This is (ISC)²'s Typepad Profile.
Join Typepad and start following (ISC)²'s activity
Join Now!
Already a member? Sign In
(ISC)²
Recent Activity
Image
Since its inception, the Center for Cyber Safety and Education and (ISC)² have worked to increase awareness of the importance of cyber safety and ensure that people around the world have a safe online experience. The Center has done this through several initiatives, including Garfield’s Cyber Safety Adventures program which taught more than 300,000 students how to stay safe online, with the help of Garfield the cat. Globally, (ISC)² aims to strengthen the cybersecurity profession, which is changing as rapidly as the interconnected world in which we all live. As (ISC)² increases its overall impact, the Center is entering into... Continue reading
Posted Jun 28, 2022 at (ISC)² Blog
As organizations struggle to fill cybersecurity vacancies, they aren’t finding many candidates among millennial jobseekers. A new study shows millennials are only marginally interested in cybersecurity careers, with 9 percent showing any interest at all. The finding is troubling, considering millennials have become the largest percentage of the overall workforce. This generation, which has grown up with iPhones and YouTube is often viewed as an untapped source of talent for cybersecurity careers, but it’s clear they are not getting the message that they are needed. The study of 524 technology-savvy millennials, conducted by Enterprise Strategy Group and sponsored by ProtectWise,... Continue reading
Posted Jun 7, 2018 at (ISC)² Blog
Image
(ISC)² webcasts are a great source for insight into all areas of security. From the Internet of Things to malware and compliance, the topics vary. Here are the top 10 (ISC)² webcasts for 2017 so far as ranked by cybersecurity professionals: Part 1: Future of SIEM - Why Static Correlation Fails Insider Threat Detection Hackers stealing credentials and operating in your corporate network…disgruntled employees collecting customer lists and design materials for a competitor...malware sending identity information back to random domains…these common threats have been with us for years and are only getting worse. Most organizations have invested large amounts in... Continue reading
Posted Aug 31, 2017 at (ISC)² Blog
Image
Name: Rob Turner Title: Senior Cyber Network Defense Analyst Employer: DXC Technology (formerly Hewlett-Packard Enterprise) Title: Computer Technology Program Coordinator Employer: Ball State University Location: Indiana, U.S.A. Education: BS in Computer Technology, Graduate Certificate in Information System Security Management, MS in Information and Communication Sciences Years in IT: 10 Years in Cybersecurity: 7 Cybersecurity certifications: CISSP-ISSAP, CISSP, CCNA-Security, CEH, CHFI, ECSA How did you decide upon a career in cybersecurity? Cybersecurity had always been an aspect of my career as a systems analyst/administrator. The more proactive I became at securing systems and networks, the more research and interest I developed... Continue reading
Posted Aug 7, 2017 at (ISC)² Blog
Image
Name: Ronald Ricohermoso Title: IS Security Operations Analyst Employer: Ingram Micro Location: Philippines Degree: BS in Computer Science Years in IT: 6 Years in information security: 4 Cybersecurity certifications: SSCP, Security+, CEH, ITIL Foundation How did you decide upon a career in cybersecurity? I started working as a service desk, but decided to leave and specialize in other fields of IT (ex. networking or infrastructure). It started when I got a job at Ingram Micro as a security administrator and learned about the importance of information security and the challenges it offers due to the changing threat landscape. I learned... Continue reading
Posted Jul 27, 2017 at (ISC)² Blog
Image
In what passes for a quiet week in the cybersecurity space, here are some of the top security headlines for the week of July 11, 2017: According to the Economic Times, cyber insurance companies haven’t been hit with claims from the summer’s cyberattacks – yet. “It would only need a combination of WannaCry’s wide reach and Petya’s destructive force to cost cyber insurers something like $2.5 billion...” Oh good – something to look forward to! In news that won’t surprise your family, 57% of IT security professionals work weekends. But those weekend warriors are up for the challenge, as 97%... Continue reading
Posted Jul 14, 2017 at (ISC)² Blog
The effects of WannaCry, the ransomware dominating international headlines, continue to be felt by organizations and individuals alike. If you or anyone you know has had a device infected, (ISC)2 has advice for stopping and remediating the attack. View the video below to see how you can respond to WannaCry: Continue reading
Posted May 18, 2017 at (ISC)² Blog
Image
Name: George Romas Title: Chief Engineer Employer: DXC Technology Location: Washington, D.C., U.S.A. Education: Bachelor of Science, Computer Science and Economics, Union College, Schenectady, NY Years in IT: 34 Years in cybersecurity: 34 Cybersecurity certifications: CISSP How did you decide upon a career in cybersecurity? Cybersecurity came as part of the job. I’ve spent most of my career supporting the intelligence community, where every system or solution that you develop has a cybersecurity component. As I gained more knowledge and expertise, that security frame of mind becomes a way of life. Why did you get your CISSP®? The main reason... Continue reading
Posted May 11, 2017 at (ISC)² Blog