If you are a cloud service provider (CSP), much of your credibility will come from your transparency. Clients will constantly worry about your ability to remain secure and reliable in all areas of operations, and they will compare it to what they know best – their own in-house system. Bedside manner and customer experience are vital components of a CSP’s offerings, but they are underused commodities. Cloud Tweaks most recent blog, How Security Certification Helps Cloud Service Providers Stay Transparent and Credible, reveals how partnering up with a Certified Cloud Security Professional (CCSP) can make all the difference in ensuring your customers enjoy both physical security and emotional confidence. Read it now >
- Nov 16,
Name: Greg HarrisTitle: Senior Security Consultant and Adjunct ProfessorEmployer: Big 4 Firm and Kennesaw State UniversityLocation: Alpharetta, Georgia, U.S.A.Degree: MBA, MS in Information Systems, BS in Computer Science & MathematicsYears in IT: 15+Years in cybersecurity: 13+Cybersecurity certifications: CISSP, CCSP, CRISC, CISM, CISA, GCFA How did you decide upon a career in cybersecurity? McKesson Corporation hired me as a Security Infrastructure Engineer through a campus-recruiting program at Kennesaw State University in 2003. My undergraduate degree was a Bachelor of Science with a double major in Computer Science and Mathematics. With my Navy Electronic Warfare background, I thought I wanted to be an embedded systems developer and work on DoD projects. However, when I interviewed for the security role, and talked
Nov 08,(ISC)² Community weighs in on Cyber Shield Act of 2017 Senator Ed Markey (D-Mass) has long been concerned about securing new technology as it bleeds into our everyday lives. In 2015, Sen. Markey, a member of the Commerce, Science and Transportation Committee, released the report, Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk. Since then, smart cars have made frequent headlines, which has had the residual effect of bringing securing connecting cars to front of mind for the auto industry. We posed the question, “What do you think?” to members of the (ISC)² Community, and received a wide range of opinions on whether industry experts think the legislation will make a difference. If the goal with the newly
Nov 01,Name: Tiffany TempleTitle: Cyber Security AnalystEmployer: City of GreensboroLocation: Greensboro, North Carolina, U.S.A.Education: Bachelor of Science in Management Information Systems - East Carolina University, Master of Science in Information Technology Management - University of North Carolina at GreensboroYears in IT: 5Years in information security: 4Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I was encouraged by my current boss to transition from Help Desk duties to an Information Security role after she saw in me the analytical skills necessary to succeed. It was a seamless transition for me and I can honestly say one of the best decisions I have made, as I have been learning new things and enhancing my skill set ever since.
Oct 23,Name: Tony HarrisTitle: Consultant, Cyber SecurityEmployer: KPMG LLP Location: Vancouver, CanadaEducation: MSc, Cyber Security (in progress) from the University of Liverpool, and Bachelor of Arts in American Studies & International Relations from the University of British ColumbiaYears in IT: 8Years in cybersecurity: 7Cybersecurity certifications: CISSP, CISM How did you decide upon a career in cybersecurity? I began my career in general IT processes eight years ago as your typical jack-of-all-trades IT. I wanted to narrow my focus into a specialty that I'd be interested in and cybersecurity ultimately was that choice. The reason was because cybersecurity was a fast-paced and challenging environment, which kept me going compared to other specialties (i.e. DevOps, Systems Administration, and Helpdesk). Why did you
Oct 18,