(ISC)2

CYBERSECURITY IS THE TOP CONCERN FOR MIDMARKET EXECUTIVES

This post was originally published by (ISC)² Management. Nearly half of midmarket executives (47%) in a newly released quarterly report cited cybersecurity as their top concern for the coming year. The Middle Market Indicator report, by Chubb and the National Center for the Middle Market (NCMM), shows that cybersecurity topped the list of concerns for […]

SECURITY CONGRESS FINAL THOUGHTS: BEING THERE FOR OTHERS (PART 1)

This post was originally published by (ISC)² Management. Sometimes you need a boatload of people to help you through. It’s a lesson Admiral William H. McRaven (retired) learned after a parachute accident that left him bedridden for months. The accident happened while he was participating in a Naval Special Warfare exercise involving a 1,000-foot free-fall […]

SECURITY CONGRESS FINAL THOUGHTS: BEING THERE FOR OTHERS (PART 2)

This post was originally published by (ISC)² Management. Admiral William H. McRaven (retired) was one of the speakers at (ISC)2 Security Congress who received a standing ovation. Another was Eric Wahl, an artist and best-selling author, who delivered the lunch hour keynote on the second day. He mesmerized the audience by painting portraits of Michael Jordan, John […]

PCI COMPLIANCE IN AWS – SIMPLIFIED

This post was originally published by (ISC)² Management. Payment Card Industry Data Security Standards or PCI DSS, are a set of 12 requirements with over 300 controls which apply to any organization which stores, processes or transmits credit card data. Today, I will attempt to add some clarity around PCI compliance within AWS Read more here: https://blog.isc2.org/isc2_blog/2019/10/pci-compliance-in-aws-simplified.html

FILLING THE NEED OF HEALTHCARE CYBERSECURITY PROFESSIONALS REQUIRES COLLABORATION

This post was originally published by (ISC)² Management. It is widely known within the cybersecurity field that there is a severe talent shortage. Organizations across all industries are facing major challenges in staffing their security teams to protect themselves from cyber threats. Healthcare, along with finance and retail, is one of the most commonly-targeted industries […]

CYBERSECURITY INFRASTRUCTURE VIEWED AS A ‘TANGIBLE ASSET’ IN M&A

This post was originally published by (ISC)² Management. When M&A auditors look at a target company’s tangible assets, in the vast majority of cases that includes cybersecurity. In a new (ISC)² study about the impact of cybersecurity in M&A, 95% of respondents say they consider cybersecurity infrastructure “a tangible part” of the value calculation. Read more here: https://blog.isc2.org/isc2_blog/2019/10/cybersecurity-infrastructure-viewed-as-a-tangible-asset-in-ma.html […]

CYBERSECURITY AUDITS ARE NOW STANDARD PRACTICE IN M&A

This post was originally published by (ISC)² Management. Cybersecurity threats are a major concern for businesses of all sizes, and that challenge can have repercussions when a company puts itself on the selling block. One of the things buyers will want to know is whether the company has had a breach and, if so, how […]

ATTACKERS ARE TARGETING IT SERVICE PROVIDERS

This post was originally published by (ISC)² Management. IT service providers have recently become a common target of cyber attacks and 11 of them have been compromised since July 2018. Attackers target providers in attempts to gain access to their customers, according to a blog post by Symantec. Read more here: https://blog.isc2.org/isc2_blog/2019/09/attackers-are-targeting-it-service-providers.html Photo:redmondmag.com

UPDATE: NEW (ISC)² OFFICIAL TRAINING PROVIDER S4 INC.

This post was originally published by (ISC)² Management. Earlier this week, S4 Inc. announced that it has been added to (ISC)²’s roster of Official Training Providers. Based in Colorado Springs, S4 is celebrating its 20th anniversary and has supported US Government, DoD and DHS agencies since 1999. Read more here: https://blog.isc2.org/isc2_blog/2019/09/new-isc2-official-training-provider-s4-inc.html Photo:www.lsgtx.com

LOOKING TO BREAK INTO CYBERSECURITY WITHOUT DIRECT EXPERIENCE? FIND OUT HOW

This post was originally published by (ISC)² Management. The cybersecurity skills gap means companies are scrambling to fill security positions, and that presents an opportunity for you to find security work – even without direct experience. Faced with a critical shortage of qualified candidates, organizations are increasingly taking chances on nontraditional applicants and training them […]

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security.
Share this page