• (ISC)²’s ThinkTank webinar channel has just been named the 2018 Highest Growth Channel in IT by BrightTALK, an online webinar platform aimed at providing professionals with business and professional growth.  ThinkTank is a free cybersecurity webinar channel that features 60-minute roundtable discussions with influential security experts. These discussions cover a range of thought-provoking topics that are among the most pressing cybersecurity challenges. BrightTALK awarded 10 organizations for accomplishments in the IT category. Those winners included Palo Alto Networks, Symantec, and more with (ISC)² being the only certifying body to be recognized.  So far this year, ThinkTank webinars have been viewed more than 60,000 times in North America alone, with the top-rated session being The Future of Authentication in a Hyper Connected

    Jul 16,
  • The sweeping new privacy law that went into effect in the European Union in May has significantly boosted demand for data protection expertise, according to job postings site Indeed. A report from the popular recruitment site found that job openings for data protection officers (DPO) have skyrocketed 829 percent since 2016 as organizations took steps to comply with the General Data Protection Regulation (GDPR). The need for the expertise is about to get even greater, thanks to a newly approved data privacy law in California, the world’s fifth largest economy. The new law was rushed through the state’s legislation to preempt a more stringent privacy regulation that was headed for the ballot in November. It takes effect in January 2020.

    Jul 12,
  • By Ravindra Krishna, CISSP In a recent Operational Technology (OT) cyberattack, Monero Crypto-currency mining malware was discovered in the ICS network of a water utility company located in Europe. The company found the malware during a routine monitoring check of their OT network and confirmed that the malware infected five servers including the Human machine interface (HMI), which is used to control and manage physical components of OT networks. This attack provides further evidence that OT networks are not simply vulnerable, but actually easy targets. The Post-Stuxnet OT Cyberattack Era I believe that we can divide OT attacks into two eras: before Stuxnet and post-Stuxnet. The infamous worm was a fully loaded weapon completely made of code. The first source

    Jul 03,
  • Data breaches are happening far too often. Stories about personal information being compromised are part of the daily news cycle. But even after the fact, many people are still not taking internet safety seriously. Let’s not forget that human error causes 90 percent of security incidents. Training employees about cybersecurity is essential but educating younger generations from the moment they gain access to the internet, should be a priority. This year, at (ISC)² Security Congress in New Orleans, cyber, information, software and infrastructure security professionals will learn about cyber safety education thanks to the Center for Cyber Safety and Education, the charitable arm of (ISC)². The Center relies on (ISC)² members to develop cyber safety programs for seniors, parents and

    Jun 12,
  • As organizations struggle to fill cybersecurity vacancies, they aren’t finding many candidates among millennial jobseekers. A new study shows millennials are only marginally interested in cybersecurity careers, with 9 percent showing any interest at all. The finding is troubling, considering millennials have become the largest percentage of the overall workforce. This generation, which has grown up with iPhones and YouTube is often viewed as an untapped source of talent for cybersecurity careers, but it’s clear they are not getting the message that they are needed. The study of 524 technology-savvy millennials, conducted by Enterprise Strategy Group and sponsored by ProtectWise, found that respondents are more interested in other technology areas. Video game development, cited by 33 percent of respondents, tops

    Jun 07,