The world will never be the same, and neither will cybersecurity. This past year changed everything. Or did it? Help us better understand the current state of the cybersecurity profession. We need your participation in the annual (ISC)² Cybersecurity Workforce Survey. You’re living and working through the changes. Now, share what you’ve experienced. Your feedback will play a vital role in benchmarking the global shifts in cybersecurity through the pandemic and beyond. Example: Most survey respondents last year reported stable — or even fewer — security incidents after moving their cybersecurity teams remote. Did that trend hold up for you this year? The (ISC)² Cybersecurity Workforce Survey is used by organizations, governments and the media to advance conversations centered on closing the cybersecurity workforce gap and to better secure organizations around
- May 25,
People looking to get into the cybersecurity field generally demonstrate a solid understanding of the threats facing organizations, according to new research from (ISC)². Yet, they don’t necessarily have the correct expectations of what they will be doing should they land a cybersecurity job. In a profession that covers a wide spectrum of tasks and responsibilities, including security operations, risk assessment and user training, coming up with a clear definition of the role is difficult for outsiders, the study suggests. Nevertheless, job pursuers are aware of the various threats cybersecurity teams have to address, including malware, ransomware and phishing. The Cybersecurity Career Pursuers Study, which polled both current cybersecurity professionals and jobseekers, indicates that jobseekers need a clearer idea of
May 20,The annual (ISC)² Cybersecurity Workforce Survey needs your experience and opinions to help shape the conversation. As we find ourselves more than one year into a global pandemic, we want to accurately reflect the current state of the industry. How has your career been impacted? How has your organization changed? How has your work evolved? We need to hear from cybersecurity professionals, (ISC)² members and non-members, representing all regions globally. Like last year’s survey results, these results will be used by organizations, governments and the media to foster conversations regarding strategies to improve the recruiting and filling of positions needed to secure organizations around the world. If you’re an (ISC)² member, check your email for an invitation to participate in the survey. If you have not already taken the survey, please share your insight into the cybersecurity profession. Click here to participate.
May 19,An interesting take-away from the (ISC)2 Cybersecurity Career Pursuers Study is what cybersecurity professionals told us were the most important technical skills for those looking for their first cybersecurity job. When current jobholders were asked to rate the most important technical skills for aspiring cybersecurity professionals, there was little differentiation among the 20 technical concepts they were asked to rate. Cyber Security Technical Skill or Concept Rating (1 – 5) Cloud Security 4.46 Malware Analysis 4.44 Data Analysis 4.42 Threat Assessment 4.42 Intrusion Detection 4.42 Risk Assessment/Management 4.37 Encryption 4.37 Secure Software Development 4.37 Networking 4.34 Database 4.32 Penetration Testing 4.27 Backup and Storage 4.26 Coding/Programming 4.26 Access Management 4.22 Alert and Event Management 4.22 Hardware 4.21 Compliance 4.19 Forensics
May 13,The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. This is so because of all the doors that certification opens to a CISSP professional. Those doors lead to many different types of positions and opportunities, thus making the information security community dynamic and multifaceted. In support of this diversity, (ISC)² has launched a series of interviews to explore where CISSP certification has led security professionals. Last time we heard from Mari Aoba and her experiences with CISSP. This installment features Jason Lau, CISO for Crypto.com and an official member and contributor on the Forbes Technology Council. He is also an adjunct professor and industry advisory board member (cybersecurity and data
May 06,