cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

(ISC)² Team
(ISC)² Team
(ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learnin... view more
3 Comments
1335 Views
(ISC)² Team
(ISC)² Team
(ISC)2 Think Tank Webinar Smelling the Roses at 100Gb - Security Tooling at the Speed of Life Ferris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” With complex data flows now reaching... view more
0 Comments
318 Views
(ISC)² Team
(ISC)² Team
Upcoming (ISC)2 webinar. Earn 1 CPE. Detecting & Preventing Threat Evasions Techniques – 2019 And Beyond Cyber-attacks and the threat actors behind them are becoming more and more sophisticated. Today’s attackers adopt existing techniques, modify them and... view more
0 Comments
342 Views
(ISC)² Team
(ISC)² Team
CAP Certification Holders: We Want to Hear Your Story
(ISC)2 is looking for members holding the CAP certification to tell us a little about how this certification impacted their career. We’d love to hear from you about your experience with this certification. With your permission, selected responses may be c... view more
0 Kudos
0 Comments
394 Views
(ISC)² Team
(ISC)² Team
Scam and Phishing emails continue to put organizations of all sizes at risk. A favored vector of attack is the use of a malicious Office document attachment or PDFs to gain a foothold into a targeted system. These types of threats can put account credenti... view more
0 Kudos
0 Comments
264 Views
(ISC)² Team
(ISC)² Team
Join Cofense and (ISC)2 for the first Think Tank webcast of the year on Thursday, Jan 17, 2019 at 1PM Eastern for "Employing Users as Your Quality Control". Process automation delivers a lot of promises. A car can be assembled in less than a day and veget... view more
0 Kudos
0 Comments
312 Views
Newcomer III
CISSP-ISSAP Members: Your Feedback is Requested
(ISC)² regularly conducts Job Task Analysis (JTA) studies to review and update the content outline of its credentialing examinations. A JTA is the methodical process used to determine tasks that are performed by credential holders and knowledge and skills... view more
0 Kudos
1 Comment
678 Views
(ISC)² Former Staff (ISC)² Former Staff
(ISC)² Former Staff
Happy New Year - 2019!
Happy New Year! We want to thank all of you for a great 2018. 2018 was a great year for the Community, take a look at some of our highlights below: Welcomed over 6,000 new registered members to the Community Re-structured the Community to include (ISC)2 E... view more
1 Comment
572 Views
(ISC)² Team
(ISC)² Team
HID Global and (ISC)2 presents our final live webcast of the year - Halt! Who Goes There? Improving the Intersection of Identity & Security - December 6, 2018, 1PM Eastern. With the multiple points of access to an organization, both internal and external,... view more
0 Kudos
0 Comments
313 Views
(ISC)² Team
(ISC)² Team
Join (ISC)2 and John McCumber, Director of Cybersecurity Advocacy for a Security Briefings Webinar - "The Workforce Gap Widens: The Need to Focus on Skills Development" on Tuesday, Nov 20, 2018 at 1PM Eastern. The 2018 (ISC)² Cybersecurity Workforce Study... view more
0 Comments
329 Views
(ISC)² Team
(ISC)² Team
Join (ISC)² on Thursday, Nov 8, 2018 at 1PM Eastern. Email and the Web – Defending Against Attackers’ Favorite Vectors According to the Verizon Data Breach Investigations Report 2018, 99% of malware, such as ransomware, trojans, and RATs, were delivered v... view more
0 Comments
357 Views
(ISC)² Team
(ISC)² Team
Security Briefings Webcast Someone in leadership always seems to ask the question “How can I tie my threat hunting activities to real impacts for the organization?” Threat hunting programs are encouraged as part of a mature and successful incident respons... view more
0 Kudos
0 Comments
354 Views
(ISC)² Team
(ISC)² Team
July/August 2018 Issue of  Infosecurity Professional
Making available to the community the July/August 2018 issue of Infosecurity Professional (PDF of the Issue can be downloaded below) view more
0 Comments
474 Views
(ISC)² Team
(ISC)² Team
May/June 2018 Issue of Infosecurity Professional Magazine
I'm pleased to make the May/June issue of Infosecurity Professional Magazine available for download to the members of the (ISC)2 Community. File can be download be downloaded below. view more
0 Kudos
2 Comments
1374 Views
(ISC)² Team
(ISC)² Team
Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine ... view more
3 Comments
1127 Views
(ISC)² Team
(ISC)² Team
(ISC)2 and CSA present Taming the Cloud Together - CCSP & CCSK Cloud Certification Synergy on Tuesday, June 12, 2018 at 1 PM Eastern. Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney... view more
0 Comments
449 Views
(ISC)² Team
(ISC)² Team
Webcast - Organizational Dynamics of Information Security Positioning Information Security within the enterprise presents its own set of challenges. Our recent survey data from hundreds of senior security and IT leaders like you uncovered a number of syst... view more
0 Kudos
0 Comments
361 Views
(ISC)² Team
(ISC)² Team
While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to enc... view more
0 Comments
335 Views
(ISC)² Team
(ISC)² Team
Jan/Feb 2018 Issue of Infosecurity Professional Available Here
I'm pleased to make the Jan/Feb edition of Infosecurity Professional Magazine available to everyone to download. Download with the link below! view more
2 Comments
991 Views
(ISC)² Team
(ISC)² Team
Join us for our next webcast November 16, 2017 at 12:00PM (Noon) Eastern - Exchanging Cyber Threat Intelligence: There has to be a Better Way. Today’s increasingly complex and stealthy threats are causing organizations difficultly in defending against the... view more
0 Comments
840 Views
(ISC)² Team
(ISC)² Team
Sept/Oct Issue of (ISC)2's Infosecurity Professional
I'm happy to make available for download to the members of the (ISC)2 Community the PDF of the Sept/Oct 2017 edition of (ISC)2's Infosecurity Professional Magazine. view more
5 Comments
2332 Views