At (ISC)² our vision is to inspire a safe and secure cyber world. Our members and the greater cyber community help to make this possible through (ISC)² Chapters and individual volunteer opportunities that promote cyber education and cyber safe practices. For this interview, we connected with KnowBe4, a company that works with its employees to encourage outreach opportunities to promote and further cyber education and discuss how other companies can create a similar model. Why does KnowBe4 prioritize cyber awareness training? The foundation of KnowBe4 was built on spreading security awareness training to employees to help better protect their organizations. It is important to support cyber awareness training to improve the overall security culture of organizations. It is still a
- Mar 10,
By Ala' F. Wrikat, MSc, CISSP, CISM. Ala' is currently a specialist in policies and strategic studies at the Financial-sector's CERT of Jordan. Defense in depth strategy has proven its effectiveness in preventing cyber threats over the years. At the abstract level, most technical security controls are designed with two main components; 1) a knowledge base, and 2) a matching engine. Each security product has its own version of a growing knowledge base of feeds (whatever these feeds are). The content and how frequent these knowledge bases get updated are often the basis of competition between vendors. In this context, where these knowledge bases are complementary, defense in depth is meaningful. However, with the emergence of Artificial Intelligence (AI) and
Mar 08,Last year’s Celebrating International Women’s Day: Carving a Cybersecurity Career Path webinar featured a panel of accomplished women in cybersecurity for a discussion that captured the female perspective in the field. The group came together to discuss the data surrounding the demographics that make up the workforce and how they are shifting. They also shared their journeys in the profession that led them to the leadership positions they now hold, including the challenges encountered and strategies they employed to succeed. The conversation took a look ahead to the evolution of diverse cybersecurity teams and the principles that inform how they are assembled. Join us for this year’s webinar Tackling Gender Bias - The Young Women's Perspectives on Monday, March 7
Mar 04,The (ISC)² Scholarship Program is part of an effort to bridge the cybersecurity workforce gap—which stands at 2.72 million needed professionals—by providing future cybersecurity professionals across the globe with scholarships to prepare them for a rewarding career in this important field. At the same time, the industry urgently needs more diverse perspectives and fresh talent to tackle the challenges of today and tomorrow. With the scholarships, (ISC)² wants to create more opportunities for historically underrepresented individuals and inspire more young people to pursue a career in cybersecurity. In 2021, Weijia Yan was awarded an (ISC)² Undergraduate Scholarship which supported her as she finished her senior year at Texas A&M University. Weijia graduated Magna Cum Laude in December 2021, earning a bachelor’s degree in
Mar 01,