(ISC)2

BREACHED DATA: KEEPING IT SECRET DOESN’T MAKE IT GO AWAY

This post was originally published here by  (ISC)² Management. When Uber’s massive data breach made it to the public’s ears recently, it became a member of an infamous group of companies who not only had vital customer data stolen, but who sat on the story and did not inform the public or the media until […]

WITH NEW LEADERSHIP AT THE HELM, DHS MAY RECRUIT MORE TALENT

This post was originally published here by (ISC)² Management. If leadership truly does come from the top, having Kirstjen Neilsen as the newest Homeland Security secretary may prove promising when it comes to filling the jobs gap. After all, she’s the first person to bring industry experience to the role. Few things have the ability to obliterate […]

(ISC)²’S TEN MOST POPULAR EMEA WEBINARS

This post was originally published here by (ISC)² Management. The (ISC)² EMEA Secure Webinar series features live and on-demand online events where industry thought leaders, (ISC)² members and solution providers share their views on a variety of topics to help cybersecurity professionals in tackling the current threats and challenges they may be facing today. From GDPR to […]

(ISC)² ENDORSEMENT DEMYSTIFIED

This post was originally published here by (ISC)² Management. Following the jubilant moment of finding out you have achieved a passing score on your (ISC)² exam, you’re now ready for the endorsement process – but what does that actually mean? First, believe us when we say that the hard part is over! You’ve already passed the […]

READY, SET, GO: 5 STEPS TO SET YOURSELF UP FOR CERTIFICATION SUCCESS

This post was originally published here by (ISC)² Management. If earning a professional certification were easy, everyone would have one. The truth is, making the decision to advance your career is a major undertaking. Planning for the process is the best way to set yourself up for success on the certifications you need to advance your […]

CLOUD TWEAKS: HOW CERTIFICATION HELPS

This post was originally published here by  (ISC)² Management. If you are a cloud service provider (CSP), much of your credibility will come from your transparency. Clients will constantly worry about your ability to remain secure and reliable in all areas of operations, and they will compare it to what they know best – their […]

MOBILE PAYMENT SYSTEMS: DISRUPTIVE DEVELOPMENT AND CYBER RISKS

This post was originally published here by  (ISC)² Management. By Kaya Kazmirci, Managing Director, Kazmirci Associates Kaya will be hosting the session Mobile Payment Systems: Disruptive Development and Cyber Risks at (ISC)² Secure Summit MENA, between 21st and 22nd November 2017. Two fundamental shifts in traditional payment methods are changing the landscape of spending. Emerging blockchain-based currencies and alternative payment channels […]

WEEKLY SECURITY HEADLINES: HEARINGS, GUIDELINES AND NEWS

This post was originally published here by  (ISC)² Management. New guidelines, increased government oversight, and mounting stress in cybersecurity With the 4th quarter underway, we are starting to see lots of predictions about what the cybersecurity industry can expect to see come 2018. Thinking about the future makes it easy to forget about what is happening […]

SECURITY HEADLINES: PASSWORDS REMAIN A PROBLEM FOR SOME, BUT DON’T BE SPOOKED BY CYBER

This post was originally published here by  (ISC)² Management. James Bond has entertained millions for decades. While he’s engaged in many battles and comes out victorious, his name is not a good password. Hopefully end users can learn from Manaford’s poor password practices. As the Facebook, Google, and Twitter hearings came to a close, Mark Zuckerberg […]

IS LEGISLATION KEY TO SECURITY IN IOT?

This post was originally published here by (ISC)² Management. (ISC)² Community weighs in on Cyber Shield Act of 2017 Senator Ed Markey (D-Mass) has long been concerned about securing new technology as it bleeds into our everyday lives. In 2015, Sen. Markey, a member of the Commerce, Science and Transportation Committee, released the report, Tracking & Hacking: […]

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security.
Share this page