Blog

Latest News & Tips

  • Name: Paul Bryant Title: CIOEmployer: phew! Cyber SecurityLocation: Auckland, New ZealandEducation: MCom (Hons), LLB (Hons)Years in IT: 20Years in cybersecurity: 15Cybersecurity certifications: CISSP   How did you decide upon a career in cybersecurity? In my roles designing and managing financial services technology infrastructures and leading technology teams I had a good deal of both technical and non-technical exposure to information security considerations and solutions. It is a complex and ever-changing area that bridges business and technology, and requires both technical and commercial engagement. It is also an area that is under-served in industry.   Why did you decide to pursue your CISSP? I wanted to consolidate my experience to date. The CISSP is still one of the broadest and most well-recognised programmes for

  • Finalists have been announced for the 2018 Information Security Leadership Awards (ISLA®) Government. The ISLA Government program recognizes the ongoing commitment and achievements of individuals and teams whose initiatives, processes or projects have led to significant improvements in the security posture of a U.S. department, agency or government (state, local or federal). "Some projects are not well-known to either the public or the information security professional community. Recognizing a practitioner through the ISLA awards provides awareness of some of the important projects happening throughout the government." - Kris Thomas, CISSP, 2018 Nominator The awards ceremony will take place at the (ISC)² Secure Summit DC event on Tuesday, May 8th at 12 p.m. as a luncheon. Finalists and winners will be

  • Greetings, As an active (ISC)2 NCR chapter member you are eligible for a 15% discount to the ISC2 Secure Summit DC event being held on May 7th and 8th. Just enter the coupon code ”Chapter18” when checking out.Here’s a link to the event:http://www.cvent.com/events/securesummitdc/event-summary-a73abe5f2a50473fa0f143415094cbb9.aspxIf you attend, please be sure to visit our Chapter’s vendor booth.We hope to see you there!

  • Name: Thien Phan (ISC)² Exams Passed: CISSP and CCSPTitle: Cybersecurity, Privacy and IT Risk AssociateEmployer: PricewaterhouseCoopers (PwC)Location: New York City, NY, U.S.A.Education: MBA degree and Bachelor’s Degree in Management Information Systems (MIS) from Binghamton UniversityYears in IT: 1 yearYears in cybersecurity: 1 yearCybersecurity certifications: Security+, CCNA Cyber Ops   How did you decide upon a career in cybersecurity? It was back in my third year of college when I interned for a multimedia company as a database administrator. I did not know much about how different technologies worked together. I was introduced to the concept of networking and how a database system can provide output to the front-end web server. I learned about the SQL injection and became fascinated with the

  • (ISC)²’s theme for 2018 is Enrich. Enable. Excel. In an effort to enable our members to be the best in their field, we have partnered with A Cloud Guru to offer a one-month free membership to A Cloud Guru. This benefit allows members exclusive access to cloud security education from A Cloud Guru, which delivers an array of cloud security courses to enable cybersecurity professionals to better defend their data in the cloud. Cloud security was identified as the number one skill security professionals needed to acquire or strengthen to advance their career, according our 2017 Global Information Security Workforce Study. A Cloud Guru offers cloud-based training courses for all experience levels, and allows you to sort the courses by

  • By Kwinton Scarbrough, CISSP In the midst of the business and technology merge, organizations of all industries have started their journey into the cognitive era of cybersecurity. In this era, it is essential for a business to have an IT security strategy to govern how the organization will protect itself from internal and external cyber threats. However, what commonly fails to align to IT security strategy is the organization’s overall security culture. IT security strategy can only be effective if there is a strong security culture embedded into the very fabric of the company’s operations. Today, I will cover the two core components for building a robust security culture, to maximize the effectiveness of the IT security strategy. An organization’s