Blog
2022 (ISC)² Member Bloggers
The success of our membership-driven organization is closely linked to the effort that each certification holder puts into the organization. At (ISC)², we are fortunate to have a highly engaged membership that actively contributes to our success through volunteer opportunities .
Our volunteers take on myriad tasks, from helping to organize events to speaking at conferences to developing certification exams. Another important way that members volunteer their time is by contributing informative blogs on timely cybersecurity topics that expand our knowledge base and help peers gain new insights into the cybersecurity field.
(ISC)² members contribute blogs in two ways. One is through member-written blogs, in which authors cover a topic of their choosing with relevance to the membership. The second is through member-contributed blogs, in which members make themselves available for an interview or to provide feedback on key industry topics.
Each of these types of contributions is extremely valuable to us as an organization and to the membership as a whole. Members can use the blog format to share cybersecurity news, (ISC)² certification updates and contribute to the overall cybersecurity industry conversation. We are very grateful to all the volunteer blog authors and contributors who took the time over the past year to share their experiences and knowledge with industry peers.
Be a Contributor
Volunteering at (ISC)² through blog contributions is a way to give back to the community while expanding your network of cybersecurity professionals and developing leadership skills. Members who volunteer qualify for valuable Continuing Professional Education (CPE) credits.
At (ISC)², we benefit from a diverse membership with a broad range of perspectives, wealth of ideas and keen understanding of what is important to the job. We encourage any member wanting to engage with the blog, either as an author or contributor, to sign up through the volunteer form . Learn more about the process of writing and contributing in the (ISC)² Guidelines Bloggers .
Here is the list of member-written and member-contributed blogs for 2022:
Member-Written
- Effective Cybersecurity Board Reporting
- Hot Cybersecurity Technologies
- Cloud: A Shakespearean Drama?
- Winning Tactics for Security Awareness Innovations via Experience (pt. 1)
- Security Awareness Innovations (pt. 2)
- What Do You Mean My Email Isn’t Free?
- Tips from a CISO: How to Create a Security Program
- The Dilemma of Defense in Depth
- Igniting Adoption of a Secure Software Development Lifecycle – A Guide for Secure Software Champions
- Elevating the Risk Discussion – Quantitative Analytics
- Security Through Obscurity. It Doesn’t Work.
- Effective Security Using Zero Trust Architecture
- Four Steps to Using Metrics to Defend Your Security Budget
- How I Prepared for the CISSP Exam
- OT: The New Gold Mine for Hackers
- Avoiding Cloud Security Fails – Excerpts from (ISC)² Security Congress 2022
- Are Deepfakes Really a Security Threat? – Member Recap from (ISC)² Security Congress 2022
- Achieving Data Security and Analytics with AI – Member Recap from (ISC)² Security Congress 2022
- Working with the U.S. Government: an Overview of the U.S. Cybersecurity Maturity Model Certification
Member-Contributed
- Journey Into Cybersecurity – Conversations with Cyber Newcomers, Part 1
- Journey Into Cybersecurity – Conversations with Cyber Newcomers, Part 2
- #CybersecurityAwarenessMonth Mentorship Interview Series: Part 1 – Mentors
- #CybersecurityAwarenessMonth Mentorship Interview Series: Part 2 – Mentees
- #CybersecurityAwarenessMonth Mentorship Interview Series: Part 3 – Reverse Mentorship
- How can your organization find and develop the next generation of cybersecurity?
Thank you again to all of those who participated, and helped make this another successful year for (ISC)². We look forward to continuing our work together in the new year.