Managers who hire entry- and junior-level cybersecurity practitioners may do so to free up senior staff for more advanced work. But what they often find is that new hires contribute more than expected. Those new to cybersecurity bring fresh perspectives and excitement. They are open to different ideas, are generally eager to learn and want to succeed. Consider the following comments from respondents to an (ISC)² study on cybersecurity hiring practices: Entry- and junior-level staff “bring new ideas to the table. The fact that they have less experience means that they are also more flexible to new ideas. That is a very important factor to have in an ever-growing company and market,” survey participant. Said another: “They can bring new ideas
- Oct 05,
The month of October is widely acknowledged as Cybersecurity Awareness Month and an opportunity for the global community to join together in the mission of educating those outside of the profession with daily practices that can be implemented so that we may all live in a safer and more secure cyber world. This month reminds us that cybersecurity is for all and doesn’t have to be overly complicated. Together we can showcase the vast resources our community has to support all organizations and industries to keep their valuable information secure. Access Resources (ISC)² has curated a collection of informational resources to promote practical cybersecurity knowledge ranging from research reports to eBooks and videos, as well as training offerings. Check
Oct 04,Russian cybercrime, social media corruption and a tidal wave of malicious app downloads…. Here are the latest threats and advisories for the week of September 30, 2022. Threat Advisories and Alerts CISA Issues Warning to OT/ICS Owners and Operators Operational technology/industrial control system (OT/ICS) assets continue to be an attractive target for cybercriminals, and ICS networks are rife with risk. OT/ICS technology has vulnerable IT components and large attack surfaces—and traditional security measures don’t adequately address modern threats. System owners should assume that they will be targeted. To mitigate attacks, operators and owners can limit the exposure of system information, conduct regular security audits and secure remote access points. Source: https://www.cisa.gov/uscert/ncas/alerts/aa22-265a Zero-Day Vulnerability Exploited in Sophos Firewall A new critical
Sep 30,One month after launching three new initiatives, (ISC)² Candidates, (ISC)² Certified in Cybersecurity SM and (ISC)² One Million Certified in Cybersecurity, aimed at addressing the cybersecurity workforce gap, we are thrilled to share our initial successes. We have seen a rapid adoption within the past 30 days of these programs among cybersecurity candidates looking to enter the field. The quick embrace highlights the importance of developing new and unique pathways to make cybersecurity careers more accessible worldwide. Through these initiatives, we are laying a strong foundation to encourage more people to explore the opportunities of a cybersecurity career. In fact, in the past month, we have seen 55,000 individuals sign up to become an (ISC)² Candidate – a program for individuals looking to pursue or consider a
Sep 29,This continues our recognition of our Global Achievement Award recipeints. Click here to read more about our award honorees in part one. (ISC)² Government Professional Award Recognizing government information security leaders whose commitment to excellence has helped to improve government information security and to advance an in-demand workforce. The 2022 honorees: Americas: Jermone Andre Leach, CAP, CISSP, Defensive Cyber Operations Lead, United States Coast Guard For his efforts in ensuring industry standard awareness and threat remediation. This includes a focus on International Defensive Cyber’s Hunt Forward Operations. EMEA: H.E. Dr. Mohamed Hamad Al-Kuwaiti, Head of Cybersecurity, UAE Government For being instrumental in elevating the UAE’s position as a global leader in the cybersecurity field, improving the national cybersecurity capabilities and
Sep 29,