This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
The (ISC)² London chapter received its official (ISC)² Charter on March 16, 2018, after completing the chartering process and attending the (ISC)² Secure Summit UK earlier this spring. The London Chapter’s president, James Packer, outlined the chapter’s goals at the Secure Summit UK event, which included plans for hosting the chapter’s own events, forming industry partnerships, and spawning beneficial initiatives such as in education and healthcare. As a result of the Chapter’s presence at the Summit, over 50 people signed up to become a member of the Chapter. This is a record number of people who have ever signed up... Continue reading
Posted 2 hours ago at (ISC)² Blog
Image
(ISC)²’s ThinkTank webinar channel has just been named the 2018 Highest Growth Channel in IT by BrightTALK, an online webinar platform aimed at providing professionals with business and professional growth. ThinkTank is a free cybersecurity webinar channel that features 60-minute roundtable discussions with influential security experts. These discussions cover a range of thought-provoking topics that are among the most pressing cybersecurity challenges. BrightTALK awarded 10 organizations for accomplishments in the IT category. Those winners included Palo Alto Networks, Symantec, and more with (ISC)² being the only certifying body to be recognized. So far this year, ThinkTank webinars have been viewed... Continue reading
Posted 3 days ago at (ISC)² Blog
Image
The sweeping new privacy law that went into effect in the European Union in May has significantly boosted demand for data protection expertise, according to job postings site Indeed. A report from the popular recruitment site found that job openings for data protection officers (DPO) have skyrocketed 829 percent since 2016 as organizations took steps to comply with the General Data Protection Regulation (GDPR). The need for the expertise is about to get even greater, thanks to a newly approved data privacy law in California, the world’s fifth largest economy. The new law was rushed through the state’s legislation to... Continue reading
Posted 7 days ago at (ISC)² Blog
Image
Cybersecurity job searches increased nearly six percent between March 2017 and March 2018, according to recently published research by job listings site Indeed. The increase actually outpaced a 3.5 percent uptick in jobs posted. These numbers do not mean that supply is exceeding demand – far from it. The reality is that finding cybersecurity talent remains a major challenge for employers, both in and outside the tech field. But the Indeed findings seem to confirm what (ISC)² discovered earlier this year: There is a big appetite among cybersecurity workers for a change of employment. In our “Hiring and Retaining Top... Continue reading
Posted Jul 9, 2018 at (ISC)² Blog
Image
By Ravindra Krishna, CISSP In a recent Operational Technology (OT) cyberattack, Monero Crypto-currency mining malware was discovered in the ICS network of a water utility company located in Europe. The company found the malware during a routine monitoring check of their OT network and confirmed that the malware infected five servers including the Human machine interface (HMI), which is used to control and manage physical components of OT networks. This attack provides further evidence that OT networks are not simply vulnerable, but actually easy targets. The Post-Stuxnet OT Cyberattack Era I believe that we can divide OT attacks into two... Continue reading
Posted Jul 3, 2018 at (ISC)² Blog
Image
Like many chapters, the (ISC)² Hawaii Chapter has had challenges with officer vacancies, legal registration, and low attendance at events over the past three years that the chapter has held its official charter. In early 2018, the new officer board took over and began to plan events to get the information security professionals in the area together to better connect, educate, inspire, and secure the communities of Hawaii. While the chapter has held its official charter with (ISC)², the chapter has been somewhat dis-engaged from the local community. The new chapter officers have made it their mission to re-invigorate the... Continue reading
Posted Jun 21, 2018 at (ISC)² Blog
Image
Data breaches are happening far too often. Stories about personal information being compromised are part of the daily news cycle. But even after the fact, many people are still not taking internet safety seriously. Let’s not forget that human error causes 90 percent of security incidents. Training employees about cybersecurity is essential but educating younger generations from the moment they gain access to the internet, should be a priority. This year, at (ISC)² Security Congress in New Orleans, cyber, information, software and infrastructure security professionals will learn about cyber safety education thanks to the Center for Cyber Safety and Education,... Continue reading
Posted Jun 12, 2018 at (ISC)² Blog
Image
Name: Dr. Mari Spina Title: Principal Cyber Security Engineer Employer: The MITRE Corporation Division: MITRE Cyber Security Technical Center Degree: BSME, MSEE, Doctor of Science Engineering Management Years in IT: 26 Years in cybersecurity: 9 Cybersecurity certifications: CISSP, ISSEP, CCSP How did you decide upon a career in cybersecurity? As a U.S. Government contractor since the late 80s, I’ve worked to combat an ever increasing, continuously morphing cyber warfare threat. Frankly, I want to be sure that the U.S. remains strong in its defenses on both military and industrial fronts. I feel this is simply the best way for me... Continue reading
Posted Jun 4, 2018 at (ISC)² Blog
Image
by Denise Murtagh-Dunne, Information Security Manager, PWC Ireland From my early childhood, I developed a passion for unravelling the mysteries of how machines worked. My father was a mechanic and, as a child, he would let me help taking car engines apart. This is where I first developed a fascination with getting “under the hood” of machines and understanding their inner mechanics. At school, I then took a computer module which triggered my interest in computing and I chose to study Computer Programming in college. I survived the period of the dot-com bubble bursting and landed an IT technical support... Continue reading
Posted May 29, 2018 at (ISC)² Blog
Image
On May 7th and 8th, (ISC)² hosted its annual Secure Summit D.C. (SSDC) cybersecurity conference. (ISC)² Secure Summit DC evolved from (ISC)² CyberSecureGov to assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. Three local (ISC)² Chapters were represented at the event: Quantico Chapter, National Capital Region (NCR) Chapter, and the NOVA Chartering Chapter. The chapters each hosted a table at the event, where 850+ attendees were able to ask questions, learn more about the (ISC)² Chapter Program, and even express interest in joining a local chapter. The (ISC)² National Capital Region (NCR)... Continue reading
Posted May 24, 2018 at (ISC)² Blog
Image
As investments in public cloud computing continue to grow, so do cloud-related security incidents. Over the past 12 months, 18 percent of organizations have experienced a cloud security incident, double the number reported in the previous 12-month period, according to a recent report. Not surprisingly, concerns over cloud security also are rising, with more than nine out of 10 cybersecurity professionals – 91 percent, to be exact – saying they are worried about it. This, too, represents an increase from the previous polling period, when 81 percent of cybersecurity professionals expressed similar fears, and reverses a multiple-year downward trend. The... Continue reading
Posted May 21, 2018 at (ISC)² Blog
A data breach hits headquarters at 3 a.m. Are your critical assets secure? Hire (ISC)²-certified cybersecurity professionals to prepare for, prevent and recover from attacks. Continue reading
Posted May 17, 2018 at (ISC)² Blog
Image
by Tamer Gamali, CISSP, CISO Mashreq Bank, and member of the (ISC)² EMEA Advisory Council Is the CISO well positioned to mitigate operational risk? (ISC)² will be asking this probing question of Security leaders at the kick-off session for Infosecurity Europe’s Leaders Programme in London next month. A round table discussion conducted under the Chatham House Rule, the session creates an opportunity to offer up frank comment and illuminate the challenges currently hampering companies from appreciating and truly gaining control of cyber risks. Infosecurity Europe’s Leaders Programme is open to CISOs and Heads of Information Security, who are the final... Continue reading
Posted May 16, 2018 at (ISC)² Blog
Image
Name: Kreesan Govender Title: Information Security Risk and Compliance Specialist Employer: MiWay Insurance (Santam Group) Location: Johannesburg, South Africa Education: National Diploma Computer Network Engineering Years in IT: 5 Years in Cybersecurity: 4 Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I have always found hacking and data breaches interesting since my days at campus, and when I was given the opportunity to start my career within the cybersecurity field, I jumped at the opportunity. Since starting my career in cybersecurity, I have enjoyed every bit and have never looked back. How did you decide to... Continue reading
Posted May 14, 2018 at (ISC)² Blog
Image
Nearly 900 cybersecurity professionals attended Secure Summit DC at the beautiful MGM National Harbor hotel. The two-day training event included more than 35 sessions in four tracks. Keynote speakers covered topics from resourcefulness to security culture, sociology to workforce development and beyond. A noteworthy theme evolved throughout the event, as speakers from both the private and public sectors – including many from the (ISC)² Board of Directors – acknowledged the need for a greater understanding of the cybersecurity basics both inside and outside the industry. “We’re in the golden age of threats,” said John McCumber, director of cybersecurity advocacy at... Continue reading
Posted May 10, 2018 at (ISC)² Blog
Image
By and large, female and male cybersecurity professionals share the same workplace values, priorities and aspirations. Both place about the same level of importance on matters such as salary and working close to home – and both apply roughly the same skills to their work and view protecting people and data as their primary function, according to recent (ISC)2 research. In a survey of 250 cybersecurity professionals, (ISC)2 also discovered the number of men and women looking for new employment is exactly the same: 85 percent of cybersecurity workers are open to new employment opportunities, including 14 percent who are... Continue reading
Posted May 4, 2018 at (ISC)² Blog
Image
Name: Paul Bryant Title: CIO Employer: phew! Cyber Security Location: Auckland, New Zealand Education: MCom (Hons), LLB (Hons) Years in IT: 20 Years in cybersecurity: 15 Cybersecurity certifications: CISSP How did you decide upon a career in cybersecurity? In my roles designing and managing financial services technology infrastructures and leading technology teams I had a good deal of both technical and non-technical exposure to information security considerations and solutions. It is a complex and ever-changing area that bridges business and technology, and requires both technical and commercial engagement. It is also an area that is under-served in industry. Why did... Continue reading
Posted Apr 19, 2018 at (ISC)² Blog
Image
(ISC)² Bangalore Chapter 7th Security Meet The (ISC)² Bangalore Chapter conducted its 7th Security Meet on 17th March, 2018 at Honeywell Technology Solutions. The event offered its fellow security professionals an opportunity to hear from and discuss with security experts from various industries. The chapter has picked up pace and matured with respect to its steadily growing membership count in quality and quantity. Currently at the count of 73 members and counting, this chapter promises to sincerely promote its purpose and vision of building a strong network of security professionals. The half day event featured three major keynote presentations along... Continue reading
Posted Apr 19, 2018 at (ISC)² Blog
Image
Finalists have been announced for the 2018 Information Security Leadership Awards (ISLA®) Government. The ISLA Government program recognizes the ongoing commitment and achievements of individuals and teams whose initiatives, processes or projects have led to significant improvements in the security posture of a U.S. department, agency or government (state, local or federal). "Some projects are not well-known to either the public or the information security professional community. Recognizing a practitioner through the ISLA awards provides awareness of some of the important projects happening throughout the government." - Kris Thomas, CISSP, 2018 Nominator The awards ceremony will take place at the... Continue reading
Posted Apr 16, 2018 at (ISC)² Blog
Thank you for volunteering! We are working our way through the volunteers, so it will take several weeks before we can provide updates. Once you've sent in your information, though, you are in our database to work through as we organize the workshops. You'll be contacted when we have an updated. I confirmed and we do have you in our system, although I am not privy to the selection process or status of individuals.
Toggle Commented Apr 16, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Please send your (ISC)² ID# to examdevelopment@isc2.org and they will put you on the list of volunteers. Thank you!!
Toggle Commented Apr 16, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Image
Name: Thien Phan (ISC)² Exams Passed: CISSP and CCSP Title: Cybersecurity, Privacy and IT Risk Associate Employer: PricewaterhouseCoopers (PwC) Location: New York City, NY, U.S.A. Education: MBA degree and Bachelor’s Degree in Management Information Systems (MIS) from Binghamton University Years in IT: 1 year Years in cybersecurity: 1 year Cybersecurity certifications: Security+, CCNA Cyber Ops How did you decide upon a career in cybersecurity? It was back in my third year of college when I interned for a multimedia company as a database administrator. I did not know much about how different technologies worked together. I was introduced to the... Continue reading
Posted Apr 11, 2018 at (ISC)² Blog
Image
(ISC)²’s theme for 2018 is Enrich. Enable. Excel. In an effort to enable our members to be the best in their field, we have partnered with A Cloud Guru to offer a one-month free membership to A Cloud Guru. This benefit allows members exclusive access to cloud security education from A Cloud Guru, which delivers an array of cloud security courses to enable cybersecurity professionals to better defend their data in the cloud. Cloud security was identified as the number one skill security professionals needed to acquire or strengthen to advance their career, according our 2017 Global Information Security Workforce... Continue reading
Posted Apr 9, 2018 at (ISC)² Blog
I have shared your info w/our exam development team, Dr. Louis - thank you!
Toggle Commented Apr 5, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog
Hello! Instructors are prohibited from participating in item writing workshops due to exposure to exam content. You must wait two years after being an item writer before you can become eligible to act as an instructor. I hope this helps!
Toggle Commented Apr 5, 2018 on (ISC)² Item Writing Explained at (ISC)² Blog