• Rebel, Yell! In late 2019, the phrase “OK, Boomer” started being used by millennials toward the elders who preceded them mockingly. This behavioral pattern isn’t new. Younger generations have always rebelled against their elders. Even in cultures where the elderly population is highly respected, the younger generations have developed their own language, music, art, literature and customs. The difference now is that this is the first time that the elderly out-number the younger members of society. This trend is projected to continue for the next 40 years. While some may see this as a troubling number, for those who work in healthcare, this has different implications. The healthcare field is growing at a rate that is concurrent with the predicted

    Dec 08,
  • The Internal and External Struggles of Ethics and the CISSP Credential As Old As Mythology All students of information security have heard of the Caesar cipher and the Spartan Scytale. These early encryption methods demonstrate the craftiness of the human mind. Encryption has evolved and become more sophisticated.  Encryption has been instrumental in the advancement of society. Can you think of another ancient mental construct of humanity that has remained static, yet is no less important to the functioning of society?  Let’s consider the topic of ethics. The concept of ethics has existed since ancient times, and the subject is still applicable today, in all areas of life, and is codified as a requirement in many professions, such as the

    Nov 18,
  • One of the biggest draws to (ISC)² Security Congress is networking and engaging with other experts in the cybersecurity industry. Despite the lack of gathering together in-person, #ISC2Congress 2020 will not be lacking in the opportunities for connecting with others, learning best practices and providing career enhancement in five networking lounges throughout the conference. With more than 4,500 attendees registered, there is something for everyone at all career levels. Each of the five topic-specific lounges will allow attendees to participate in a discussion forum, access resources, view presentations, ask questions and even earn CPEs for attending. Attendees and Members Lounge While it is everyone’s first virtual (ISC)² Security Congress, if this is your first year as a member of (ISC)²

    Nov 11,
  • A corporate security policy is the cornerstone document of a company’s risk management. Does your business have the appropriate security controls in place to implement the policy, or is the policy a forgotten document in a dusty drawer? Although most companies have established security policies at the strategic level these are not always enforced, because they lack foundational support at the tactical level. The key to solving this is knowledgeable and skilled security practitioners who can take the lead and implement security controls aligned to the policy’s goals. Many security incidents may have been avoided if the proper security controls had been in place. As a result, affected businesses are running the operational risks of huge penalties by not being

    Nov 10,
  • By David Bisson All IT professionals who want a lucrative career should consider expanding their skill set to include security. Now is an opportune time to do so, because security is continuing to grow in importance for businesses and organizations. As noted in “Why Add Security to Your Skill Set and How to Do It,” about 44% of corporate boards participate in their organization’s digital security strategy. An even greater proportion (58%) receive security briefings on at least a quarterly basis. Boards are paying greater attention to security so that they can help keep their organizations out of the headlines. Even so, the skills gap is making it difficult for organizations to hire and retain qualified digital security talent, thus

    Oct 16,