Last year’s Security Congress in Austin was our largest one yet with nearly 2,000 cybersecurity professionals in attendance. You know what they say, everything is bigger in Texas! Our first independent Congress featured 139 educational sessions, as well as vendors presenting in the Solutions Theater, (ISC)² member focus groups, Cloud Security Alliance (CSA) Summit and the Information Security Leadership Awards (ISLA) Americas ceremony and celebration. If you attended last year, you saw the excitement and enthusiasm from staff, speakers and attendees. If you were unable to attend, you’re in luck – you can watch some of the top sessions from 2017’s Security Congress online! Below is a list of the sessions currently available – and we’ll keep adding them as
- Feb 15,
Name: Wai Sheng ChengTitle: Security AnalystEmployer: Cboe Global MarketsLocation: Kansas, U.S.A.Degree: Master of Science, Information Systems Engineering, Johns Hopkins UniversityYears in IT: 6Years in information security: 3Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I decided on a career in cybersecurity when my email account was first compromised in 2011. I learned about this when my friends and family called to ask if I had sent out emails asking for money. As an engineer-in-training, I was curious to know why and how this had happened. It was through this experience that I first became interested in information security. Why did you get your SSCP®? My former boss at the Kansas City Chiefs said to me one
Feb 12,As cyber threats proliferate, organizations looking to fill cybersecurity vacancies need to take concrete steps to reboot recruiting and hiring efforts. Qualified candidates for cybersecurity jobs are scarce and getting scarcer, creating a challenge for companies to properly defend themselves against threats. By 2022, an estimated 1.8 million cybersecurity jobs will go unfilled, according to research by (ISC)2. It’s a classic supply-and-demand challenge, with too many vacancies for too few candidates. Currently it takes 55% of organizations at least three to six months to fill a cybersecurity vacancy, and 32% spend even more time to find qualified candidates, ISACA has found. In the United States, 27% of companies say they cannot fill cybersecurity vacancies. To reverse this trend, employers should
Feb 06,Name: Timothy MeryweatherTitle: IT AuditorLocation: Greater Los Angeles AreaDegree: Bachelor of ScienceYears in information security: 6Cybersecurity certifications: SSCP (ISACA: CISA, CRISC) How did you decide upon a career in cybersecurity? Our Audit Department’s Senior IT Auditor needed help and I was transferred from Background Licensing. Right place, right time. I possess a guardian spirit and have mostly worked in similar areas of employment: U.S. Marine, Deputy Sheriff, Police Officer, Private Security/Life Safety, casino surveillance, background licensing investigator. With my investigative training background, it was a natural migration into auditing the cybersecurity of information technology. Why did you get your SSCP®? To properly audit, you need to know the area of your audit. SSCP is a foundational focus on
Jan 31,For a limited time, (ISC)² is excited to offer the opportunity for members to pilot an interactive, online, self-paced free CPE credit opportunity that incorporates a practical hands-on lab learning experience. This Cyber Forensics Incident Recovery lab is designed to provide you with a deeper understanding of how to extract evidence from a suspect’s hard drive. We are eager to offer this course, which includes demonstrations, hands-on lab practical application and concludes with an assessment to ensure understanding of the learning objectives. You’ll learn key concepts, watch demos, work through the hands-on lab and test your knowledge. Following completion of the course – and an evaluation form – you’ll earn four CPE credits. The Cyber Forensics Incident Recovery lab is
Jan 29,