The (ISC)² New Jersey Chapter held their first virtual international event, which hosted more than 20 thought leaders and 500 registered chapter member attendees. The International (ISC)² Chapter Conference, SECON International, took place virtually, on December 1, 2022, and delivered intriguing content on various cybersecurity topics. The conference featured Ted-talk style presentations across three tracks during a three-hour event. The New Jersey Chapter hopes that by sharing their successes, it can help other chapters to either replicate their event or encourage them to join this conference in the future. This event was a collaboration between several (ISC)² chapters on a global scale which produced tangible business value added benefits for attendees. The New Jersey Chapter’s leadership considered their event’s biggest
- Jan 04,
With more than 150,000 CISSPs around the world, some of you have asked – what's the next step? For many of you, that next step is one of the CISSP concentrations focused on security architecture, engineering or management. The CISSP-ISSAP exam was last updated in October 2020, which means we are beginning the process of a refresh again. (ISC)² is holding a Job Task Analysis (JTA) Study Workshop (tentatively scheduled for February 6-8), we are asking those who hold this (or any) CISSP concentration to review the current CISSP-ISSAP Exam Outline and let us know the following: Do you believe that the current CISSP-ISSAP exam outline adequately covers the existing and emerging cybersecurity techniques and threats CISSP-ISSAP practitioners are facing
Jan 03,By Aaron Weathersby, CISSP. Aaron is the Chief Information Officer for Charles R. Drew University of Medicine and Science and holds a Doctor of Science in Cyber Security from Marymount University. He is an Information Technology professional with over 18 years of experience focused on cybersecurity issues. Executive Summary: This policy brief was created to summarize the Biden Administration’s Executive Order on Improving Cyber Security through the lens of Cyber Threat Intelligence. This brief is geared towards those public and private entities required to implement the mandated elements within the EO. The brief details critical findings, recommendations, and challenges with implementing the orders. POLICY SUMMARY While Executive Order 14028 contains 8 top level directives, recurring CTI themes of visibility, detection
Dec 27,Ransomware hits hard around the world – again, Cybercriminals steal food and Fortnite’s developer is fined millions. Here are the latest threats and advisories for the week of December 23, 2022. Threat Advisories and Alerts Criminal Actors Use BEC Attacks to Steal Large Food Shipments Three U.S. government agencies – The Federal Bureau of Investigation (FBI), the Food and Drug Administration Office of Criminal Investigations (FDA OCI) and the U.S. Department of Agriculture (USDA) – have issued a joint warning to food suppliers that their industry is seeing an uptick in business email compromise (BEC) attacks. Criminal actors are impersonating legitimate companies to order shipments of food valued at hundreds of thousands of dollars. The catch? The threat actors never
Dec 23,From fighting the ever-present ransomware threat to securing cloud infrastructures to honing identity management practices, the past year’s showcase of (ISC)² webinar topics was wide-ranging and thought-provoking. A cursory look at the topics we tackled throughout 2022 provides a reflection of the activity in the cyber landscape and the threats that weighed most heavily on cybersecurity professionals. We asked attendees to rate the webinars they attended, and here’s what we found: North America Email threats were prominent on the minds of cybersecurity professionals over the past year, as evidenced by highest-ranked webinar, Incredible Email Hacks You'd Never Expect. The session served as a reminder that email remains a primary attack vector, involving more than phishing attempts and malware downloads. Other methods,
Dec 22,