By John McCumber, Director of Cybersecurity Advocacy, (ISC)² North America Region I am thoroughly stoked to announce The Lexicon Project has finally come to fruition. The first thousand copies are being printed as I type this. It has taken several months, and the support of our full team here at (ISC)², but it has happened. I also want to acknowledge the critical advice from our North American Advisory Council (NAAC) for their input to the lexicon. But, why would we take this on as one of the first projects for the new Cybersecurity Advocate’s role? The third week of my tenure as your humble Advocate was spent walking the halls of Capitol Hill and meeting with legislators, committee members, and the
- Feb 26,
By Tamer Gamali, CISSP, CISO and member, (ISC)² EMEA Advisory Council As a Chief Information Security Officer (CISO) based in Dubai with 15 years working in financial services, and a member of (ISC)²’s EMEA Advisory Council I am keen to help companies develop a deeper understanding of how operational risks are evolving with cyberthreats. I have become aware of a growing body of opinion within cybersecurity circles that suggests the senior management tier represents a significant threat to their businesses today. They are a group that understands and works hard to mitigate risk, but, as more and more companies move forward with digital transformation strategies, not necessarily the risks that hold the greatest potential to harm their companies. This leaves
Feb 22,Name: Rachel Phillips, PMP, Assoc. (ISC)² (ISC)² Exam(s) Passed: CISSPTitle: Cybersecurity AnalystLocation: Seattle, WA, U.S.A.Education: M.S. Information Technology (Security and Assurance) and B.S. Business Administration (New Media and Internet), Kaplan UniversityYears in IT: 10Years in Cybersecurity: 3Cybersecurity Certifications: Associate of (ISC)² Rachel Phillips, PMP, Assoc. (ISC)² is an influencer and sought-after contributor for her views and leadership in technology and security. She holds a Master’s in IT with emphasis in Information Security and Assurance, and a Bachelor’s in Business Administration from Kaplan University. As a cybersecurity analyst, she provides oversight and assurance of meeting industry standards and best practices to secure the IT environment. How did you decide upon a career in cybersecurity? A mentor wisely advised me to consider
Feb 21,In this ever-changing field, you’re constantly required to learn about new tools, vulnerabilities and threats. We know that time and financial resources may get in the way of participating in CPE offerings that help you sharpen your skills and hone your craft. We are committed to enabling our members to become the most well-rounded and effective cybersecurity practitioners around so we’ve compiled a list of CISSP CPE opportunities that will work for your busy schedule. Online CPE Opportunities: Read InfoSecurity Professional Magazine (and take the quiz) Watch a CPE webinar (including any of our cybersecurity webinar series: ThinkTank, e-Symposium, From the Trenches, & Security Briefings) Participate in our Bug Bounty program Write a cybersecurity white paper, book or magazine article
Feb 19,Last year’s Security Congress in Austin was our largest one yet with nearly 2,000 cybersecurity professionals in attendance. You know what they say, everything is bigger in Texas! Our first independent Congress featured 139 educational sessions, as well as vendors presenting in the Solutions Theater, (ISC)² member focus groups, Cloud Security Alliance (CSA) Summit and the Information Security Leadership Awards (ISLA) Americas ceremony and celebration. If you attended last year, you saw the excitement and enthusiasm from staff, speakers and attendees. If you were unable to attend, you’re in luck – you can watch some of the top sessions from 2017’s Security Congress online! Below is a list of the sessions currently available – and we’ll keep adding them as
Feb 15,