Last week, (ISC)2 launched the annual Cybersecurity Workforce Survey and we need to hear from you. When the study is released later this year, it will be shared with government agencies and security policy makers, as well as referenced in countless media reports. The report is often used by organizations of all sizes around the world as a benchmark for security hiring strategies. To participate, please take the survey here: ow.ly/i23d50zEj6F Your participation in the survey will help shape the conversation around the cybersecurity workforce during the year to come. Build awareness for the issues that matter most to professionals like you by telling us about what you are experiencing in the field every day. If you would like
- May 18,
As published in the March/April 2020 edition of InfoSecurity Professional Magazine By Crystal Bedell Humans have long been touted as the weakest link in security. But in many ways that axiom oversimplifies the issue of the human element and makes end users collectively the bad guy when, for the most part, they’re only trying to do their jobs. Understanding why humans behave the way they do, and allowing them to inform a security strategy, can strengthen the human element so that people aren’t the weakest link but a helpful component of your security arsenal. “We put people in front of computers, and we expect them to behave in specific ways that are in line with the functionality and operations of those
May 14,(ISC)2 recently announced the CISSP certification has been formally recognized as comparable to the U.K.’s Master’s degree standard, following the completion of an independent benchmarking process. We’ve compiled information here to help members – especially those in the U.K. and across Europe – understand this achievement. What does the CISSP being assessed as comparable to the U.K. Master’s Degree Standard mean for me and other CISSPs? While the value and importance of a globally-understood cybersecurity certification is well known within the (ISC)2 community, reinforcing the meaning of the certification in relation to other forms of education, and professional distinction and accomplishments is equally important. Doing so aids understanding across educational institutions and employers, and also supports members in unlocking even
May 13,The needs of those pursuing a cybersecurity career are unlike any other field. Stress is high, and the knowledge and skills it demands are evolving and changing all the time. That’s why it’s a great idea to have a mentor to serve as a sounding board at critical points throughout your career. A mentor can provide feedback on career management that you might not find in a job and also help you forge relationships with key contacts in the industry. Here are three key steps to cultivating this important professional relationship. Do Your Research Before you even try to find a mentor to help guide you, it’s essential to identify what that person’s professional role is and how it enables
May 13,There has never been a better time to become an information security professional. According to the U.S. Bureau of Labor Statistics, the demand for security experts is expected to grow exponentially through 2028. So, what are the hottest attributes employers are seeking out in 2020? Here are 5 of the most sought-after skills companies want for their security and IT teams today. Cloud Security Businesses are increasingly moving workloads to the cloud, and it has become an integral part of IT strategy that is only expected to grow. IDC predicts public cloud adoption will reach nearly $500 billion in just 3 years. Of course, the cloud also poses more risk to data and operations, and that’s why professionals who understand cloud security
May 05,