• Earning a CISSP Concentration is an excellent way to advance your cybersecurity career and skill set. The CISSP-ISSAP, CISSP-ISSEP and CISSP-ISSMP all build on the CISSP, adding depth and mastery to the focus areas covered. If you’re looking to expand your portfolio, these elite credentials are worth exploring. CISSP Concentrations prove subject matter mastery beyond the CISSP, positioning those who hold them for jobs that command increased pay, greater responsibilities and more professional satisfaction. If you’re looking for reasons to pursue one now, here are five: Career advancement. Concentrations prove an elite level of expertise, raising visibility, credibility and opening new opportunities. Higher salaries. On average, (ISC)2 members report earning 35% more than non-members. The CISSP-ISSAP ranked #2 on Certification

    Apr 23,
  • By Scott Dickinson, CISSP, CCSP First a disclaimer. This is not designed to be a piece discussing the political beliefs or whether the right or wrong decisions were made at the appropriate time during the COVID-19 crisis. This COVID-19 event is happening to us, but what can we do about it? We can document our activities and use it as an actual exercise for BCP/COOP/DR. I will be using some examples from colleagues, as well as some of my personal experiences mixed in, so please don't assume I am speaking for any one organization. During this time of COVID-19 social distancing and working from home, many individuals, businesses and organizations are struggling with the sudden imposition of remote work and

    Apr 22,
  • By AJ Yawn, CISSP Earlier this month, AWS announced that Amazon Detective is now available to all customers, reinforcing their dedication to helping customers hold up their end of the shared responsibility model. This shared responsibility model enables your organization to alleviate the burden of responsibility for the security of the physical infrastructure of AWS or “Security of the cloud.” This frees up your organization to focus on the “security in the cloud” which boils down to protecting your applications and sensitive data your customers' entrust you with. AWS developed security best practices to consider when designing and evaluating your AWS architecture within the Security pillar of the well-architected framework. The security pillar outlines five focus areas that organizations must

    Apr 20,
  • We are excited to share that our Professional Development Institute (PDI) has been awarded a 2020 D2L Excellence Award. The honor comes on the heels of the first anniversary of PDI, a portfolio of timely and relevant continuing education courses that are free for (ISC)2 members and help keep cybersecurity professionals’ skills sharp and curiosity piqued. The D2L Excellence Awards recognize educators, trainers, and leaders in learning engagement that have leveraged the D2L learning platform to deliver learning experiences that are innovative, collaborative or have made an extraordinary impact on learning outcomes. These awards celebrate inspiration and innovation in digital education and learning. “Our members are constantly searching for ways to update and improve their skills as the cybersecurity landscape

    Apr 17,
  • More than twice as many small businesses are investing in Internet of Things (IoT) technologies than in cybersecurity, according to recent research. And while this may raise some red flags, it is possible that small businesses are spending less on cybersecurity for justifiable reasons. A poll conducted by Survey Monkey for business network CNBC says 44% of small businesses are planning to invest in IoT while only 20% plan to invest in cybersecurity. Naturally, this raises the very real concern that companies may purchase technology without properly securing it. Doing so, of course, would be a mistake. As a whole, small businesses are thought to be less prepared to fend off cyber threats than larger companies. This is the conventional

    Apr 16,