Whether it’s Congress, a two-day Secure Summit, or a one-hour webinar, the experience is a product of the (ISC)² Community By Tisun Rustem, Senior Events Manager in EMEA, (ISC)² With so many industry events and online educational opportunities vying for your attention, particularly in information or cybersecurity, one can be forgiven for wondering whether an (ISC)² event could have something unique to offer. (ISC)² serves its membership with a range of on-line and conference-based educational opportunities, including one-hour webinars and half-day symposia, your annual regional Congress; and new to this year, the two-day Secure Summits - five of which are taking place in the EMEA region. Two, MENA and the UK, are still to come in November and December. They all provide
- Oct 03,
Fresh from Austin, here are the top headlines from (ISC)2's 2017 Security Congress: Let's talk about risk, baby. That's the language c-level executives and board members want to hear from the security team. Keynote speaker and Deputy Assistant Director of the FBI, Donald Freese, spoke about a non-emotional approach to security. CSO Online quotes Dylan Thomas, who was probably talking about cybersecurity practitioners when he said "Do not go gently into that good night." Garfield loves lasagna and hates cyberbullying. Infosecurity Magazine was with us in Austin and spoke to the CISO of the state of Missouri, Michael Roling, CIO of the Truth Initiativev, Derrick Butts, and CISO of the U.S. Dept. of Health & Human Services, Steven Hernandez. Ransomware – Tales from
Sep 29,Name: Mr. Toh Tai AnnTitle: Principal Trainer and ConsultantEmployer: Solution of Solutions LLPLocation: SingaporeDegree: Bachelor of Electrical Engineering (Hons) University of Western AustraliaYears in IT: 31 yearsYears in cybersecurity: 10 yearsCybersecurity certifications: Certified Information System Security Professional (CISSP)Certified Cloud Security Professional (CCSP)The Open Group Architecture Framework (TOGAF) How did you decide upon a career in cybersecurity? I have been an Information Technology professional for more than 25 years and in the Information Technology sector for 30+ years. In these 30+ years I have seen the transformation of IT from a mainframe/minicomputer centric data centre setup to a very disparate, distributed and complex environment. The centralised mainframe/minicomputer setup had many advantages from the security perspective. Physical security was extremely tight and
Sep 27,Name: Jasmin LandryTitle: IT Security AnalystEmployer: SecureOpsLocation: Montreal, Canada Years in IT: 4Years in information security: 3Cybersecurity certifications: SSCP, OSCP, CEH, eJPT, CCNA: Security, MCSA How did you decide upon a career in cybersecurity? It all started when I was a teenager. I enjoyed video games and I was curious about how they were created, so I decided to pursue education in programming. I quickly switched path though, after my first networking class. The teacher introduced us to Wireshark and I was just so amazed at what it could do, and what I was able to see with it. After taking more and more classes related to networking and security, my interest in information security continued to grow.
Sep 25,It’s 2:00 pm. Do you know where your data records are? Here are the security headlines from the week of September 18, 2017. Say it ain’t so, SEC. Say it ain’t so! It looks like the U.S. Securities and Exchange Commission (SEC) suffered a cyber attack in 2016. Hackers have been trading using non-public information. In more cybercrime news, Help Net Security has a list of most wanted malware and mobile malware. We’re all hoping the risk of wearable devices is worth the health benefit – or is that just what I tell myself about my FitBit? But what if the device data falls into the wrong hands? Any infosec pro will tell you: Only install applications from a trusted
Sep 22,