This is (ISC)² Management's Typepad Profile.
Join Typepad and start following (ISC)² Management's activity
Join Now!
Already a member? Sign In
(ISC)² Management
A compilation of thoughts from members of the (ISC)2 leadership team.
Recent Activity
Image
As published in the March/April 2020 edition of InfoSecurity Professional Magazine By Shaun Aghili, DBA, CISSP-ISSMP, CCSP, CISA and Bobby Swar, Ph.D. In May 2018, two major banks in Canada—Bank of Montreal and Canadian Imperial Bank of Commerce—received email threats from malicious hackers claiming to have gained access to customers’ sensitive information. The attackers demanded $1 million in cryptocurrency from each bank or they would publicly release customers’ information. The successful attacks on these banks led to 90,000 customers’ account information being compromised and an undisclosed amount of money lost as the result of the security breaches. In recent years,... Continue reading
Posted 5 days ago at (ISC)² Blog
Image
It’s a great time to work in cybersecurity. Demand for security professionals continues to grow, and the need for qualified people with certain security certifications is strong. But getting that first opportunity to work in security can be challenging. That’s because security is a field where personal relationships count just as much as experience and education. So how can you get a leg up and develop the qualifications necessary to land a job? Here are 5 suggestions for forging your path to gainful security employment. Train and Join an Association One of the first places to start when you’re preparing... Continue reading
Posted 7 days ago at (ISC)² Blog
Every doctoral program is unique and admission requirements will vary considerably from program to program. Many doctoral programs require completion of a master’s degree in a relevant discipline. Admissions committees will review past academic performance, professional experience, standardized test scores (if required), statement of purpose, recommendations, the applicant’s research interests and how those align with existing faculty work, as well as the applicant’s ability to conduct independent research and generate new knowledge. Holding the CISSP credential is a very strong indicator of an individual’s knowledge and experience as a cybersecurity professional and certainly would help strengthen a candidate’s application to an academic program.
Image
Last week, (ISC)2 launched the annual Cybersecurity Workforce Survey and we need to hear from you. When the study is released later this year, it will be shared with government agencies and security policy makers, as well as referenced in countless media reports. The report is often used by organizations of all sizes around the world as a benchmark for security hiring strategies. Your participation in the survey will help shape the conversation around the cybersecurity workforce during the year to come. Build awareness for the issues that matter most to professionals like you by telling us about what you... Continue reading
Posted May 18, 2020 at (ISC)² Blog
Hi Lisa! The results displayed on pages 18-20 are role/responsibility based and are not tied to specific job titles. Security Operations Security Administration Risk Management Compliance Forensics Penetration Testing Secure Software Development Operation Technology Security (ICS) I hope this helps!
Hello Danny - we don't share pass rates on any of our exams, but a passing mark for the CAP is 700 out of 1000.
Image
As published in the March/April 2020 edition of InfoSecurity Professional Magazine By Crystal Bedell Humans have long been touted as the weakest link in security. But in many ways that axiom oversimplifies the issue of the human element and makes end users collectively the bad guy when, for the most part, they’re only trying to do their jobs. Understanding why humans behave the way they do, and allowing them to inform a security strategy, can strengthen the human element so that people aren’t the weakest link but a helpful component of your security arsenal. “We put people in front of... Continue reading
Posted May 14, 2020 at (ISC)² Blog
(ISC)2 recently announced the CISSP certification has been formally recognized as comparable to the U.K.’s Master’s degree standard, following the completion of an independent benchmarking process. We’ve compiled information here to help members – especially those in the U.K. and across Europe – understand this achievement. What does the CISSP being assessed as comparable to the U.K. Master’s Degree Standard mean for me and other CISSPs? While the value and importance of a globally-understood cybersecurity certification is well known within the (ISC)2 community, reinforcing the meaning of the certification in relation to other forms of education, and professional distinction and... Continue reading
Posted May 13, 2020 at (ISC)² Blog
Image
The needs of those pursuing a cybersecurity career are unlike any other field. Stress is high, and the knowledge and skills it demands are evolving and changing all the time. That’s why it’s a great idea to have a mentor to serve as a sounding board at critical points throughout your career. A mentor can provide feedback on career management that you might not find in a job and also help you forge relationships with key contacts in the industry. Here are three key steps to cultivating this important professional relationship. Do Your Research Before you even try to find... Continue reading
Posted May 13, 2020 at (ISC)² Blog
Image
There has never been a better time to become an information security professional. According to the U.S. Bureau of Labor Statistics, the demand for security experts is expected to grow exponentially through 2028. So, what are the hottest attributes employers are seeking out in 2020? Here are 5 of the most sought-after skills companies want for their security and IT teams today. Cloud Security Businesses are increasingly moving workloads to the cloud, and it has become an integral part of IT strategy that is only expected to grow. IDC predicts public cloud adoption will reach nearly $500 billion in just... Continue reading
Posted May 5, 2020 at (ISC)² Blog
Image
So, you’ve decided you want to break into cybersecurity but have no relevant experience. The bad news is experience is important when it comes to working in this field. But that doesn’t mean finding your first job will be impossible either. The cybersecurity field continues to grow each year, and hiring managers are looking for varied skill sets to fill security roles. However, you will need to demonstrate you have other things to offer in lieu of years on the job in security. How do you do that? By getting creative. Here are 5 ways to stand out as a... Continue reading
Posted Apr 29, 2020 at (ISC)² Blog
Image
When asked about changes experienced due to COVID-19, almost half (47%) of cybersecurity professionals polled by (ISC)2 said they have been reassigned to IT tasks. These findings are part of the (ISC)2 Cybersecurity Pulse Survey, in which 256 cybersecurity professionals shared insights on their current work situations during the first several weeks of their organizations’ response to the COVID-19 pandemic. Reassigning cybersecurity workers appears to be one of the ways companies were, at least initially, trying to cope with the increase of employees working from home. The move comes as threat actors seek to exploit organizations’ broader attack surfaces, as... Continue reading
Posted Apr 28, 2020 at (ISC)² Blog
Image
Earning a CISSP Concentration is an excellent way to advance your cybersecurity career and skill set. The CISSP-ISSAP, CISSP-ISSEP and CISSP-ISSMP all build on the CISSP, adding depth and mastery to the focus areas covered. If you’re looking to expand your portfolio, these elite credentials are worth exploring. CISSP Concentrations prove subject matter mastery beyond the CISSP, positioning those who hold them for jobs that command increased pay, greater responsibilities and more professional satisfaction. If you’re looking for reasons to pursue one now, here are five: Career advancement. Concentrations prove an elite level of expertise, raising visibility, credibility and opening... Continue reading
Posted Apr 23, 2020 at (ISC)² Blog
Image
By Scott Dickinson, CISSP, CCSP First a disclaimer. This is not designed to be a piece discussing the political beliefs or whether the right or wrong decisions were made at the appropriate time during the COVID-19 crisis. This COVID-19 event is happening to us, but what can we do about it? We can document our activities and use it as an actual exercise for BCP/COOP/DR. I will be using some examples from colleagues, as well as some of my personal experiences mixed in, so please don't assume I am speaking for any one organization. During this time of COVID-19 social... Continue reading
Posted Apr 22, 2020 at (ISC)² Blog
Image
By AJ Yawn, CISSP Earlier this month, AWS announced that Amazon Detective is now available to all customers, reinforcing their dedication to helping customers hold up their end of the shared responsibility model. This shared responsibility model enables your organization to alleviate the burden of responsibility for the security of the physical infrastructure of AWS or “Security of the cloud.” This frees up your organization to focus on the “security in the cloud” which boils down to protecting your applications and sensitive data your customers' entrust you with. AWS developed security best practices to consider when designing and evaluating your... Continue reading
Posted Apr 20, 2020 at (ISC)² Blog
We are excited to share that our Professional Development Institute (PDI) has been awarded a 2020 D2L Excellence Award. The honor comes on the heels of the first anniversary of PDI, a portfolio of timely and relevant continuing education courses that are free for (ISC)2 members and help keep cybersecurity professionals’ skills sharp and curiosity piqued. The D2L Excellence Awards recognize educators, trainers, and leaders in learning engagement that have leveraged the D2L learning platform to deliver learning experiences that are innovative, collaborative or have made an extraordinary impact on learning outcomes. These awards celebrate inspiration and innovation in digital... Continue reading
Posted Apr 17, 2020 at (ISC)² Blog
Image
More than twice as many small businesses are investing in Internet of Things (IoT) technologies than in cybersecurity, according to recent research. And while this may raise some red flags, it is possible that small businesses are spending less on cybersecurity for justifiable reasons. A poll conducted by Survey Monkey for business network CNBC says 44% of small businesses are planning to invest in IoT while only 20% plan to invest in cybersecurity. Naturally, this raises the very real concern that companies may purchase technology without properly securing it. Doing so, of course, would be a mistake. As a whole,... Continue reading
Posted Apr 16, 2020 at (ISC)² Blog
Image
Flexibility and convenience. Most aspects of our lives today demand both, and that’s clearly the case when preparing for an (ISC)2 certification exam. That’s why our Online Instructor-Led and Self-Paced courses deliver the quality instruction and materials you expect from (ISC)2, with the freedom you need to commit on your own schedule. Online Instructor-Led Training Whether you’re working toward achieving CISSP, SSCP, CCSP or another (ISC)2 credential, Official Online Instructor-Led Training delivers the best of all worlds in (ISC)2 exam prep. It offers all the benefits of in-person training with the convenience of completing courses in the comfort of your... Continue reading
Posted Apr 15, 2020 at (ISC)² Blog
Image
When it comes to cloud security, it’s the Chief Information Security Officer’s (CISO) responsibility to understand the risks of a cloud architecture and develop a strategy for protecting against existing and emerging threats. And Luis Gonsalves, Head of Security for Banco de Portugal, Portugal’s central bank, arguably has a bigger picture view than most. Not only is he a CISO, but he founded the Portugal Chapter of the Cloud Security Alliance. Gonsalves is also a professor at the Instituto Universitario de Lisboa, and the Portuguese Banking Training Institute and serves as a consultant for other companies. From this multifaceted vantage... Continue reading
Posted Apr 14, 2020 at (ISC)² Blog
Image
Brian Alberti, Corporate Public Relations Manager, (ISC)2 Millions of workers around the world have been asked to work from their homes for an unspecified period of time until the COVID-19 outbreak has been contained by social distancing. For many people, this may be the first time in their work lives that they have worked out of their home for more than a day or two, and the transition can be a challenging one, especially with no definitive timeline on your return to your office building. Nearly two years ago I made the switch to a remote work position after nearly... Continue reading
Posted Apr 13, 2020 at (ISC)² Blog
Image
By Dr. Lyron Andrews, CISSP, SSCP and CCSP The vast majority of organizations today have migrated to the cloud to take advantage of rapid deployment, scalability and user empowerment. Eighty nine percent of respondents to a 2019 survey by DivvyCloud have adopted the public cloud. But many don’t know how the cloud works, the best use cases, potential risks, or the tools available to help optimize their security posture. And even as organizations struggle to understand cloud basics, new industry concepts and technologies, such as zero trust, micro segmentation, containerization and microservices, continue to emerge. By pursuing Certified Cloud Security... Continue reading
Posted Apr 9, 2020 at (ISC)² Blog
Image
By Tony Vizza, CISSP, CCSP, Director for Cyber Security Advocacy - APAC at (ISC)² “Tony, why did you get into cyber security?,” I am often asked. Truth be told, I had an interest in IT from a very young age. In second grade, my classroom had an early model Apple which the teacher did not know how to use and which I taught her. In high school, I took computer studies as a subject. Following this, I enrolled and completed an undergraduate degree in computer science. My first job after graduation was as a programmer and network administrator within a... Continue reading
Posted Apr 8, 2020 at (ISC)² Blog
Image
(ISC)2 offers comprehensive certification exam prep for every type of learner. Whether you’re studying for the CISSP, CCSP, SSCP or another industry leading (ISC)2 certification, we have exam prep solutions to help you prepare with confidence. Many successful candidates move forward with Official (ISC)2 Online Instructor-Led Training, believing it delivers the best of both worlds – live expert instruction and online convenience for complete flexibility. And now this popular training is being offered at a new lower price. Perfect for distance learning, this hands-on training format offers the structure of real-time class in a virtual setting, with the option to... Continue reading
Posted Apr 7, 2020 at (ISC)² Blog
Image
The number of people working from home is skyrocketing as the COVID-19 pandemic forces companies to close offices and practice social distancing. The sudden explosion of makeshift home office environments is adding to the burden of already overtaxed cybersecurity workers, who now face the massive task of trying to protect a remote workforce against cyber threats. While cybersecurity professionals put in extra hours to handle the situation, the increasing ranks of remote workers are catching the attention of another group – cyber attackers. Cyber criminals are betting that many of these hastily outfitted work-from-home environments will not have the same... Continue reading
Posted Apr 6, 2020 at (ISC)² Blog
Image
Earlier this week, (ISC)2 announced that nominations are now being accepted for the 2020 (ISC)2 Global Achievement Awards. This awards program replaces the former (ISC)2 Awards Program, which had included the Information Security Leadership Awards (ISLA). The new program creates a unified, global platform for recognition of the most outstanding annual achievements in the field of cybersecurity. For years, (ISC)2 has honored and celebrated deserving cybersecurity professionals from around the world with its awards program, highlighting best practices and those who have gone above and beyond to inspire a safe and secure cyber world. The four categories now open for... Continue reading
Posted Apr 3, 2020 at (ISC)² Blog