<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Next challenge in infosec? in Welcome</title>
    <link>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13585#M1341</link>
    <description>&lt;P&gt;CAP for me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm contracted to DoD performing RMF.&amp;nbsp; I took the CAP bootcamp course and am impatiently waiting for ISC2 to get my CISSP blessed so I can get credit for my CAP followon studies before I take that exam.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sadly, my customer has no need for anything cloud related.&amp;nbsp; It still may get the cert to keep studying and who knows what the future holds.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Aug 2018 11:32:42 GMT</pubDate>
    <dc:creator>Flyslinger2</dc:creator>
    <dc:date>2018-08-14T11:32:42Z</dc:date>
    <item>
      <title>Next challenge in infosec?</title>
      <link>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13566#M1336</link>
      <description>&lt;P&gt;Now that you've succeeded in your CISSP certification what seems to be the next step for you? Personally, I am looking at CSA and cloud computing security. Everything seems to point to it as a must. However, metadata and data lake security seems to have far reaching consequences.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Drinking from the fire hose!&lt;/P&gt;</description>
      <pubDate>Mon, 13 Aug 2018 21:56:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13566#M1336</guid>
      <dc:creator>j_M007</dc:creator>
      <dc:date>2018-08-13T21:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: Next challenge in infosec?</title>
      <link>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13575#M1337</link>
      <description>&lt;P&gt;IoT which is so pervasive, no one appears to want to tackle that one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 05:12:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13575#M1337</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-08-14T05:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: Next challenge in infosec?</title>
      <link>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13577#M1338</link>
      <description>&lt;P&gt;Who will be named the Interim Director, &amp;nbsp;IoT Security (IDIoTS)?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 06:11:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13577#M1338</guid>
      <dc:creator>j_M007</dc:creator>
      <dc:date>2018-08-14T06:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Next challenge in infosec?</title>
      <link>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13578#M1339</link>
      <description>&lt;P&gt;Excellent point. Is there a group for IoT security like OWASP or CSA? I have not looked into it.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 06:13:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13578#M1339</guid>
      <dc:creator>j_M007</dc:creator>
      <dc:date>2018-08-14T06:13:33Z</dc:date>
    </item>
    <item>
      <title>Re: Next challenge in infosec?</title>
      <link>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13579#M1340</link>
      <description>&lt;P&gt;In that case, it is an opportunity and I suggest we not stand around - but take the initiative and take it forward, because it will creep up on a number of different environments.&amp;nbsp; By the time, there are frameworks available to deal with this it could be very late indeed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 07:06:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13579#M1340</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-08-14T07:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Next challenge in infosec?</title>
      <link>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13585#M1341</link>
      <description>&lt;P&gt;CAP for me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm contracted to DoD performing RMF.&amp;nbsp; I took the CAP bootcamp course and am impatiently waiting for ISC2 to get my CISSP blessed so I can get credit for my CAP followon studies before I take that exam.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sadly, my customer has no need for anything cloud related.&amp;nbsp; It still may get the cert to keep studying and who knows what the future holds.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 11:32:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13585#M1341</guid>
      <dc:creator>Flyslinger2</dc:creator>
      <dc:date>2018-08-14T11:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Next challenge in infosec?</title>
      <link>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13608#M1342</link>
      <description>&lt;P&gt;Congrats on both achievements! I am looking at the CSA CCSK V 4 mainly to bolster my knowledge. Like you say about the future, and &lt;SPAN&gt;Caute_cautim&amp;nbsp;mentioned about IoT about few people tackling it, you have to own or be pwned.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As for me, I wonder about the protection of data lake information, aggregation attacks against&amp;nbsp;CIA of subjects' information, etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The more this stuff grows, the harder it is to secure.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 16:18:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13608#M1342</guid>
      <dc:creator>j_M007</dc:creator>
      <dc:date>2018-08-14T16:18:57Z</dc:date>
    </item>
    <item>
      <title>Re: Next challenge in infosec?</title>
      <link>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13629#M1343</link>
      <description>&lt;P&gt;Fore armed is fore warned, and prepared for life's challenges.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given the rate of change, exponentially and beyond Moore's law, which appears to have been superceded, you have to be prepared to develop yourself and make it a personal challenge to maintain the motivation and assisting others on their own personal journeys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 19:44:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Next-challenge-in-infosec/m-p/13629#M1343</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-08-14T19:44:43Z</dc:date>
    </item>
  </channel>
</rss>

