Richard “Rich” W. Owen, Jr., CISSP has over 50 years of experience in the field of information protection. He is a past International President of the Information Systems Security Association, Distinguished Fellow, member of the Honor Roll and a member of the Information Security Hall of Fame. He is also a Fellow of the Ponemon Institute and the CEO of Johnny Security Seed, LLC. Rich worked alongside Harold “Hal” F. Tipton on several endeavors, including the creation of (ISC)² and the first CISSP exam as one of the early pioneers of the information security industry. Rich created numerous quality security programs and advised others on developing and improving their programs. He built the information security program for Mission Operations at Johnson Space Center,
- Oct 11,
Megan “Meg” West, CISSP, is an Incident Response Consultant for IBM’s X-Force Incident Response Team. Prior to joining IBM, she worked as the Global Cybersecurity Incident Response Manager for another F100 company. She currently holds the CISSP and Security+ certifications as well as a Master of Science degree in cybersecurity. She has spoken at several international cybersecurity conferences including (ISC)² Security Congress and SAP Sapphire Now. Megan spends her free time mentoring college students as they enter the cybersecurity field. She also enjoys creating free cybersecurity content on various social media platforms such as YouTube and Twitter. Register now to hear Megan speak at Security Congress. What does receiving the (ISC)² CEO Award mean to you? Achieving this (ISC)²
Oct 09,The Center for Cyber Safety and Education partnered with UKnightedXP to release Gaming for Parents, a new online program to support parents in keeping their families safe online and to raise awareness of the threats and potential mishaps. The program empowers parents with knowledge on parental controls and safety settings, choosing games based on the ESRB rating scale, securing internet connection, keeping software and devices up-to-date, training children on proper online conduct, cyberbullying and even signs of addiction. Most parents of younger children grew up playing video games, but the home consoles of past decades have experienced major technology upgrades over the years. Today, there are over 2.5 billion video gamers in the world and 70% of youth (under 18)
Oct 08,The use and processing of decentralized data stored in cloud platforms creates security challenges that require data protection strategies to evolve. That starts with achieving better visibility into what applications their employees are using, and how they are using them. User Activity Monitoring (UAM) solutions promise to identify and stop abnormal or anomalous user behavior, whether unintentional or malicious. As opposed to traditional indicators of compromise, indications of abuse help organizations to effectively detect, prioritize, and respond to areas of concern well before a data breach has occurred. Certified cloud security professionals can help their organizations establish and enforce visibility and governance across their cloud deployments by implementing best practices such as the principle of least privilege, robust user authentication
Oct 07,The Regional (ISC)² Chapter Recognition Awards are presented to an official chapter of (ISC)² within a specific region that best promotes the vision of (ISC)² by inspiring a safe and secure cyber world. The following chapters have demonstrated a well-rounded offering of activities and services designed to benefit its members and affiliates, while making a significant contribution to the profession and local community through the core focus areas of the (ISC)² Chapter Program of Connect, Educate, Inspire and Secure. Join us in celebrating the regional winners at the (ISC)² Global Achievement Awards during (ISC)² Security Congress. Asia-Pacific: Singapore Chapter The Singapore Chapter continues to gain notoriety by developing partnerships with local schools and organizations to conduct career talks and inspiring
Oct 06,