To provide transparency with the association, (ISC)² provides a quarterly update for members and candidates where we report on the latest developments at (ISC)². Following our board meetings, our CEO, Clar Rosso, and (ISC)² Board of Directors Chairperson, Zachary Tudor, CISSP, recap the latest association developments. The 2021 Q3 update included membership milestones (including 10,000 CCSP members worldwide!), association accreditations and new executive leadership announcements focused on member benefits and advocacy. Zach and Clar also discuss what (ISC)² is doing to continue to address global diversity, equity and inclusion in cybersecurity, as well as the workforce gap. You can view previous quarterly updates, as well as the latest Q3 update at https://www.isc2.org/Membership/ISC2-Insights.
- Aug 23,
As a cybersecurity professional, you probably spend most of your day honing your craft, refining your technical skills. While this is important, there are other focal points that should not be neglected. One of these is your responsibility to know all of the assets that are present in your organization. Achieving full asset visibility is a difficult endeavor. The inventory and classification process alone requires not only technical knowledge, but also the ability to discover those entities that are invisible to you. This is a deeper subject than the specious tool-based promises of cataloging “Shadow IT”. Asset visibility can be likened to the “fourth wall” of theater. Want to learn more, and find out how the CISSP credential can
Aug 19,Container deployments are on the rise and expected to increase over the next 12 months. At the same time, container security incidents are rising exponentially. What types of security challenges are causing these events and, in turn, forcing organizations to delay application deployment? Before answering, we need to understand why security challenges are currently emerging. Containers have been around since the early 2000s, yet developers didn’t begin using them until recently. Subsequently, organizations are only now beginning to realize their potential – and four areas that make container security uniquely tricky. Read the full article.
Aug 18,The nature of organizations is to evolve and adapt to changes and the risks associated with these changes. Businesses migrate to the cloud deploying a multitude of platforms, move their data in the cloud, and employ containerized services not only to survive change but to thrive in this challenging environment. Even though all these technological advancements benefit businesses in many ways, they equally create new risks. The cybersecurity landscape is evolving together with the technological one. Cybersecurity risks have “escaped” from the siloed environment of IT departments and have become business risks. This is where the role of a Certified Authorization Professional (CAP) becomes incredibly important. Its role is to lead and navigate the business through troubled waters to the
Aug 17,Keeping up with the latest cybersecurity industry news and information can be a challenge all on its own. Listening to podcasts is a great way to stay up to date while you’re on the go, or even while you’re working. The (ISC)² team has gathered a collection of top cybersecurity podcasts that support our vision of inspiring a safe and secure cyber world. The cybersecurity experts featured below provide timely industry updates and other insights via engaging conversational platforms. Top Cybersecurity Podcasts Cyber Security Interviews Personal conversations with cybersecurity experts working in the field today. 20-60 minutes l Google Podcasts, Apple Podcasts, Spotify Cyber Security Today – IT World Canada Updates on the latest cyber security threats
Aug 16,