The nonprofit Center for Cyber Safety and Education (Center) is providing 1,300 local elementary students with a Garfield-led online safety education program, thanks to a donation from area cybersecurity professionals. With the gift from the (ISC)² Hawaii Chapter, media specialists serving the seven elementary schools at the Leilehua Complex will conduct the award-winning Garfield’s Cyber Safety Adventures lesson with students before they go on spring break. The online instructor-led lesson allows students to learn digital citizenship through interactive storybooks, online class discussions, and engaging Garfield cartoons via their home computer. “It’s rewarding to collaborate with professional organizations that want to give back to the community with the Adopt a School initiative,” says Patrick Craven, director of the Center. “Garfield provides
- Feb 18,
In the early days of cloud computing, many executives became enamored with the idea that they would no longer be responsible for the “headaches” of an on-premises data center. Things like cooling, physical security, hardware upgrades and uninterruptable power supplies all would shift to the cloud providers. But the shifting of certain responsibilities does not also mean the transfer of accountability… So who is responsible for what in the cloud and how can shared accountability be navigated? The shared responsibility model is a nice theory, but here’s how its practical application gets tricky. Read the blog.
Feb 17,By Mike Privette, CISSP A question I often get asked is, "How do I advance my career in the cybersecurity field?" tl;dr: Figure out for yourself what "advancement" means (i.e., more money, better title, more challenging problems to solve, etc.) Market yourself and ask others for help to achieve what you want Build a brand an audience around #1 and #2 About Me I've spent more than 15 years operating in, building, and leading cybersecurity programs at several Fortune 500 companies in the Financial Services industry. I'm also the Founder & Managing Principal of Fraction Consulting, where I get to do fractional CTO and CISO work and advise private capital firms. As a result of my background, I often get
Feb 16,By Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, CSSLP, SSCP John Martin, CISSP-ISSAP, CISM Richard Nealon, CISSP-ISSMP, SSCP, SCF In part one of this blog series, we discussed privacy, remote access (aka Work from Home), insider threats, data leakage, Zero Trust Architecture (ZTA) and security architecture. To continue this discussion, we believe that 2021 will still see folks working from home; thus, the risks due to insider threats and data leakage will continue to grow. However, we believe that there are other concerns for information security professionals, including edge computing, 5G, IoMT/IoT, AI and ransomware. Edge Computing Edge Computing is a distributed computing framework that brings enterprise applications closer to data sources such as IoT devices or local edge servers. This proximity
Feb 12,By Yuri Braz, CISSP, CRISC, PMP Information Security, or cybersecurity, has become more relevant every day. One of the main reasons is because information has become the main asset of most companies. Thus, this information needs to be safeguarded or companies would not be able to create value for society and its shareholders. Large institutes, such as (ISC)², help to develop and democratize the information security field, so that today the majority of medium and large companies have an information security policy. An infosec policy is the first step towards risk governance, essential for the practice of due care and due diligence, which aim to make a reasonable effort to ensure that all efforts and investments made by the company
Feb 11,