I *The blog.isc2.org platform is having technical difficulties. If you are having trouble reading this blog in its entirety please view here: https://community.isc2.org/t5/Blog/Proposed-Bylaws-Amendments-What-They-Mean/ba-p/54775 (ISC)² has added additional insights to the Bylaws amendment documentation to address specific questions raised by our members. You can review the entire Bylaws packet here, and we are sharing the added rationale for changes below. All members are encouraged to review the Bylaws documentation prior to voting. The Board of Directors recommends a VOTE FOR THE AMENDMENTS. (ISC)² Board of Directors Chairperson Zach Tudor, CISSP, shared additional insights into the proposed Bylaws changes you can read here. From page 5 of the published Bylaws amendment documentation at https://www.isc2.org/-/media/956A62F1A1084D45A6D3AF4AC9E25EFA.ashx What significant changes were made to the Amended and Restated
Blog
Latest News & Tips
This Cybersecurity Awareness Month we are reviewing the three sides of mentorship by speaking with members who are experienced mentors, mentees and those who have taken part in reverse mentorship. Review our part one blog and hear from experienced mentors. In this, our second part of our three-part interview series we will hear from Jean Tam, CISSP, Cybersecurity Manager/Lead, Subject Matter Expert at Lockheed Martin on what the mentee experience is like. What drove you to seek mentorship? I was just out of college and wanted to figure out what I wanted to be when I grew up. What did you learn through mentorship that has held value in your career? I have a few mentors. A couple are long
As cyberthreats continue to make daily headlines, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 2.7 million professionals to meet global demand. Near limitless job opportunities are wide open to problem-solvers with an analytical mindset. How can you start your career in cybersecurity? Working cybersecurity professionals agree, certification is the most important way for career pursuers to enter the field. But with so many cybersecurity certifications out there, how do you choose the one that will help you break into the field and help lead you to long-term career success? Let’s compare two entry-level options: (ISC)² Certified in CybersecuritySM and ISACA Cybersecurity Fundamentals. What
A reminder to all (ISC)² certified members in good standing as of October 2, voting is now open for the amendments to the (ISC)² Bylaws. Any individual who has earned an (ISC)² certification and is an active member in good standing as of October 2, 2022, is eligible to vote. This includes new Certified in Cybersecurity (CC) holders. Visit your member dashboard to find your voting access. On October 19, members of the (ISC)² Board of Directors – Dan Houser, CISSP-ISSAP, ISSMP, CCSP, CSSLP, Yiannis Pavlosoglou, CISSP and Lisa Young, CISSP – participated in a live webinar, along with (ISC)² General Counsel, Graham Jackson – to answer members questions about what the bylaw changes mean. You can watch that webinar
Ransomware derails big businesses as the Australian cyberattack spree and student loan forgiveness scam highlight a disturbing week in the cybersecurity world. Here are the latest threats and advisories for the week of October 21, 2022. Threat Advisories and Alerts FBI Warns That Fraudsters May Target Beneficiaries of Student Loan Forgiveness Individuals seeking US federal student loan forgiveness should be cautious of potential scams related to the Student Loan Debt Relief Plan introduced in August of this year. Scammers are using a variety of digital tools – including websites, email, mobile phones and more – to trick victims into giving them financial information, payment or personal information. Beneficiaries of the Student Loan Debt Relief Plan can protect themselves by exercising
This Cybersecurity Awareness Month we are looking at three sides of mentorship from the mentor’s perspective, the mentee’s insights and reverse mentorship. Follow along with us though this three-part interview series highlighting member perspectives from varying industries. In this first blog, we will hear from three experienced mentors sharing their insights and takeaways from years of experience helping to guide the next generation. Chaddrick “Chad” Nevills, CISSP, Service Engineer at Microsoft What motivates you to succeed as a mentor? Seeing someone else succeed using the knowledge from my experiences to their advantage. It is fruitful to see someone from my very own minority community contribute to the cybersecurity community. We make up a very small portion of the workforce and