This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
For the fourth year in a row, Certification Magazine named the Certified Cloud Security Professional (CCSP®) as the “Next Big Thing.” The magazine conducted their annual salary survey and found that the CCSP was the top choice for professionals to pursue in 2019. Ranking #2 in the list – for the third year in the row – is the CISSP certification. You can read the full article, “Certification leads to improved performance, increased earning power” here or in the January issue of Certification Magazine. This issue focuses on detailed results and findings from the annual salary survey. Continue reading
Posted 4 days ago at (ISC)² Blog
Image
Call for speakers for the (ISC)² Security Congress 2019 is now open! The ninth annual cybersecurity conference will be held in Orlando, Fla., from October 28-30 at the Walt Disney World Swan and Dolphin Resort. We’re planning for the largest Congress yet with more than 4,000 attendees and 150 speakers. This year’s conference will be the largest ever as Security Congress has become a truly international event, with more attendees and sessions than ever before, aimed at a global audience. Security Congress will take place over three days with more than 100 educational and thought-provoking sessions to help security leaders... Continue reading
Posted Jan 10, 2019 at (ISC)² Blog
Image
(ISC)²'s recent Cybersecurity Workforce Study asked what certifications professionals had plans to pursue in the coming year. Download the infographic: What Cybersecurity Certifications Are You Pursuing This Year? Continue reading
Posted Jan 9, 2019 at (ISC)² Blog
Image
The (ISC)² Peru Chapter was started by initiative of Javier Romero, CISSP, by mid-2017, when he put in a petition to start a new chapter. Worried that top-level management of companies in Peru was not aware of – or possibly “not concerned enough about” - information security matters, a group of (ISC)² members committed to advocate information security in the country joined together with the goal of becoming the reliable reference in the subject for the local industry and government. Luis Mendoza, Michael Ocrospoma, and Rolando Navarro, together with J. Romero, then outlined an action strategy for the years to... Continue reading
Posted Jan 4, 2019 at (ISC)² Blog
Image
Cybersecurity professionals are busy enough even without having to keep up with the constant changes in the threat landscape and advances in security technology. But keep up you must, and that’s why (ISC)² have webcasts throughout the year on various security-related topics. Based on ratings by cybersecurity professionals, here are the top 10 webcasts from 2018: State of the Internet/Security 2018: Web Attacks Learn how reptiles and hackers target the hotel industry by hitting the library, and how to fight back. This webcast includes case studies on how the aviation industry deploys crawler management solutions to protect their websites. Delivered... Continue reading
Posted Jan 2, 2019 at (ISC)² Blog
Image
Name: Amy Mitchell Title: Managed Services Engineer Employer: KnowBe4 Location: Clearwater, FL, U.S. Education: Associates of Science Years in IT: 6 Years in cybersecurity: 4 Cybersecurity certifications: Security+, CISSP How did you decide upon a career in cybersecurity? I realized how important PCI DSS security is when I worked in the service industry. From there, I worked in network security for point of sale systems and have now moved to KnowBe4. I help teach people about cybersecurity awareness around the world. Why did you decide to pursue your CISSP? I interact and work with CISSPs on a regular basis. I... Continue reading
Posted Dec 26, 2018 at (ISC)² Blog
Image
By Tony Vizza, CISSP, (ISC)² Director of Cybersecurity Advocacy, APAC Over the past few weeks, I have noticed a marked increase in the number of phishing attempts, both using cyber based methods as well as traditional methods such as phone calls, text messages and even postal service scams. Scammers rely on psychological trigger points to succeed. December, in particular, is a stressful time for many people. Boozy Christmas parties, buying presents for your family (and finding something your partner will like), planning the holiday getaway with the kids and of course wrapping up end-of-quarter and end-of-year and you have a... Continue reading
Posted Dec 21, 2018 at (ISC)² Blog
Image
(ISC)² regularly conducts Job Task Analysis (JTA) studies to review and update the content outline of its credentialing examinations. A JTA is the methodical process used to determine tasks that are performed by credential holders and knowledge and skills required to perform those tasks successfully. Results of the JTA study link a candidate’s examination score directly to the domain knowledge being tested. A JTA Study Workshop for CISSP-ISSAP has tentatively been scheduled toward the end of March 2019. In preparation for the upcoming study, we would like to hear from our CISSP-ISSAP members. Please comment on any new content and... Continue reading
Posted Dec 19, 2018 at (ISC)² Blog
Image
This week, SC Media released its list of Finalists for the 2019 SC Awards and (ISC)2 is once again in consideration as the best professional certification program in the cybersecurity industry. Winners will be announced at the SC Awards dinner, a gala evening convening hundreds of the industry’s brightest luminaries to network, toast the winners, and celebrate the best the cybersecurity community has to offer. The event takes place on March 5 at the InterContinental Hotel in San Francisco during the week of RSA Conference. Tickets can be purchased here. Continue reading
Posted Dec 14, 2018 at (ISC)² Blog
Image
Name: Ramana Krothapalli Title: Consultant - Information Security & GRC Employer: Self-Employed Location: Hyderabad, India Education: M.Sc., PGDCA Years in IT: 7 Years in cybersecurity and/or privacy: 17 Cybersecurity certifications: CISSP, HCISSP, CISA, CISM, ISO 27001 LA How did you decide upon a career in healthcare security and/or privacy? It’s rather a chance than a choice. As the chief information security officer (CISO) of a software development firm, I was tasked to implement information security and privacy in multiple healthcare development projects. I am happy that I could contribute to security of healthcare. Why did you decide to pursue your... Continue reading
Posted Dec 13, 2018 at (ISC)² Blog
Image
The National Cyber Security Centre (NCSC) has outlined new rules of the road for earning its Certified Cyber Professional (CCP) specialist certification. The new pilot program for the certification commences in 2019 and focuses on assessing two main areas of specialism: risk management and security architecture. Why is this of interest to you? The NCSC has outlined three ways in which candidates can demonstrate foundational cybersecurity knowledge in order to qualify for the scheme. One of those ways is to hold a CISSP certification and a full (ISC)2 membership. This is yet another signpost that highlights the industry recognition of... Continue reading
Posted Dec 10, 2018 at (ISC)² Blog
Image
Our own John McCumber, director of cybersecurity advocacy for North America, was provided a great opportunity this week to present the findings from our recent 2018 Cybersecurity Workforce Study to the National Initiative for Cybersecurity Education Working Group (NICEWG) at its monthly meeting. As you may well know – or can guess – this working group covers the NICE Framework published by the National Institute for Standards and Technology (NIST) and brings together a diverse group of public and private sector cybersecurity experts to discuss ways to advance cybersecurity education, training and workforce development. To be invited to present to... Continue reading
Posted Dec 7, 2018 at (ISC)² Blog
Image
Name: Shawn O’Reilly Title: Information Security Officer Employer: SUNY Upstate Medical University Location: Syracuse, New York Education: Master’s in Information Management, Syracuse University Years in IT: 25 Years in cybersecurity and/or privacy: 20 Cybersecurity certifications: CISSP, CCSP, HCISPP, CISM, CISA How did you decide upon a career in healthcare security and privacy? The opportunity to move into a healthcare security and privacy career presented itself about 15 years ago when I was searching for a new job. I was previously employed by a Big 4 accounting firm, where I got my start as a cybersecurity consultant. I was looking to... Continue reading
Posted Dec 6, 2018 at (ISC)² Blog
Image
Cyberattacks rank as the number one risk of doing business in North America, Europe and the East Asia-Pacific region, according to a World Economic Forum report, Regional Risks of Doing Business. While business leaders in other areas of the globe are more concerned about unemployment, unstable governments and oil prices, cyber risks rank as the fifth highest worldwide. The concern about cyberattacks shows just how critical cybersecurity has become, ranking even higher than terrorism in the global top 10. Not surprisingly, cyber risks are a bigger concern among the most industrialized areas of the globe such as North America, where... Continue reading
Posted Dec 3, 2018 at (ISC)² Blog
Image
Name: George Chacko Title: Senior Manager, Information Security Employer: New York Blood Center Location: New York, NY, U.S. Education: State University of New York at Buffalo Years in cybersecurity and/or privacy: 14 Cybersecurity certifications: CISSP, HCISPP How did you decide upon a career in healthcare security and/or privacy? After starting my career in financial services as an information security professional, I knew that the healthcare industry was an area in which experienced resources were needed due to the rise in major breaches of medical records and personal healthcare information. I had many family and friends in different roles in healthcare... Continue reading
Posted Nov 29, 2018 at (ISC)² Blog
Image
The holidays are a great time to give back to your local community. November 27 is known as Giving Tuesday, a global day of giving. This year, the Center for Cyber Safety and Education is adding some “cattitude” to Giving Tuesday. Sign up for the Center’s “Round-Up” program from November 1 to November 27 and you will be entered for the chance to win a Jim Davis autographed holiday-themed Garfield print. Once enrolled, the program “rounds up” your change on every day purchases and donates them to the charity of your choice. Another way to give back is at the... Continue reading
Posted Nov 27, 2018 at (ISC)² Blog
Image
(ISC)² is most widely known for the Certified Information Systems Security Professional (CISSP) certification. Holding your CISSP certification means something. It means you are experienced, well-trained, dedicated and constantly working to stay up to speed on the ever-evolving world of cybersecurity. There are more than 125,000 certified CISSPs around the world working at Fortune 100 companies, start-ups and as independent contractors. Certification Magazine surveyed a group of CISSPs and discovered they remain among the highest compensated security professionals, with an average U.S. salary of $131,030. To learn more about CISSP salary information, including job satisfaction and experience levels, read the... Continue reading
Posted Nov 19, 2018 at (ISC)² Blog
Image
The 2018 Cybersecurity Workforce Study, recently released by (ISC)2, reveals that 63% of organizations currently don’t have enough cybersecurity staff. The number is hardly surprising considering the worldwide cybersecurity workforce shortage is nearly 3 million. Employers have an acute need to build their cyber teams with the requisite skills and experience. Their priorities in looking for candidates include: relevant work experience – 49% understanding of advanced cybersecurity concepts – 47% cybersecurity certifications – 43% extensive cybersecurity work experience – 40% strong non-technical/soft skills – 39% If you’re seeking employment in a cybersecurity role, keep these priorities in mind. They provide... Continue reading
Posted Nov 15, 2018 at (ISC)² Blog
Image
Each year, (ISC)² and the Center for Cyber Safety and Education partner together to offer scholarships to students around the world. There are three categories of scholarships in this program: Graduate, Undergraduate and Women’s. All are open to students pursuing cybersecurity degrees in any country in the world, whether they are full-time or part-time students, online or attending a campus. The Graduate Scholarship period is open until January 15. Applicants must be pursuing, or plan to pursue, a master’s degree program, or a doctoral study, with a focus on cybersecurity or information assurance. The Undergraduate Scholarship application period will open... Continue reading
Posted Nov 12, 2018 at (ISC)² Blog
Posted Nov 8, 2018 at (ISC)² Blog
Image
If you’re looking to break into the field of cybersecurity – and workforce research shows, we need you to join us – (ISC)²’s SSCP certification may be the way to go. Certification Magazine recently wrote about the SSCP certification as a solid point of entry for aspiring security professionals. The certification is ideal for those in “boots on the ground” positions within security operations. The SSCP exam is highly technical and focused on hands-on knowledge skills. The certification is ideal for security analysts, systems engineers, database administrators and others responsible for the day-to-day operations of securing their organizations critical assets.... Continue reading
Posted Nov 6, 2018 at (ISC)² Blog
Image
(ISC)² recently honored two additions to the distinguished group of Fellows of (ISC)². This recognition is designated upon elite cybersecurity professionals who have made outstanding contributions over the course of their careers to the profession and industry at large. John McCumber, director of cybersecurity advocacy in North America for (ISC)², is a past Fellow and presented the honor to two outstanding and deserving individuals this year at Security Congress in New Orleans during the Information Security Leadership Awards ceremony. The first Fellow honored was Dr. Ronald Ross. His area of focus has been systems security engineering and risk management. He... Continue reading
Posted Nov 6, 2018 at (ISC)² Blog
Image
Despite a shortage of 3 million cybersecurity professionals across the globe, a comfortable majority of those currently employed (68%) are happy in their jobs, according to (ISC)2’s newly published Cybersecurity Workforce Study. Their job satisfaction is related to the level of investment employers make in cybersecurity skills, technology and practices – all of which determines how cybersecurity professionals spend their time. The study is instructive to employers who are hampered by the skills shortage, but nevertheless need to improve their cybersecurity posture and culture. “By providing the right security resources, whether that means additional personnel, training or specialized cybersecurity solutions,... Continue reading
Posted Nov 5, 2018 at (ISC)² Blog
Image
New Orleans jazz band welcomes attendees to the city and declares (ISC)2 Security Congress 2018 open By David Shearer, CISSP, (ISC)² CEO When I made the decision two years ago to transform the annual (ISC)2 Security Congress into an independent event, I knew it would be a huge undertaking for our team, but I also understood the passion of our member base and that we had enough interest to support this evolution. After returning from the 2018 Congress held in New Orleans just a few weeks ago (from October 8-10) I am reaffirmed that it was the right move. Our... Continue reading
Posted Oct 29, 2018 at (ISC)² Blog
Image
This year’s (ISC)² Security Congress event took place at the New Orleans Marriott in Louisiana October 8-10, 2018, with nearly 2,000 cybersecurity professionals in attendance to share best practices, learn new skills and explore solutions to top challenges facing the profession. With keynote addresses from Congressman Cedric Richmond, Jane McGonigal, Theresa Payton and Dr. Jessica Barker, Security Congress featured more than 100 educational breakout sessions on a dozen security tracks, including cloud security; critical infrastructure; cybercrime; governance, regulation and compliance; incident response and forensics; identity access management; privacy; professional development; research; software assurance and application security; and cyber threats. Top... Continue reading
Posted Oct 25, 2018 at (ISC)² Blog