• October Cybersecurity Awareness Month Register TODAY for free, exciting, and engaging Cybersecurity Awareness Month Virtual Activities.Held every October, Cybersecurity Awareness Month is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online. University of Maryland Global Campus and the Center for Security Studies are proud to be champions in support of this essential online safety, awareness, and education initiative.Click here for more information.

    Oct 06,
  • Position: Cybersecurity Senior Specialist #5373 Department: Cybersecurity / Information Assurance / Governance, Risk and Compliance Position Description: Cybersecurity Senior Specialist Salary: $89,820 - $134,722 Link to Apply: https://sen.gov/729V Posting Date: Wednesday, September 30, 2020 Deadline Date: Until Filled

    Oct 01,
  • This white paper examines two recent case studies of criminal attacks against critical financial infrastructure and local government information. Both attacks had direct costs for the victim organizations, and second-order effects were felt by the organizations’ clients that suffered potential identity theft. This paper provides technical recommendations, including practices to mitigate future attacks, to organizational management and information security practitioners. These case studies are cautionary tales - of many in 2019 – that are informative lessons for examination by security professionals who want to improve their defenses, policies, practices and core capabilities.​​​​About the AuthorsTravis Howard, CISSP, and (ISC)​ National Capital Region chapter member is an active duty U.S. Naval officer specializing in information warfare, currently assigned to the Pentagon in

    Oct 23,
  • We are pleased to introduce two new opportunities for members in good standing to receive tuition assistance or ISC2 exam registration fee assistance. We look forward to you taking advantage of these opportunities as outlined below. Submission instructions can be found in the online application.If you have additional questions, please forward them to bod@isc2ncrchapter.org; Attention: Dr. Loyce Best Pailen, CISSP, ISC2-NCR – Education Chair For Tuition Assistance applicants must submit the following documents: A complete Application Form (see link below)A well-written, one-page (double-spaced) ESSAY, in Section 3 of the application form, clearly articulating “WHY YOUR APPLICATION SHOUD BE CONSIDERED FOR THIS SCHOLARSHIP.”A current resume or curriculum vitae (CV).Copy of recent university transcripts with a 2.5 minimum GPA (official transcript may

    Sep 15,
  • Register to attend CyberMaryland 2018 to hear industry leaders—including UMUC faculty—talk about the job of a chief information security officer (CISO). At the UMUC-sponsored Education Track (What CISOs Worry About), you can hear insights from academic leaders and professionals in the public and private sectors as they discuss how the right certifications, training, and education can help prepare you to deal with threats and job concerns.At this event, you can:• Hear from industry thought leaders including UMUC's own Dr. Lawrence Awuah and Dr. Balakrishnan Dasarathy• Network with CISOs from the public and private sectors and find out how their education got them where they are• Talk to former and current students, including members of the UMUC Cyber Padawans - the

    Sep 13,
  • Dear (ISC)² National Capital Region Chapter member, As a member of the NCR Chapter, you are eligible to receive a 10% discount on (ISC)² Direct Training Seminars. The upcoming local (ISC)² Direct Training Seminars are: CCSP and CAP Stafford, Virginia July 16 – 20 HCISPP and CSSLP Stafford, Virginia July 23 – 27 While the focus is on classroom-based, instructor-led training, if you are only able to attend remotely, you can get a 10% discount on recorded sessions, which are available at www.isc2.org under the “Education & Training” tab. All (ISC)² Direct instructor-led training comes with an Education Guarantee. This means that if you attend an (ISC)² Direct instructor-led training seminar and happen to be unsuccessful in your exam attempt,

    Jun 27,
  • Greetings, As an active (ISC)2 NCR chapter member you are eligible for a 15% discount to the ISC2 Secure Summit DC event being held on May 7th and 8th. Just enter the coupon code ”Chapter18” when checking out.Here’s a link to the event:http://www.cvent.com/events/securesummitdc/event-summary-a73abe5f2a50473fa0f143415094cbb9.aspxIf you attend, please be sure to visit our Chapter’s vendor booth.We hope to see you there!

    Apr 13,
  • So, you’ve decided you want to break into cybersecurity but have no relevant experience. The bad news is experience is important when it comes to working in this field. But that doesn’t mean finding your first job will be impossible either. The cybersecurity field continues to grow each year, and hiring managers are looking for varied skill sets to fill security roles. However, you will need to demonstrate you have other things to offer in lieu of years on the job in security. How do you do that? By getting creative. Here are 5 ways to stand out as a job applicant, even if you have little or no direct experience. Get Certified By getting certified, you demonstrate to potential

    Apr 29,
  • When asked about changes experienced due to COVID-19, almost half (47%) of cybersecurity professionals polled by (ISC)2 said they have been reassigned to IT tasks. These findings are part of the (ISC)2 Cybersecurity Pulse Survey, in which 256 cybersecurity professionals shared insights on their current work situations during the first several weeks of their organizations’ response to the COVID-19 pandemic. Reassigning cybersecurity workers appears to be one of the ways companies were, at least initially, trying to cope with the increase of employees working from home. The move comes as threat actors seek to exploit organizations’ broader attack surfaces, as many shifted to work-from-home practices. 23% of respondents say they have seen a rise in security incidents at their organizations

    Apr 28,
  • Earning a CISSP Concentration is an excellent way to advance your cybersecurity career and skill set. The CISSP-ISSAP, CISSP-ISSEP and CISSP-ISSMP all build on the CISSP, adding depth and mastery to the focus areas covered. If you’re looking to expand your portfolio, these elite credentials are worth exploring. CISSP Concentrations prove subject matter mastery beyond the CISSP, positioning those who hold them for jobs that command increased pay, greater responsibilities and more professional satisfaction. If you’re looking for reasons to pursue one now, here are five: Career advancement. Concentrations prove an elite level of expertise, raising visibility, credibility and opening new opportunities. Higher salaries. On average, (ISC)2 members report earning 35% more than non-members. The CISSP-ISSAP ranked #2 on Certification

    Apr 23,
  • By Scott Dickinson, CISSP, CCSP First a disclaimer. This is not designed to be a piece discussing the political beliefs or whether the right or wrong decisions were made at the appropriate time during the COVID-19 crisis. This COVID-19 event is happening to us, but what can we do about it? We can document our activities and use it as an actual exercise for BCP/COOP/DR. I will be using some examples from colleagues, as well as some of my personal experiences mixed in, so please don't assume I am speaking for any one organization. During this time of COVID-19 social distancing and working from home, many individuals, businesses and organizations are struggling with the sudden imposition of remote work and

    Apr 22,
  • By AJ Yawn, CISSP Earlier this month, AWS announced that Amazon Detective is now available to all customers, reinforcing their dedication to helping customers hold up their end of the shared responsibility model. This shared responsibility model enables your organization to alleviate the burden of responsibility for the security of the physical infrastructure of AWS or “Security of the cloud.” This frees up your organization to focus on the “security in the cloud” which boils down to protecting your applications and sensitive data your customers' entrust you with. AWS developed security best practices to consider when designing and evaluating your AWS architecture within the Security pillar of the well-architected framework. The security pillar outlines five focus areas that organizations must

    Apr 20,