Earn the (ISC)2 Excel badge for demonstrating excelling in engaging in the (ISC)2 Community to advance our industry through the months of October and November.
To qualify, you must complete these 5 activities:
Why Tagging? Tagging posts in the Community helps others to find content quickly. A good way to tag an article is to think of other ways people may talk about the topic. Here’s an example – talking about a Chief Information Security Officer? You might want to tag the post with “CISO” so other users can easily search for other articles related to this topic.
Why Kudos? Kudos can have many meanings, but they work best when you want to show someone you read through their article, appreciate (or agree) with their insights, give a thank you for supplying the information, or if you just want to say “Job well done!”
Thank you for your commitment to Enrich. Enable. Excel. with us! Your participation helps peers and fellow (ISC)2 members remain well-rounded and informed as cybersecurity professionals.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Happy to be a part of this great community and organization.
Happy First Birthday!
Warren Mack, Ph.D., CISSP
Let's all make a concerted effort to engage more
I want to know what people are doing in their positions to combat Phishing.
What solution do you use?
What strategy to you employ?
Is it working?
I have my own wanderings through this maze of vendors, buzzwords, fixes, and strategies to share...but Id like to hear yours first.
I would like to know what others are doing to manage medical devices that store protected health data in your organization?
Do you have any solutions on your network to discover these devices?
How are they segmented on the network?
This my first community engagement, I look forward to learning and sharing with this community.
I’m curious how organizations approach insider threat? I see a lot of companies heavily protecting against the outside threat but once youre inside, the keys to the kingdom seem available to everyone. Usually the response I hear is employee morale. Security makes the workforce unhappy and therefore security is reduced internally to appease the employees.
I heavily disagree with that mentality.
wondered if anybody else had a view on this - as technologies have coalesced for example desk phones, terminals, calendars, maps and cameras etc. have become features of tablets and smartphones; how do we envisage the security technologies within organisations will evolve? Already we see the introduction of AI and big Data into User Behaviour Analysis and SOC Processes.
Seems like the Security industry will be set to change rapidly in just a few years and as a profession we'll need to be ready to champion a solid understanding of how the core principals relate to the new tool-sets so that we don't lose sight of the key objectives.
Enjoying the game-ification to prod us to engage our ISC2 community. Good luck into the second year!
Thank you for the nudge to get more involved in this community as well as to take advantage of the deep expertise available to each of us through our affiliation with this organization.
A little push to get more involved is sometimes needed as it seems 🙂
I know there's always a time limit, but maybe a holiday gift would be extending the timeline for the badge until the end of December? It doesn't hurt to ask....