• I *The blog.isc2.org platform is having technical difficulties. If you are having trouble reading this blog in its entirety please view here: https://community.isc2.org/t5/Blog/Proposed-Bylaws-Amendments-What-They-Mean/ba-p/54775 (ISC)² has added additional insights to the Bylaws amendment documentation to address specific questions raised by our members. You can review the entire Bylaws packet here, and we are sharing the added rationale for changes below. All members are encouraged to review the Bylaws documentation prior to voting. The Board of Directors recommends a VOTE FOR THE AMENDMENTS.   (ISC)² Board of Directors Chairperson Zach Tudor, CISSP, shared additional insights into the proposed Bylaws changes you can read here. From page 5 of the published Bylaws amendment documentation at https://www.isc2.org/-/media/956A62F1A1084D45A6D3AF4AC9E25EFA.ashx   What significant changes were made to the Amended and Restated

    Oct 25,
  • This Cybersecurity Awareness Month we are reviewing the three sides of mentorship by speaking with members who are experienced mentors, mentees and those who have taken part in reverse mentorship. Review our part one blog and hear from experienced mentors. In this, our second part of our three-part interview series we will hear from Jean Tam, CISSP, Cybersecurity Manager/Lead, Subject Matter Expert at Lockheed Martin on what the mentee experience is like. What drove you to seek mentorship? I was just out of college and wanted to figure out what I wanted to be when I grew up.   What did you learn through mentorship that has held value in your career? I have a few mentors. A couple are long

    Oct 25,
  • As cyberthreats continue to make daily headlines, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 2.7 million professionals to meet global demand. Near limitless job opportunities are wide open to problem-solvers with an analytical mindset. How can you start your career in cybersecurity? Working cybersecurity professionals agree, certification is the most important way for career pursuers to enter the field. But with so many cybersecurity certifications out there, how do you choose the one that will help you break into the field and help lead you to long-term career success? Let’s compare two entry-level options: (ISC)² Certified in CybersecuritySM and ISACA Cybersecurity Fundamentals.   What

    Oct 24,
  • A reminder to all (ISC)² certified members in good standing as of October 2, voting is now open for the amendments to the (ISC)² Bylaws. Any individual who has earned an (ISC)² certification and is an active member in good standing as of October 2, 2022, is eligible to vote. This includes new Certified in Cybersecurity (CC) holders. Visit your member dashboard to find your voting access. On October 19, members of the (ISC)² Board of Directors – Dan Houser, CISSP-ISSAP, ISSMP, CCSP, CSSLP, Yiannis Pavlosoglou, CISSP and Lisa Young, CISSP – participated in a live webinar, along with (ISC)² General Counsel, Graham Jackson – to answer members questions about what the bylaw changes mean. You can watch that webinar

    Oct 22,
  • Ransomware derails big businesses as the Australian cyberattack spree and student loan forgiveness scam highlight a disturbing week in the cybersecurity world. Here are the latest threats and advisories for the week of October 21, 2022. Threat Advisories and Alerts FBI Warns That Fraudsters May Target Beneficiaries of Student Loan Forgiveness Individuals seeking US federal student loan forgiveness should be cautious of potential scams related to the Student Loan Debt Relief Plan introduced in August of this year. Scammers are using a variety of digital tools – including websites, email, mobile phones and more – to trick victims into giving them financial information, payment or personal information. Beneficiaries of the Student Loan Debt Relief Plan can protect themselves by exercising

    Oct 21,