(ISC)² recently completed our multi-year Digital End-to-End
Transformation (DETE) project, which positions us to deliver a more a
seamless and user-friendly experience to all members. In addition to
revamping our online presence, we launched a new Learnin...
(ISC)2 Think Tank Webinar Smelling the Roses at 100Gb - Security Tooling
at the Speed of Life Ferris Bueller famously said, “Life moves pretty
fast. If you don’t stop to look around once in a while, you could miss
it.” With complex data flows now reaching...
Upcoming (ISC)2 webinar. Earn 1 CPE. Detecting & Preventing Threat
Evasions Techniques – 2019 And Beyond Cyber-attacks and the threat
actors behind them are becoming more and more sophisticated. Today’s
attackers adopt existing techniques, modify them and...
(ISC)2 is looking for members holding the CAP certification to tell us a
little about how this certification impacted their career. We’d love to
hear from you about your experience with this certification. With your
permission, selected responses may be c...
Scam and Phishing emails continue to put organizations of all sizes at
risk. A favored vector of attack is the use of a malicious Office
document attachment or PDFs to gain a foothold into a targeted system.
These types of threats can put account credenti...
Join Cofense and (ISC)2 for the first Think Tank webcast of the year on
Thursday, Jan 17, 2019 at 1PM Eastern for "Employing Users as Your
Quality Control". Process automation delivers a lot of promises. A car
can be assembled in less than a day and veget...
(ISC)² regularly conducts Job Task Analysis (JTA) studies to review and
update the content outline of its credentialing examinations. A JTA is
the methodical process used to determine tasks that are performed by
credential holders and knowledge and skills...
Happy New Year! We want to thank all of you for a great 2018. 2018 was a
great year for the Community, take a look at some of our highlights
below: Welcomed over 6,000 new registered members to the Community
Re-structured the Community to include (ISC)2 E...
HID Global and (ISC)2 presents our final live webcast of the year -
Halt! Who Goes There? Improving the Intersection of Identity & Security
- December 6, 2018, 1PM Eastern. With the multiple points of access to
an organization, both internal and external,...
Join (ISC)2 and John McCumber, Director of Cybersecurity Advocacy for a
Security Briefings Webinar - "The Workforce Gap Widens: The Need to
Focus on Skills Development" on Tuesday, Nov 20, 2018 at 1PM Eastern.
The 2018 (ISC)² Cybersecurity Workforce Study...
Join (ISC)² on Thursday, Nov 8, 2018 at 1PM Eastern. Email and the Web –
Defending Against Attackers’ Favorite Vectors According to the Verizon
Data Breach Investigations Report 2018, 99% of malware, such as
ransomware, trojans, and RATs, were delivered v...
Security Briefings Webcast Someone in leadership always seems to ask the
question “How can I tie my threat hunting activities to real impacts for
the organization?” Threat hunting programs are encouraged as part of a
mature and successful incident respons...
Imagine what a security analyst could deduce if they had visibility into
all the common applications flowing through their network. They could
optimize the data being sent to security tools, correlate information
across the various protocols to determine ...
(ISC)2 and CSA present Taming the Cloud Together - CCSP & CCSK Cloud
Certification Synergy on Tuesday, June 12, 2018 at 1 PM Eastern. Certain
things go together to make the sum of their parts that much better.
Peanut Butter and Jelly. Lennon and McCartney...
Webcast - Organizational Dynamics of Information Security Positioning
Information Security within the enterprise presents its own set of
challenges. Our recent survey data from hundreds of senior security and
IT leaders like you uncovered a number of syst...
While TLS (formerly known as SSL) has become the de facto way of
encrypting data in motion on networks, it can also hide threats from
your InfoSec team. As the volume of encrypted traffic continues to grow,
organizations become even more vulnerable to enc...
Join us for our next webcast November 16, 2017 at 12:00PM (Noon) Eastern
- Exchanging Cyber Threat Intelligence: There has to be a Better Way.
Today’s increasingly complex and stealthy threats are causing
organizations difficultly in defending against the...