We Keep Things Organized

  • Name: David SchneiderTitle: Senior Cyber Security Threat EngineerEmployer: Garmin InternationalLocation: Olathe, KS, U.S.A.Degree: BA, BS, MSYears in IT: 20Years in cybersecurity: 12Cybersecurity certifications: CCSP, CISSP, CISM, CISA, GWAPT, CIS LI How did you decide upon a career in cybersecurity? I became interested in cybersecurity while doing software development. When working as a developer, I started becoming interested in secure coding methods and what I could do to make what I was working on more secure from both a technical and end-user perspectives. I started enjoying other aspects around information security and felt that going back to graduate school and earning a computer security-specific degree would help me make the transition into a fulltime security role. Why did you get your

    Jan 17,
  • (ISC)2 webinars are an easy way to keep up-to-date with your CPEs and keep your finger on the pulse of the cybersecurity industry. We know your time is valuable, so these one-hour sessions are focused on topics and issues relevant to your day-to-day operations. Cloud security remains at the forefront of security conversations today.  Here are the top ten webinars for securing cloud services (in the North America region) for 2017: Office 365 Security & Performance - Proven Deployment Strategy Combining CASB + SWG Security Briefings Part 3: Compliance Checkup - HIPAA & the Cloud Security Briefings - Compliance Checkup - GLBA & the Cloud Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model Data Security Briefings Part

    Jan 15,
  • “My exam ended after exactly 100 questions and took me a little more than an hour to complete.” – Keith Yanachik The CISSP exam changed to CAT format in December 2017. We spoke to one of the first to take the CISSP CAT exam, Keith Yanachik, to ask him about his experience. Keith is an Enterprise Architect and has a bachelor’s degree in information systems management, as well as an MBA. Why did you decide to pursue the CISSP certification? I pursued the CISSP certification as a means to recognize my cybersecurity skills and to confirm that I know what it takes to manage an organization’s information systems security. What study tools did you use to prepare for the CISSP

    Jan 10,
  • Name: Sohail AwadTitle: EngineerEmployer: FreelancerLocation: U.K.Degree: Master of Science in Computer SecurityYears in IT: 16Years in information security: 12Cybersecurity certifications: SSCP, CCNA Security, CCNA R/S   What security skills and knowledge would you count as relevant to your current role, and ambitions for the future? Every skill or bit of knowledge I gain is relevant to my role as they help me to see the big picture and better tailor the solutions I create and develop. The SSCP, in essence, is designed to deliver that vision. I have found the secure programming techniques, data hiding and security policies and many more of what SSCP offers are very helpful to the things I am doing in software development now. I would

    Jan 08,
  • Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)²’s new look two-day Secure Summits bring multi-subject sessions from hands on practical workshops to keynotes and panel discussions, featuring local and international industry experts to maximise the learning experience and CPE opportunities. Serving the entire (ISC)² EMEA professional community with five regional events, the Summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members. Read on for insights from one of our popular Secure Summit UK sessions: (ISC)² 2017 Secure Summit UK in London saw Mark Stokes, Head of Digital & Electronics Forensics at Metropolitan Police lift the lid on

    Jan 04,
1 2 3 26