Malicious cyberattacks increased exponentially in 2021. A record number of almost 850,000 complaints related to cybersecurity were recorded by Americans last year resulting in close to U.S. $7 billion lost, according to the FBI’s Internet Crime Compliant Center (IC3). Among the types of cybercrimes reported to the FBI, ransomware is on the rise and becoming more sophisticated in recent years while remote work and schooling are more prevalent. For those unaware, ransomware is a malicious software (malware) that makes a computer unusable while a cyber criminal holds data hostage until they are paid. The Cybersecurity & Infrastructure Security Agency (CISA) reports that ransomware tactics and techniques have continued to evolve and become a larger threat. In response to several high-profile
- Apr 21,
Great team members like yours help our cybersecurity community share education, host stellar events, create a sense of community and continue to grow. The (ISC)² Global Achievement Awards honors these contributors annually. This year’s award winners will be highlighted during (ISC)² Security Congress being held in person in Las Vegas and online globally, October 10-12. The (ISC)² James R. Wade Service Award highlights the engagement of volunteers who merit special distinction for their sustained and valuable service to (ISC)². Those who volunteer to support the greater cybersecurity community to help promote a safe and secure cyber world are valued in our network. Do you know an active (ISC)² volunteer whose impact should be rewarded? Consider nominating them today. The
Apr 19,Volunteering is at the heart of the mission of (ISC)². The individuals who offer their time, skills and knowledge positively impact their community helping create a safer and more secure cyber world. We want to highlight some of our volunteers, the impact they make on the cybersecurity profession and the world at large during annual Volunteer Appreciation Week. We interviewed Lisa Vaughan, CISSP to discuss her cybersecurity career, the various volunteer roles she has held at (ISC)² and the impact volunteering has on her life. Lisa is the Executive Director, Information Technology for Hexagon U.S. Federal. In addition to holding the CISSP, she also has the PMP certification. Where did your career begin? What prompted your initial interest in cybersecurity?
Apr 18,April’s event calendar kicked off with (ISC)² SECURE London, a return to regional events for (ISC)² members and a conference that took place amid an unprecedented time for our industry and for practitioners. A global skills gap of over 2.7 million, years of disruption due to the pandemic and unprecedented digital transformation, geopolitical strife at the doorstep of Europe generating global cyberattack fallout and profound changes in the threats being faced and the technologies, tools and tactics that counter them. The day began with a keynote from Chris Ensor, Deputy Director for Cyber Skills and Growth at the NCSC. Ensor discussed the lifecycle of the cybersecurity industry in the UK, the emerging similarities with other much-relied-upon sectors such as the
Apr 14,By Samuel Rugi, an MSc Information technology (Security), Certified Information Security Professional (CISSP), Certified Information Security Management (CISM), Cybersecurity Mentor at the Cyversity Organization and a Co-Chair Leadership LaunchPad at Technology Association of Oregon. Key Items to Consider for an Impactful Security Awareness Agenda 1 - Identify and understand security drivers and what they mean to the business. Confidentiality Integrity Availability 2 - Interlink those critical drivers with the following security themes. People Technology Data and Privacy Processes 3 - Understand the business environment. Threats Customers Public Community (Local, Regional, Continental and Global) Governance Structures Political, Social, Religious and Economic Triggers Tools and Resources to Consider to be Successful and Keep Winning Governance Body: While it's easy to do
Apr 12,