Name: Tiffany TempleTitle: Cyber Security AnalystEmployer: City of GreensboroLocation: Greensboro, North Carolina, U.S.A.Education: Bachelor of Science in Management Information Systems - East Carolina University, Master of Science in Information Technology Management - University of North Carolina at GreensboroYears in IT: 5Years in information security: 4Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I was encouraged by my current boss to transition from Help Desk duties to an Information Security role after she saw in me the analytical skills necessary to succeed. It was a seamless transition for me and I can honestly say one of the best decisions I have made, as I have been learning new things and enhancing my skill set ever since.
- Oct 23,
This year marks the first ever (ISC)² EMEA Information Security Leadership Awards (ISLA), a chance for our community to recognise fellow information security and management professionals going the extra mile to enhance security across Europe, the Middle East and Africa. Overall, we received a staggering number of impressive submissions, over 200, and these were shortlisted down to our finalists by our judges, members of the Europe, Middle East and Africa Advisory Council (EAC). Winners will be announced at our Secure Summit UK on 12 December 2017. In the meantime, we will be sharing their stories on the blog. Here is the second instalment: Peter O’Boyle, Information Security Manager at ICON (Ireland) After graduating from the Dun Laoghaire Institute of Art, Design & Technology
Oct 21,It’s rare to have a day go by without some security news making headlines. This week saw #KRACK trending on social media, which raised lots of questions about the security of cybersecurity. Here’s a look at what went on this week in passwords, automation, and more. The big flaw. Undoubtedly, the most notable news in security this week was the Krack attack, which impacted millions of Wi-Fi users. Around the world, businesses and homes were vulnerable because of flaws in Wi-Fi networks that use the (WPA)2 protocol. The good news, according to Anthony Lim, member of the (ISC)2 Asian Advisory Council, is that companies that have strong security measures in place are less at risk. Additionally, hacking into the myriad
Oct 20,Name: Tony HarrisTitle: Consultant, Cyber SecurityEmployer: KPMG LLP Location: Vancouver, CanadaEducation: MSc, Cyber Security (in progress) from the University of Liverpool, and Bachelor of Arts in American Studies & International Relations from the University of British ColumbiaYears in IT: 8Years in cybersecurity: 7Cybersecurity certifications: CISSP, CISM How did you decide upon a career in cybersecurity? I began my career in general IT processes eight years ago as your typical jack-of-all-trades IT. I wanted to narrow my focus into a specialty that I'd be interested in and cybersecurity ultimately was that choice. The reason was because cybersecurity was a fast-paced and challenging environment, which kept me going compared to other specialties (i.e. DevOps, Systems Administration, and Helpdesk). Why did you
Oct 18,John McCumber is the newest member of the (ISC)² family. He joined the team last month and will be our first ever director of cybersecurity advocacy. John is based out of our North America Region office in Alexandria, Virginia and will be supporting the (ISC)² membership by advocating for them and the profession across the U.S. and Canada. John got his start in infosec in late 1986, when – in the middle of the night – he received a call that the DEC VAX 11/780 he was responsible for was under attack. Someone had figured out the vulnerability for the computer and it was being targeted by “bulletin board hackers.” John figured out what they were doing and how to
Oct 17,