• Volunteering is at the heart of the mission of (ISC)². The individuals who offer their time, skills and knowledge positively impact their community helping create a safer and more secure cyber world. We want to highlight some of our volunteers, the impact they make on the cybersecurity profession and the world at large during annual Volunteer Appreciation Week. We interviewed Lisa Vaughan, CISSP to discuss her cybersecurity career, the various volunteer roles she has held at (ISC)² and the impact volunteering has on her life. Lisa is the Executive Director, Information Technology for Hexagon U.S. Federal. In addition to holding the CISSP, she also has the PMP certification. Where did your career begin? What prompted your initial interest in cybersecurity?

    Apr 18,
  • April’s event calendar kicked off with (ISC)² SECURE London, a return to regional events for (ISC)² members and a conference that took place amid an unprecedented time for our industry and for practitioners. A global skills gap of over 2.7 million, years of disruption due to the pandemic and unprecedented digital transformation, geopolitical strife at the doorstep of Europe generating global cyberattack fallout and profound changes in the threats being faced and the technologies, tools and tactics that counter them. The day began with a keynote from Chris Ensor, Deputy Director for Cyber Skills and Growth at the NCSC. Ensor discussed the lifecycle of the cybersecurity industry in the UK, the emerging similarities with other much-relied-upon sectors such as the

    Apr 14,
  • By Samuel Rugi, an MSc Information technology (Security), Certified Information Security Professional (CISSP), Certified Information Security Management (CISM), Cybersecurity Mentor at the Cyversity Organization and a Co-Chair Leadership LaunchPad at Technology Association of Oregon. Key Items to Consider for an Impactful Security Awareness Agenda 1 - Identify and understand security drivers and what they mean to the business. Confidentiality Integrity Availability 2 - Interlink those critical drivers with the following security themes. People Technology Data and Privacy Processes 3 - Understand the business environment. Threats Customers Public Community (Local, Regional, Continental and Global) Governance Structures Political, Social, Religious and Economic Triggers   Tools and Resources to Consider to be Successful and Keep Winning Governance Body: While it's easy to do

    Apr 12,
  • (ISC)² Organizational Statement in Opposition of Anti-DEI Legislation   As the world’s foremost cybersecurity professional organization, (ISC)² is leading the charge to ensure our profession reflects the diversity of the world we serve. Diversity, equity and inclusion are strategic priorities for the individuals and organizations (ISC)² represents, and we believe that inspiring a safe and secure cyber world means ensuring a diverse, equitable and inclusive cybersecurity profession.    Today, our profession does not reflect the world we live in, and at the same time, the current Cybersecurity Workforce Gap as tracked by the (ISC)² Cybersecurity Workforce Study reports unfilled demand for more than 2.7 million professionals. Building a more diverse and inclusive profession is key to addressing the workforce shortage.   As an

    Apr 11,
  • By Greg Anderson, (ISC)² Associate is an emerging cybersecurity professional with an interest in digital privacy. The U.S. Postal Service is in trouble. It’s $63 billion dollars in debt, and is expected to lose another $160 billion over the coming decade. Lawmakers are scratching their heads about how to pull it out of its deepening hole. Ideas to expand USPS revenue streams include offering check-cashing services, utility bill payments and selling bonds. What about something more innovative? To offer a more contemporary service, USPS can borrow an idea from the big tech playbook. Here’s how it would work: the postal service would open every letter they receive, read through it, and take note of any important details. For instance, the

    Apr 08,