(ISC)² regularly conducts Job Task Analysis (JTA) studies to review and
update the content outline (aka exam blueprint) of its credentialing
examinations. A JTA is the methodical process used to determine tasks
that are performed by credential holders and...
The most positive finding of the recently released (ISC)2 2020
Cybersecurity Perception Study is that the stereotype of loners working
in dark spaces is disappearing. However, a new one is replacing it and
although it’s a more positive crimefighter image,...
My Fellow (ISC)2 Members and Associates, As you know, (ISC)2 announced
our CEO succession plan earlier this year, and the Board of Directors
began its search for a new leader for our association. I am pleased to
share with you that today we announced the ...
Women in the cybersecurity profession are committed to their roles for
the long term, according to research data from (ISC)2. They view
cybersecurity as a viable, rewarding career and a solid majority of them
plan to stay in the profession until retiremen...
If they can find a way to do it, many users will circumvent
cybersecurity rules they find inconvenient or time-consuming. It’s
something cybersecurity professionals come across all the time –
sometimes after damage already has been done. But cybersecurity...
How missed education opportunities have created workplaces where people
don’t know what the plan is in a crisis By Chris Green, Head of
Communications, EMEA, (ISC)2 Problems can disrupt even the most
well-prepared organizations. There are a multitude of e...
How do your perceptions, priorities and security posture stack up
against those of your peers? Find the latest trends and insights inside
CyberEdge Group’s seventh annual Cyberthreat Defense Report, sponsored
by (ISC)2. Based on a survey of 1,200 particip...
The rush to set up employees to work from home as a result of the
COVID-19 outbreak has increased data protection and privacy risks,
according to 87% of IT leaders who participated in a recent poll.
However, only about half of respondents (51%) say they a...
Cybersecurity professionals, you’re not alone. Working from home and
facing new challenges and pressures due to COVID-19, remember your peers
are going through the same thing. During the highly-attended webinar,
“Gamechanger! What We’ve Learned (So Far) f...
We know you’re likely spending more time at home lately. With in-person
education events and conferences cancelled or postponed indefinitely,
online courses are becoming the new normal for earning CPEs. New to the
PDI catalog is our express learning cours...
Hello everyone! I want to introduce you to the newest (ISC)² team
member: @AndreaMoore Andrea joined the Communications team here at HQ in
the beginning of October, so you may have seen her in a few threads
already. She is here to help you, alongside myse...
Hello Everyone, It is with a heavy heart that I let you all know that I
will be leaving (ISC)2, and today is my last day. I have enjoyed my time
here at (ISC)2 and have learned so much from each and every one of you.
I wanted to take a moment to thank all...
During the Aug 15, 2019 Think Tank webcast (The Power of 2: How
Automated Threat Hunting & ATT&CK Can Work Together) the following
question was asked of the audience - Is your organization using the
MITRE ATT&CK Framework? The results A. Yes, we are curre...
The Power of 2: How Automated Threat Hunting & MITRE ATT&CK Framework
Can Work Together Many organizations are so busy responding to and
remediating indents that they don’t have the time, resources or
framework for being proactive and searching for these ...
Today's Security Congress Preview webinar on Privacy (click here if you
would like to view) included a polling question on the following: How
many organizations already had or have added some form of Data
Protection Officer (DPO) position following the in...
The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
Many organizations are so busy responding to and remediating indents
that they don’t have the time, resources or framework for being
proactive and searching for these threats. Automat...
2019 Security Congress Preview - Privacy (ISC)² will hold its 2019
Security Congress in Orlando, Fl Oct 28th – 30th. This conference will
bring together a global community of cybersecurity professionals and
more than 180 educational sessions. One of the 1...
I would like to apologize to everyone experiencing service delays in
recent weeks. I am committed – along with the entire senior leadership
team and all our staff – to restoring service and response times back to
acceptable levels. I know this has been fr...
(ISC)² will hold its Security Congress 2019 in Orlando, FL October 28th
– 30th. This conference will bring together 3000+ attendees and over 180
educational sessions. One of the 18 tracks that are being offered with
focus on Cloud Security and the challen...
To all Members, Associates, and Candidates: Thank you for your patience
as we work through several issues related to the recent migration of all
member, associate and candidate information to our new Association
Management System. The vast majority of use...
(ISC)² recently completed our multi-year Digital End-to-End
Transformation (DETE) project, which positions us to deliver a more a
seamless and user-friendly experience to all members. In addition to
revamping our online presence, we launched a new Learnin...
July marks the beginning of not only the third quarter, but also the
second half of the year. We wanted to celebrate this milestone in the
year with our July 2019 badge! To earn this badge all that is needed is
to log in to the Community throughout the mo...
Earlier this week, (ISC)2's member publication, Infosecurity
Professional, took the Silver award for Best Feature Article at the
EXCEL Awards for Assocaition Media, Publishing, Marketing and
Communications. The article, from the Jan/Feb 2018 Issue, focued...
We're running a survey right now that will become part of a future
Cybersecurity Workforce Study. We want to hear from you! If you want to
take the survey, please email firstname.lastname@example.org to request a
personalized survey link. When you email us, plea...
Attending conferences is a great way to stay up to date on what is
happening in the industry, trending information, and more. One of my
favorite parts about attending conferences are the learning
opportunities that also come with it. From pre-conference t...
Hot off the press! (ISC)² announces 2019 Information Security Leadership
Awards Asia-Pacific honorees. The 13 honorees will be recognized at the
(ISC)² Secure Summit APAC 2019. Read more >>http://ow.ly/U49g30oVsGS
Not only does Security Congress offer the traditional conference
experience with a vast number of speakers and sessions, there are also
plenty of Networking Opportunities and Activities. Throughout the week
we will be letting you know about the various op...
Throughout the month of June, we are going to be talking about Security
Congress. From event details, to keynotes, to sessions, and networking
opportunities – we’re covering the top topics for all of you. If you
engage with our content by commenting/reply...
Calling all subject matter experts. Do you have a passion for team
building? A background in cloud based security? A story to share about
your security roll out? (ISC)2 is looking for volunteers to share their
experience and expertise with others by recor...
Help us celebrate Star Wars Day in the Community! You can earn a badge
in May by logging in to the Community on May 4th. Make sure when logging
in to navigate through the Community to register your login. You can
view different pages or topics, create a p...