We look forward to seeing you in the Exhibit Hall, the heart of Security Congress. On-site, we will be filling up the Octavius Ballroom at Caesars Palace with 30+ partners, sponsors and exhibitors and can’t miss events. Kick off your first day of the conference as the Exhibit Hall doors open at 9:30 a.m. or pop by on one of your networking breaks. Partners will be on-site throughout the day on Monday and Tuesday to engage with you. Be sure to collect your Passport to Prizes card at the (ISC)² booth and keep it with you as you travel through the Exhibit Hall. Visit select vendors and get your passport card stamped for a chance to win big in Vegas!
- Sep 14,
Earlier this year, (ISC)² hosted a webinar about a new kind of challenge facing cybersecurity: machine identity management. Although this security component has only received sizable attention over the last couple of years, Gartner ranked it among the top eight security trends for 2021. In the webinar, Kevin Bocek, Vice-President of Security Strategy & Threat Intelligence for Venafi, discussed the problems that arise when machine identities fail, infamous machine identity attacks and the protective measures organizations can take. Machine identities – TLS, SSH, and code signing keys and certificates – control encryption, authentication, and code execution for software-based machines such as: Load balancers and application servers Open-source software Microservices Service meshes Kubernetes Cloud-to-cloud integrations API to API integrations Distributed ledger
Sep 12,A ransomware onslaught, a massive IRS data leak and cyberattacks on public transit and school systems…. Here are the latest threats and advisories for the week of September 9, 2022. Threat Advisories and Alerts Ransomware Group Vice Society Preys on School Systems The FBI, CISA and the MS-ISAC are now warning educational institutions of an uptick in ransomware attacks by the cybercriminal group Vice Society. Ransomware can wreak havoc on a school, causing canceled school days, delayed exams and theft of personal student information. With children returning to school in many parts of the world at this time after summer breaks, attacks are expected to increase. To mitigate them, educational institutions are advised to maintain offline data backups, review the
Sep 09,Depending on the organization, entry- and junior-level cybersecurity professionals are assigned an assorted mix of tasks, according to new (ISC)² research. Junior-level employees typically are trusted to handle most tasks, the research shows. The findings come from a survey of 1,250 cybersecurity hiring managers showing wide variation in the roles that less-experienced hires are expected to take on. The study shows some differentiation between the types of tasks assigned to entry-level as opposed to junior-level employees. It also reveals greater agreement among respondents about what tasks junior-level employees can handle. Differences within level of responsibility assignments varying by company size also surfaced. Though somewhat surprising, the variation is not necessarily a bad thing. It suggests different companies are making task-assignment
Sep 08,Congratulations to the more than 1,500 individuals who passed the (ISC)² Certified in Cybersecurity℠ during our pilot program. They are now on their path to full certification! If you’ve passed the Certified in Cybersecurity exam, our entry-level certification, you have proven to yourself, your peers and hiring managers that you have the strong problem-solving abilities, communication skills, strategic thinking skills and an eagerness to learn needed to be a successful cybersecurity professional, according to experts who participated in the (ISC)² Workforce Study. Once you pass the Certified in Cybersecurity exam and become a member of (ISC)², you have access to a variety of educational materials, discounts, events and much more to enhance your cybersecurity career. (ISC)² Membership Benefits Professional development
Sep 06,