• Last year’s Security Congress in Austin was our largest one yet with nearly 2,000 cybersecurity professionals in attendance. You know what they say, everything is bigger in Texas! Our first independent Congress featured 139 educational sessions, as well as vendors presenting in the Solutions Theater, (ISC)² member focus groups, Cloud Security Alliance (CSA) Summit and the Information Security Leadership Awards (ISLA) Americas ceremony and celebration. If you attended last year, you saw the excitement and enthusiasm from staff, speakers and attendees. If you were unable to attend, you’re in luck – you can watch some of the top sessions from 2017’s Security Congress online! Below is a list of the sessions currently available – and we’ll keep adding them as

    Feb 15,
  • As cyber threats proliferate, organizations looking to fill cybersecurity vacancies need to take concrete steps to reboot recruiting and hiring efforts. Qualified candidates for cybersecurity jobs are scarce and getting scarcer, creating a challenge for companies to properly defend themselves against threats. By 2022, an estimated 1.8 million cybersecurity jobs will go unfilled, according to research by (ISC)2. It’s a classic supply-and-demand challenge, with too many vacancies for too few candidates. Currently it takes 55% of organizations at least three to six months to fill a cybersecurity vacancy, and 32% spend even more time to find qualified candidates, ISACA has found. In the United States, 27% of companies say they cannot fill cybersecurity vacancies. To reverse this trend, employers should

    Feb 06,
  • Bruce Beam, CISSP recently join the (ISC)² family as our director of infrastructure and security. Bruce has more than 20 years of experience leading IT/ICT and security teams for large enterprises and the U.S. Navy. He is leading all aspects of (ISC)²’s global IT/ICT and cybersecurity operations. He is not only managing the (ISC)² “DETE” (digital-end-to-end) initiative, but also oversees our Global Data Protection Regulation preparations. Bruce has words of advice for surviving – and thriving – through GDPR: The GDPR sweat is now in full swing with the May 25 deadline looming. I have seen a lot of gloom and doom about the penalties many companies may be paying in June. While there is a lot to accomplish and

    Feb 05,
  • For a limited time, (ISC)² is excited to offer the opportunity for members to pilot an interactive, online, self-paced free CPE credit opportunity that incorporates a practical hands-on lab learning experience. This Cyber Forensics Incident Recovery lab is designed to provide you with a deeper understanding of how to extract evidence from a suspect’s hard drive. We are eager to offer this course, which includes demonstrations, hands-on lab practical application and concludes with an assessment to ensure understanding of the learning objectives. You’ll learn key concepts, watch demos, work through the hands-on lab and test your knowledge. Following completion of the course – and an evaluation form – you’ll earn four CPE credits. The Cyber Forensics Incident Recovery lab is

    Jan 29,
  • (ISC)²’s two-day Secure Summits bring multi-subject sessions from hands on practical workshops to keynotes and panel discussions, featuring local and international industry experts to maximise the learning experience and CPE opportunities. Serving the entire (ISC)² EMEA professional community with regional events, the Summits offer a wealth of educational value, networking opportunities, and a community forum for like-minded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members. Read on for insights from one of our popular Secure Summit UK sessions... You’re the CEO of an international oil and gas company. Business risk and risk management planning is second nature. The things that keep you awake at night probably involve physical damage to your company’s assets, employee safety and

    Jan 26,
1 4 5 6 7 8 21