As demand for cloud computing grows, so does the need to secure it. In a survey of its Technology Executive Council members, CNBC found that cloud and software-defined security are among the C-suite’s top technology strategies for 2020. As reported in this video, cloud computing tops the list, and it’s followed by machine learning, artificial intelligence and software-defined security. The CNBC Technology Executive Council has nearly 150 executives in various industries, 70% of whom participated in the survey. The survey shows that securing cloud environments is a major priority – not only for the C-suite but also for cybersecurity workers. Another study, by the SANS Institute, provides further proof. "The SANS survey showed that rapid movement of corporate services and
- Jan 27,
One of the most common complaints cybersecurity professionals voice about their employers is that they have to pay for certifications out of their own pockets. It’s not a trivial issue, since workers consider certifications their number one career hurdle, according the (ISC)2 Cybersecurity Workforce Study 2019. Based on study findings, most employers don’t pay their cybersecurity workers’ certification fees. Considerably fewer than half of respondents in the study (37%) say their employers pay for them while 21% say they share the cost with employers. More than one third of respondents (35%) pay for all of their own cybersecurity certification costs. For many, having to pay for certifications themselves is a problem because of the associated costs. It’s the most common
Jan 22,By Tony Vizza, CISSP, CCSP, Director for Cyber Security Advocacy - APAC at (ISC)² Toward the end of 2019, I met many aspiring women and men who approached me and said, "Tony, I want to become cyber security certified, how do I do it?" If you are reading this article, it is likely that you have made a conscious decision to do so. Congratulations on taking this step in furthering your career, skills and knowledge. You have made the decision to demonstrate to the wider world your hard-gained experience, knowledge and skills in cybersecurity and to prove to yourself that you have what it takes to become certified. The most recognised and most valuable cyber security certifications in the world
Jan 21,As published in the September/October edition of InfoSecurity Professional Magazine By Deborah Johnson Advice on how to mitigate a sudden job loss due to redundancy, recession or ‘rightsizing’. Diana Contesti was a business continuity planner at a major steel manufacturer in Hamilton, Ontario, when a recession hit the Canadian steel industry in the early 1990s. The economic contraction forced companies to cut jobs. Her employer called it “rightsizing” when leadership announced it would cut approximately 3,000 positions. The layoffs were based on seniority by department, and based on that criterion, Contesti knew she was out. “I was extremely worried. I’m a single mother and all those fears, ‘Oh, my God! How am I going to feed my kid?’ kicked in.” For
Jan 02,(ISC)² regularly conducts Job Task Analysis (JTA) studies to review and update the content outline (or exam blueprint) of its credentialing examinations. A JTA is the methodical process used to determine tasks that are performed by credential holders and knowledge and skills required to perform those tasks successfully. Results of the JTA study link a candidate’s examination score directly to the domain knowledge being tested. The existing exam blueprint for SSCP will be reviewed in early 2020. In preparation for the upcoming review, we would like to hear from our SSCP members regarding new and emerging IT cyber security issues that they feel should be addressed but are not covered in the current SSCP Exam Outline. This is your opportunity
Dec 17,