Name: Rachel Phillips, PMP, Assoc. (ISC)² (ISC)² Exam(s) Passed: CISSPTitle: Cybersecurity AnalystLocation: Seattle, WA, U.S.A.Education: M.S. Information Technology (Security and Assurance) and B.S. Business Administration (New Media and Internet), Kaplan UniversityYears in IT: 10Years in Cybersecurity: 3Cybersecurity Certifications: Associate of (ISC)² Rachel Phillips, PMP, Assoc. (ISC)² is an influencer and sought-after contributor for her views and leadership in technology and security. She holds a Master’s in IT with emphasis in Information Security and Assurance, and a Bachelor’s in Business Administration from Kaplan University. As a cybersecurity analyst, she provides oversight and assurance of meeting industry standards and best practices to secure the IT environment. How did you decide upon a career in cybersecurity? A mentor wisely advised me to consider
Blog
Latest News & Tips
In this ever-changing field, you’re constantly required to learn about new tools, vulnerabilities and threats. We know that time and financial resources may get in the way of participating in CPE offerings that help you sharpen your skills and hone your craft. We are committed to enabling our members to become the most well-rounded and effective cybersecurity practitioners around so we’ve compiled a list of CISSP CPE opportunities that will work for your busy schedule. Online CPE Opportunities: Read InfoSecurity Professional Magazine (and take the quiz) Watch a CPE webinar (including any of our cybersecurity webinar series: ThinkTank, e-Symposium, From the Trenches, & Security Briefings) Participate in our Bug Bounty program Write a cybersecurity white paper, book or magazine article
Last year’s Security Congress in Austin was our largest one yet with nearly 2,000 cybersecurity professionals in attendance. You know what they say, everything is bigger in Texas! Our first independent Congress featured 139 educational sessions, as well as vendors presenting in the Solutions Theater, (ISC)² member focus groups, Cloud Security Alliance (CSA) Summit and the Information Security Leadership Awards (ISLA) Americas ceremony and celebration. If you attended last year, you saw the excitement and enthusiasm from staff, speakers and attendees. If you were unable to attend, you’re in luck – you can watch some of the top sessions from 2017’s Security Congress online! Below is a list of the sessions currently available – and we’ll keep adding them as
Name: Wai Sheng ChengTitle: Security AnalystEmployer: Cboe Global MarketsLocation: Kansas, U.S.A.Degree: Master of Science, Information Systems Engineering, Johns Hopkins UniversityYears in IT: 6Years in information security: 3Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I decided on a career in cybersecurity when my email account was first compromised in 2011. I learned about this when my friends and family called to ask if I had sent out emails asking for money. As an engineer-in-training, I was curious to know why and how this had happened. It was through this experience that I first became interested in information security. Why did you get your SSCP®? My former boss at the Kansas City Chiefs said to me one
As cyber threats proliferate, organizations looking to fill cybersecurity vacancies need to take concrete steps to reboot recruiting and hiring efforts. Qualified candidates for cybersecurity jobs are scarce and getting scarcer, creating a challenge for companies to properly defend themselves against threats. By 2022, an estimated 1.8 million cybersecurity jobs will go unfilled, according to research by (ISC)2. It’s a classic supply-and-demand challenge, with too many vacancies for too few candidates. Currently it takes 55% of organizations at least three to six months to fill a cybersecurity vacancy, and 32% spend even more time to find qualified candidates, ISACA has found. In the United States, 27% of companies say they cannot fill cybersecurity vacancies. To reverse this trend, employers should
Bruce Beam, CISSP recently join the (ISC)² family as our director of infrastructure and security. Bruce has more than 20 years of experience leading IT/ICT and security teams for large enterprises and the U.S. Navy. He is leading all aspects of (ISC)²’s global IT/ICT and cybersecurity operations. He is not only managing the (ISC)² “DETE” (digital-end-to-end) initiative, but also oversees our Global Data Protection Regulation preparations. Bruce has words of advice for surviving – and thriving – through GDPR: The GDPR sweat is now in full swing with the May 25 deadline looming. I have seen a lot of gloom and doom about the penalties many companies may be paying in June. While there is a lot to accomplish and