Organizational culture typically takes shape as a result of decisions and actions by top management, who are responsible for setting vision, values and practices. When leadership doesn’t understand something, it shows in how the organization handles that particular area. When it comes to IT security, research by (ISC)2 reveals a tepid commitment to investing in a strong security stance, both in the areas of technology and human resources. Too often, cybersecurity teams are short-staffed, lack the resources they need to handle a cyberattack, or aren’t given the responsibility to fill a more proactive role in protecting company data and networks. About half of participants in (ISC)2’s 2017 Global Information Security Workforce Study, consisting of IT professionals in charge of security
- Oct 05,
Whether it’s Congress, a two-day Secure Summit, or a one-hour webinar, the experience is a product of the (ISC)² Community By Tisun Rustem, Senior Events Manager in EMEA, (ISC)² With so many industry events and online educational opportunities vying for your attention, particularly in information or cybersecurity, one can be forgiven for wondering whether an (ISC)² event could have something unique to offer. (ISC)² serves its membership with a range of on-line and conference-based educational opportunities, including one-hour webinars and half-day symposia, your annual regional Congress; and new to this year, the two-day Secure Summits - five of which are taking place in the EMEA region. Two, MENA and the UK, are still to come in November and December. They all provide
Oct 03,Fresh from Austin, here are the top headlines from (ISC)2's 2017 Security Congress: Let's talk about risk, baby. That's the language c-level executives and board members want to hear from the security team. Keynote speaker and Deputy Assistant Director of the FBI, Donald Freese, spoke about a non-emotional approach to security. CSO Online quotes Dylan Thomas, who was probably talking about cybersecurity practitioners when he said "Do not go gently into that good night." Garfield loves lasagna and hates cyberbullying. Infosecurity Magazine was with us in Austin and spoke to the CISO of the state of Missouri, Michael Roling, CIO of the Truth Initiativev, Derrick Butts, and CISO of the U.S. Dept. of Health & Human Services, Steven Hernandez. Ransomware – Tales from
Sep 29,Name: Mr. Toh Tai AnnTitle: Principal Trainer and ConsultantEmployer: Solution of Solutions LLPLocation: SingaporeDegree: Bachelor of Electrical Engineering (Hons) University of Western AustraliaYears in IT: 31 yearsYears in cybersecurity: 10 yearsCybersecurity certifications: Certified Information System Security Professional (CISSP)Certified Cloud Security Professional (CCSP)The Open Group Architecture Framework (TOGAF) How did you decide upon a career in cybersecurity? I have been an Information Technology professional for more than 25 years and in the Information Technology sector for 30+ years. In these 30+ years I have seen the transformation of IT from a mainframe/minicomputer centric data centre setup to a very disparate, distributed and complex environment. The centralised mainframe/minicomputer setup had many advantages from the security perspective. Physical security was extremely tight and
Sep 27,Name: Jasmin LandryTitle: IT Security AnalystEmployer: SecureOpsLocation: Montreal, Canada Years in IT: 4Years in information security: 3Cybersecurity certifications: SSCP, OSCP, CEH, eJPT, CCNA: Security, MCSA How did you decide upon a career in cybersecurity? It all started when I was a teenager. I enjoyed video games and I was curious about how they were created, so I decided to pursue education in programming. I quickly switched path though, after my first networking class. The teacher introduced us to Wireshark and I was just so amazed at what it could do, and what I was able to see with it. After taking more and more classes related to networking and security, my interest in information security continued to grow.
Sep 25,