Blog
Image
Name: Collin Chung Title: Risk and Compliance Analyst II Employer: CareerBuilder Education: B.A. Years in IT: 6 Years in cybersecurity: 5 Cybersecurity certifications: CISA, CISSP, CRISC, ITIL How did you decide upon a career in cybersecurity? It honestly just happened upon me. I loved video games growing up and decided to pursue an education in information technology and business - MIS. I later discovered that my love of computers pervaded enterprises in ways I couldn't have imagined and dove head first into the world of IT and eventually cybersecurity. Why did you get your CISSP®? Before I obtained my CISSP... Continue reading
Posted Dec 20, 2016 at (ISC)2 Blog
Image
Securing an organization’s data is an around the clock task for cybersecurity professionals. But keeping your family safe and secure is just as important. According to the Children’s Internet Usage Study, 90 percent of children surveyed have either a cell phone, tablet or computer in their bedroom. Beyond games and apps, there are more smart toys than ever that tout connectivity as a feature – but rarely acknowledge the risk. The Center for Cyber Safety and Education has 12 tips to help keep you and your family cyber safe this holiday season: Change default passwords on devices. Disable geotagging on... Continue reading
Posted Dec 16, 2016 at (ISC)2 Blog
Image
Name: Walter Speelman Title: Senior Security Specialist, IAM Employer: The Walt Disney Company Years in IT: 26 Years in cybersecurity: 8 Cybersecurity certifications: CISSP® How did you decide upon a career in cybersecurity? I actually didn’t start off in cybersecurity. I started my career just doing typical IT functions related to the client/server environments and networks, later moving into programming and system architecture and design. While there are aspects of security in all of that, it was not until later that I moved specifically into a dedicated security role. When I started in IT, connectivity was the major focus and... Continue reading
Posted Dec 9, 2016 at (ISC)2 Blog
Image
Name: Ayman Ouda Title: Senior Consultant / Senior Architect Employer: Telstra / Avirna Education: Bachelor’s in Telecommunications Engineering, Master’s in Information Technology Years in IT: 17+ Years in cybersecurity: 4 Cybersecurity certifications: CCSP and CCSK How did you decide upon a career in cybersecurity? I decided upon a career in cybersecurity as a normal progression of being a cloud consultant. Working as a cloud architect for the last seven-eight years, I discovered nearly all of our clients express the same two concerns, which are: “How secure is the cloud?” and “If we decide to move, what is the exit strategy?”... Continue reading
Posted Nov 28, 2016 at (ISC)2 Blog