Cybersecurity professionals face plenty of challenges in their work – there’s always something new to learn, cyber attackers are relentless and security teams are usually short-staffed. Still, nearly two-thirds of cybersecurity professionals (66%) say they are satisfied with their jobs. But that number jumps to 72% among cybersecurity workers whose employers pay for their certifications, according to the 2019 (ISC)2 Cybersecurity Workforce Study. For professionals whose organizations pay for only part or none of their certification costs, the number drops to 63%. This is an important finding for employers who are trying to build their cybersecurity teams. Currently there is a shortage of 4 million cybersecurity professionals, according to our study, so organizations need to make investments not only in
Blog
Latest News & Tips
Hospitals are set up to fight infections, but not necessarily the kind that has been plaguing healthcare institutions lately – malware. A new report estimates that cyber threats against healthcare targets increased 60% since January, surpassing the total number of threats identified in all of 2018. The most common threat targeting the healthcare industry is Trojan malware, which increased 82% in the third quarter from Q2, according to the report by Malwarebytes, Cybercrime Tactics and Techniques: The 2019 State of Healthcare. Most of the Trojan attacks involved Emotet and TrickBot, which are the two most dangerous Trojans around since 2018. For now, healthcare is the seventh most targeted industry, according to Malwarebytes, but that may change as a result of
(ISC)² members and associates have an exclusive opportunity to win a Nintendo Switch while earning CPEs. This participation-based contest is running until the end of December – just in time for the holidays. Fifteen winners will be chosen. Steps to complete in order to be entered to win: Members and associates must fill out a registration form for December entries, even if there has been a previous entry. Complete any (ISC)² PDI free online courses by December 31, 2019. Score at least 70% on the final assessment. Submit an end-of-course evaluation for each course completed. Participants can earn additional entries for completing multiple courses. The PDI course portfolio is always expanding. Be the first to know when new FREE courses
by Dr. Chris Veltsos, CISSP (ISC)² Security Congress wrapped up four weeks ago. The event sported world-class keynotes and also had many great sessions. This article shares some reflections on Captain Sully’s keynote, and his message to all of us information security professionals. A Perfect Fit for Cybersecurity The opening keynote at the 2019 (ISC)² Security Congress could easily be mistaken for a figure larger than life. Captain Sully’s story is one of calm in the face of chaos, with the result being that everyone on board that fateful flight was able to get out alive. As some of the exchanges between the pilots and the control tower resonated through the speakers, the mood was tense, as if all of
Nearly half of midmarket executives (47%) in a newly released quarterly report cited cybersecurity as their top concern for the coming year. The Middle Market Indicator report, by Chubb and the National Center for the Middle Market (NCMM), shows that cybersecurity topped the list of concerns for the second quarter in row. The concern isn’t surprising. Any executive who pays attention to the cyber threat landscape is bound to feel trepidation about the potential for cyber attacks against their organization. A study published by The Conference Board earlier this year found that cybersecurity is the top business concern for U.S. CEOs. Other studies have revealed similar findings. One inescapable realization from all the research is that cyber fears affect companies
By Andrea Little Limbago, Chief Social Scientist, Virtru Limbago presented during the Governance, Risk and Compliance track at the 2019 (ISC)2 Security Congress in Orlando. The session, Global Factors Driving Data Privacy Regulation, explained data localization, how it is progressing and what that means for organizations. In two parts, Limbago recounts the information covered in her session. In the previous post, we discussed the growing influence of digital authoritarianism, which has now contributed to nine consecutive years of a decline in internet freedoms across the globe. We’ll now turn to two other competing global influences that are further shaping data protection – data localization and free flows of secure data. Absent a federal data protection regulation on global engagement, security