cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog - Page 3

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog - Page 3

AndreaMoore
Community Manager
Community Manager
Help Shape The CCSP Exam
(ISC)² regularly conducts Job Task Analysis (JTA) studies to review and update the content outline (aka exam blueprint) of its credentialing examinations. A JTA is the methodical process used to determine tasks that are performed by credential holders and... view more
1 Comment
5030 Views
AndreaMoore
Community Manager
Community Manager
Overcoming Cybersecurity Professional Stereotypes
The most positive finding of the recently released (ISC)2 2020 Cybersecurity Perception Study is that the stereotype of loners working in dark spaces is disappearing. However, a new one is replacing it and although it’s a more positive crimefighter image,... view more
5 Comments
4696 Views
AndreaMoore
Community Manager
Community Manager
Letter from the Board Chairperson: (ISC)² Names New CEO
My Fellow (ISC)2 Members and Associates, As you know, (ISC)2 announced our CEO succession plan earlier this year, and the Board of Directors began its search for a new leader for our association. I am pleased to share with you that today we announced the ... view more
3 Comments
3946 Views
AndreaMoore
Community Manager
Community Manager
Women in Cybersecurity: Committed to the Mission Despite Prevailing Challenges
Women in the cybersecurity profession are committed to their roles for the long term, according to research data from (ISC)2. They view cybersecurity as a viable, rewarding career and a solid majority of them plan to stay in the profession until retiremen... view more
3 Comments
12557 Views
AndreaMoore
Community Manager
Community Manager
Effective Cybersecurity Requires Communication and Training
If they can find a way to do it, many users will circumvent cybersecurity rules they find inconvenient or time-consuming. It’s something cybersecurity professionals come across all the time – sometimes after damage already has been done. But cybersecurity... view more
0 Comments
1222 Views