Are you looking for a space to connect with your peers in the cybersecurity industry? (ISC)² Community connects you to a global network of cybersecurity professionals through an interactive and engaging platform. Community offers members and non-members an opportunity to share insights on the latest cybersecurity trends, ask questions, share knowledge, or voice opinions. Community welcomes all levels of experience to weighing in on the current topics and trending conversations through public discussion or private chats. Users can subscribe to popular threads based on interests such as cloud security, privacy, tech talk, career, and more. Community Groups encourage engagement through all stages of your career. For those just beginning, study groups for each certification allow candidates to discuss and meet for exam tips and practice items. Upon
- Jun 08,
Tricky Business Software development is a tricky business. When you think of all that can go wrong, the possibilities can be overwhelming. From coding errors, to borrowed libraries, to myriad other causes, the need for testing is fundamental to the development process. Testing can uncover many of the errors or oversights that can occur. Failure to effectively test prior to release can be very costly. Fortunately, the software security lifecycle includes testing methodologies to prevent many of these errors. As a security professional, understanding testing techniques is an extremely important job responsibility. If you are on the technical side of information security, you may be conducting the tests yourself. One way that an employer can ensure that they have a
Jun 07,Faced with significant obstacles to build their cybersecurity teams, organizations increasingly are looking within to find transferrable talent for cybersecurity roles. It’s a practice strongly endorsed by (ISC)² in the recently published Cybersecurity Career Hiring Study and the Cybersecurity Workforce Study. The problem is that a substantial number of organizations aren’t up to the task of developing in-house talent for cybersecurity. Nearly half (45%) of companies in a recent study say they are not capable of doing it. And the problem doesn’t end there. The study, conducted by IT recruiting firm Hays US, also found that only 39% of respondents believe their organizations “have the ability to retain cyber staff.” So the problem is twofold: Building a strategy and infrastructure
Jun 04,The annual (ISC)² Cybersecurity Workforce Survey is now open. Your participation is vital for this influential benchmarking study used by organizations, governments and the media worldwide to advance conversations centered on closing the cybersecurity workforce gap. What differences did this past year make for your experiences in cybersecurity? Cybersecurity professionals overwhelmingly reported last year that team communications remained steady (60%) — or improved (25%) — as a result of remote work. Were your experiences working remotely this year as positive? Last year, most survey respondents reported stable (54%) — or even fewer (12%) — security incidents after moving their cybersecurity teams remote. Did that trend hold up for you this year? More than half of respondents last year (56%) said that cybersecurity staff
Jun 03,The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. This is so because of all the doors that certification opens to a CISSP professional. Those doors lead to many different types of positions and opportunities, thus making the information security community dynamic and multifaceted. In this installment, we talk to Laurie Mack. Laurie lives in Canada and is Director for Security and Certifications at Thales. In this interview, Laurie shares with us how she started her career in the Canadian Armed Forces as a radio communicator and how her proudest professional moment was when her and her team were given a public service award for their work. What job do you
Jun 02,