Just what we need…another NFL controversy. Only this time, NFL players’ personal data was leaked. 1,200 Football Players' Personal Data Exposed In NFL Leak -- Colin Kaepernick Included The breach heard round the world – The Inside Story of Equifax’s Massive Data Breach Take a look inside the massive Equifax data breach. Fake news is everywhere. Even following a mass tragedy like the one in Las Vegas. Bad Info Follows Every Tragedy. Don't Fall For It Be sure to verify your news sources, especially before sharing them. Really? There’s more? Yahoo Triples Estimate of Breached Accounts to 3 Billion A massive data breach at Yahoo in 2013 was far more extensive than previously disclosed, affecting all of its 3 billion user accounts. Russian
- Oct 06,
Organizational culture typically takes shape as a result of decisions and actions by top management, who are responsible for setting vision, values and practices. When leadership doesn’t understand something, it shows in how the organization handles that particular area. When it comes to IT security, research by (ISC)2 reveals a tepid commitment to investing in a strong security stance, both in the areas of technology and human resources. Too often, cybersecurity teams are short-staffed, lack the resources they need to handle a cyberattack, or aren’t given the responsibility to fill a more proactive role in protecting company data and networks. About half of participants in (ISC)2’s 2017 Global Information Security Workforce Study, consisting of IT professionals in charge of security
Oct 05,Dear (ISC)² NCR Chapter Members: It’s been smooth sailing in 2017 for our chapter. In January, the board established goals and had the following achievements: Increase membership to 125 or greater. (currently about 150) Hold 11-member monthly meetings with a presenter. (On track) Organize one (1) social activity. (Beginning to plan this now.) Finalize sponsorship charter with approval by board. (On track) Update the (ISC)² NCR Chapter website. (Completed) Collaborate with other chapters in the region. (met with others at the (ISC)2 North America HQ) Automation of membership intake via website. (Completed) Now, the chapter is looking forward to 2018 with the election of board members. Our Bylaws require that we follow a documented procedure for electing all (ISC)² NCR BoD
Oct 03,Whether it’s Congress, a two-day Secure Summit, or a one-hour webinar, the experience is a product of the (ISC)² Community By Tisun Rustem, Senior Events Manager in EMEA, (ISC)² With so many industry events and online educational opportunities vying for your attention, particularly in information or cybersecurity, one can be forgiven for wondering whether an (ISC)² event could have something unique to offer. (ISC)² serves its membership with a range of on-line and conference-based educational opportunities, including one-hour webinars and half-day symposia, your annual regional Congress; and new to this year, the two-day Secure Summits - five of which are taking place in the EMEA region. Two, MENA and the UK, are still to come in November and December. They all provide
Oct 03,