Every year, (ISC)² and The Centre for Cyber Safety and Education award a range of scholarships to individuals pursuing, or planning to pursue a degree in cybersecurity or information security. Addressing the cybersecurity skills gap The aim of these initiatives are to help bridge the cybersecurity workforce skills gap - which our research predicts to reach a 1.8 million shortfall in the next four years - and improve diversity within the profession; by providing future information security professionals with Undergraduate, Graduate or Women’s scholarships to assist them in preparing for their rewarding career in this vital sector. How the scholarship program has evolved The program started in 2005, awarding four graduates $12,500 each towards an advanced degree in the sector.
- Mar 01,
Even though 85% of cybersecurity professionals would consider new job opportunities, it’s getting harder for employers to attract and retain qualified candidates. There just aren’t enough experienced cybersecurity workers to hire, and those already employed are constantly being wooed by recruiters. Only 15% of currently employed cybersecurity workers are planning to stay put, according to recently completed (ISC)2 research. Among the rest, 14% are actively looking for a new job and 75% are open to opportunities. This means we will likely see a hubbub of activity in the cybersecurity job market throughout 2018. Employers face an uphill battle. You not only have to try to find skilled candidates in a very limited pool, but also do whatever you can within
Feb 28,By John McCumber, Director of Cybersecurity Advocacy, (ISC)² North America Region I am thoroughly stoked to announce The Lexicon Project has finally come to fruition. The first thousand copies are being printed as I type this. It has taken several months, and the support of our full team here at (ISC)², but it has happened. I also want to acknowledge the critical advice from our North American Advisory Council (NAAC) for their input to the lexicon. But, why would we take this on as one of the first projects for the new Cybersecurity Advocate’s role? The third week of my tenure as your humble Advocate was spent walking the halls of Capitol Hill and meeting with legislators, committee members, and the
Feb 26,Name: Rachel Phillips, PMP, Assoc. (ISC)² (ISC)² Exam(s) Passed: CISSPTitle: Cybersecurity AnalystLocation: Seattle, WA, U.S.A.Education: M.S. Information Technology (Security and Assurance) and B.S. Business Administration (New Media and Internet), Kaplan UniversityYears in IT: 10Years in Cybersecurity: 3Cybersecurity Certifications: Associate of (ISC)² Rachel Phillips, PMP, Assoc. (ISC)² is an influencer and sought-after contributor for her views and leadership in technology and security. She holds a Master’s in IT with emphasis in Information Security and Assurance, and a Bachelor’s in Business Administration from Kaplan University. As a cybersecurity analyst, she provides oversight and assurance of meeting industry standards and best practices to secure the IT environment. How did you decide upon a career in cybersecurity? A mentor wisely advised me to consider
Feb 21,In this ever-changing field, you’re constantly required to learn about new tools, vulnerabilities and threats. We know that time and financial resources may get in the way of participating in CPE offerings that help you sharpen your skills and hone your craft. We are committed to enabling our members to become the most well-rounded and effective cybersecurity practitioners around so we’ve compiled a list of CISSP CPE opportunities that will work for your busy schedule. Online CPE Opportunities: Read InfoSecurity Professional Magazine (and take the quiz) Watch a CPE webinar (including any of our cybersecurity webinar series: ThinkTank, e-Symposium, From the Trenches, & Security Briefings) Participate in our Bug Bounty program Write a cybersecurity white paper, book or magazine article
Feb 19,