(ISC)² currently supports more than 150 chapter groups in 50 countries with 32,000 members and growing. Chapter membership is open to all aspiring and current cybersecurity professionals encouraging connections on a local level. In joining an (ISC)² Chapter, you will find opportunities for mentorship, leadership roles, volunteer days, study groups and more. This year, the (ISC)² New Jersey Chapter has seen rapid growth through various recruitment efforts and word of mouth has made a stand-out mark within their geographical area, by increasing their membership by 400% within a year. The chapter has coordinated many successful meetings, generating deeper relationships and insightful conversations. They are encouraging youth to join the field by providing students with a free membership, helping local schools
Blog
Latest News & Tips
Earlier this year, several (ISC)² members reached out to us regarding the candidate background qualifications that we ask all individuals as part of their endorsement process after passing an (ISC)² exam. The question on our eligibility review asked candidates: “Have you ever been involved, or publicly identified, with criminal hackers or hacking?” We heard you loud and clear. Being involved in “hacking” – especially in regard to learning how systems work, researching vulnerabilities or general curiosity and learning – doesn’t make you ineligible for (ISC)² certification. The use of the term “hacker” has changed significantly over the years, and we agreed it was time to make sure our policies were updated to more accurately reflect the way our team reviews
Adoption and usage of the cloud is evolving to combine with technologies like artificial intelligence, the Internet of Things, 5G and more, according to Sid Nag, Research Vice President at Gartner. “In other words,” he says, “cloud will serve as the glue between many other technologies that CIOs want to use more of, allowing them to leapfrog into the next century as they address more complex and emerging use cases.” With cloud roles expanding and so many certifications out there, which option offers cybersecurity experts the flexibility to grow with the coming waves of opportunity? Let’s compare two popular options, (ISC)² Certified Cloud Security Professional (CCSP) vs. Microsoft Certified: Azure Administrator Associate. CCSP is a vendor-neutral certification that demonstrates the broad
The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. This is so because of all the doors that certification opens to a CISSP professional. Those doors lead to many different types of positions and opportunities, thus making the information security community dynamic and multifaceted. In this installment, we talk to influential trailblazer Dr. Christine Izuakor. Christine shares with us her incredible story as the youngest student and first African-American woman to achieve a P.hD in Security Engineering, how she planned her journey to achieve her dream job and how her passion for cybersecurity had fueled her every step of the way. What job do you do today? I am the founder
Application programming interfaces (APIs) allow applications to communicate with each other, simplifying software development. Developers add functionality from other existing solutions or build applications using services by third-party providers. APIs have become the drivers for businesses digital transformation initiatives opening up their apps and data to partners, suppliers and customers. Besides their increased applicability and benefits, APIs are often the source of security concerns and threats because businesses fail to secure them. Surveys have identified that authentication, vulnerabilities and visibility are the key pain points, enabling malicious actors to exploit insecure APIs and turn them into attack vectors. Despite the increased threats coming from unprotected APIs, organizations fail to approach their security in a comprehensive and robust manner, lacking security
The Center for Cyber Safety and Education Julie Peeler Franz "Do It for The Children" Volunteer Award recognizes an individual who has significantly contributed to the betterment of internet safety. This year's distinction is awarded to Roela Santos of BAE Systems, Inc. for her long-time support of Center programs and leadership in developing the Raytheon, Engility, and SAIC cybersecurity scholarships, which have awarded $424,000 to 56 students over the past six years. Santos is the Vice President of Communications at BAE Systems, a global leader in defense technology and systems integration for the U.S. government and one of the world’s largest aerospace and defense companies. She is responsible for the Intelligence and Security sector’s strategy and execution of marketing communications, advertising, employee