• Chief Information Security Officer (CISO) Luis Gonsalves, Head of Security for Portugal’s central bank, and founder of the Cloud Security Alliance’s Portugal Chapter, says Certified Cloud Security Professional (CCSP) stands out from other technical certifications. With CCSP, cybersecurity experts gain a strategic understanding of cloud governance, risk and data privacy. In turn, they’re able to clearly communicate the advantages and risks of the cloud model to the C-suite. “That’s the real differentiator,” he says. Read the Full Article.

    Aug 11,
  • The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. This is so because of all the doors that certification opens to a CISSP professional. Those doors lead to many different types of positions and opportunities, thus making the information security community dynamic and multifaceted. In this installment, we talk to Adesoji Ogunjobi, who is passionate about cybersecurity in Africa. He is Chief Information Technology (security) Architect and Trainer with Kavod Doyen Consulting in Lagos and talks about how this industry has changed over his 14-year professional background and his ambitions for the future.   What job do you do today? I work as an Information Technology Security Consultant and Trainer. What

    Aug 10,
  • The importance of apps to businesses Software applications (apps) are at the heart of modern business success and have transformed the way companies handle their operations. A well designed and developed app with user-friendly methodologies and a security and privacy mindset can be very beneficial to a company’s operating, marketing, and sales strategies. Apps benefit businesses in numerous ways, providing credibility, higher productivity, and building trusted relationships with their customers. However, developing an app does not always go as planned. Failures do happen. And when they happen, they create major disruptions and financial losses. Have we learned from past failures? The good thing about failures is that they can be a great source for lessons learned. In application development, learning

    Aug 09,
  • The vast majority of cybersecurity chiefs (93%) do not report to the CEO, according to a recently published report. As a result, a lack of communication between the C-suite and cybersecurity leaders keeps top executives largely in the dark about their organizations' cybersecurity risks and overall security posture. The report, published by LogRhythm and based on research by the Ponemon Institute, polled 1,426 security and technology leaders. “On average, respondents are three levels away from the CEO, which makes it very difficult to ensure that leadership has an accurate and complete understanding of security risks facing the organization,” the report says. Company executives aren’t as focused on security as they should be, instead letting security leaders shoulder most of the

    Aug 06,
  • The (ISC)² Global Achievement Awards (GAA) recognize individuals who have significantly impacted the cybersecurity community. Recognizing these winners and learning about their contributions helps to inspire a safer and more secure cyber world. In addition to being recognized here on the (ISC)² blog, in a press release, and in our InfoSecurity Professional magazine, winners will also be celebrated at (ISC)² Security Congress 2021 and receive exclusive benefits while attending the conference. The early-bird registration discount is available for all attendees until August 13; register today to save $200! We are proud to announce the winners of the 2021 Global Achievement Awards! (ISC)² CEO Award: Megan West, CISSP, X-Force Cybersecurity Incident Responder, IBM X-Force (ISC)² Diversity Award (Americas): Julian Waits, GM

    Aug 04,