• Registration for the second (ISC)² online proctored CISSP exam pilot program is now open to candidates in the U.S., U.K. and Singapore. Built on results from the association’s first online proctored pilot test in 2021, this pilot program is designed to further assess the viability, and help determine the potential future availability, of online proctoring for (ISC)² certification examinations. The learnings from this pilot program will help us further augment our exam delivery capabilities, ensuring the experience is safe, secure and provides candidates with the best possible opportunity to demonstrate their competence, regardless of the examination delivery method. What’s New With exam security as the primary objective, (ISC)² has established new identity validation and security processes for this second pilot

    Feb 14,
  • In honor of Black History Month, we celebrate and acknowledge black pioneers in computer science and cybersecurity. Without their incredible contributions to technology, the cyberworld in which we live may not have been possible. We encourage you to learn more about these individuals and have included links below to read more. Annie Easley was one of the first black women to be hired by NASA as a ‘human computer’. She specialised in computer programming and alternative energy technologies, providing the technological foundations for some of the most important inventions of the 20th century, including communications, military and weather satellites.   Dr. Clarence “Skip” Ellis, a computer scientist, was the first black person to earn a Ph.D. in computer science from the University

    Feb 14,
  • Want to share your expertise with thousands of your peers at Security Congress? Now’s your chance! (ISC)² has issued a call for speakers for its 12th annual (ISC)² Security Congress conference, a hybrid event taking place on October 10-12, 2022, in Las Vegas and online. After two successful back-to-back virtual conferences, this year’s hybrid event will feature 120+ educational and thought leadership sessions on the hottest cyber topics from a roster of an estimated 150 speakers. In-person and virtual attendees can expect engaging sessions on a variety of emerging and trending topics, including cyber liability, quantum computing, ICS/critical infrastructure, Zero Trust principles, ransomware, workforce trends (diversity and recruiting), remote workforce security, supply chain security, artificial intelligence, DevSecOps and many more. Don’t know

    Feb 11,
  • By Charlene Deaver-Vazquez, CISSP, CISA. Charlene is the developer of Probabilistic Risk Modeling for Cyber (P-RMOD4Cyber) a framework of mathematical models for quantifying risk. There is a tendency to view the effectiveness of our cybersecurity practice through a single lens – compliance. We apply controls and best practices hardening our systems and continually monitoring our security posture. We implement defense in depth relying on strong perimeter defense and real-time analytics. At this point, we discuss risk in terms of defensive actions, what we’ve done and what we see based on our logs and alerts. What does a typical conversation around risk sound like at this maturity level? On any given day leadership can be informed on the progress of patching,

    Feb 10,
  • A Look Back at 2021 In 2021, 45 states and Puerto Rico introduced or considered 301 pieces of legislation dealing with cybersecurity. Of those 45 states, 35 enacted bills pertaining to cybersecurity. Topics covered in adopted state legislation include strengthening security measures for protecting government agencies and resources, cybersecurity training, data, ransomware, resources and the creation of task forces, studies and commissions. North Carolina became the first state to pass a law that would prohibit government entities from paying ransomware demands. Indiana passed legislation that requires reporting for all incidents related to ransomware. Both Connecticut and Utah passed bills that provide incentives for the private sector to put reasonable security practices in place to prepare for possible cybersecurity breaches. Georgia, Kansas, Michigan, Vermont and

    Feb 09,