cancel
Showing results for 
Search instead for 
Did you mean: 

(ISC)² Updates

cancel
Showing results for 
Search instead for 
Did you mean: 

(ISC)² Updates

(ISC)² Team
(ISC)² Team
(ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learnin... read more
3 Comments
907 Views
(ISC)² Team
(ISC)² Team
(ISC)2 Think Tank Webinar Smelling the Roses at 100Gb - Security Tooling at the Speed of LifeFerris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” With complex data flows now reaching ... read more
0 Comments
163 Views
(ISC)² Team
(ISC)² Team
Upcoming (ISC)2 webinar. Earn 1 CPE. Detecting & Preventing Threat Evasions Techniques – 2019 And BeyondCyber-attacks and the threat actors behind them are becoming more and more sophisticated. Today’s attackers adopt existing techniques, modify them and ... read more
0 Comments
235 Views
(ISC)² Team
(ISC)² Team
CAP Certification Holders: We Want to Hear Your Story
(ISC)2 is looking for members holding the CAP certification to tell us a little about how this certification impacted their career. We’d love to hear from you about your experience with this certification. With your permission, selected responses may be c... read more
0 Kudos
0 Comments
283 Views
(ISC)² Team
(ISC)² Team
Scam and Phishing emails continue to put organizations of all sizes at risk. A favored vector of attack is the use of a malicious Office document attachment or PDFs to gain a foothold into a targeted system. These types of threats can put account credenti... read more
0 Kudos
0 Comments
155 Views
(ISC)² Team
(ISC)² Team
Join Cofense and (ISC)2 for the first Think Tank webcast of the year on Thursday, Jan 17, 2019 at 1PM Eastern for "Employing Users as Your Quality Control". Process automation delivers a lot of promises. A car can be assembled in less than a day and veget... read more
0 Kudos
0 Comments
195 Views
ToniHahn
Newcomer III
CISSP-ISSAP Members: Your Feedback is Requested
(ISC)² regularly conducts Job Task Analysis (JTA) studies to review and update the content outline of its credentialing examinations. A JTA is the methodical process used to determine tasks that are performed by credential holders and knowledge and skills... read more
0 Kudos
1 Comment
416 Views
Community Manager
Community Manager
Happy New Year - 2019!
Happy New Year! We want to thank all of you for a great 2018. 2018 was a great year for the Community, take a look at some of our highlights below: Welcomed over 6,000 new registered members to the Community Re-structured the Community to include (ISC)2 E... read more
1 Comment
360 Views
(ISC)² Team
(ISC)² Team
HID Global and (ISC)2 presents our final live webcast of the year - Halt! Who Goes There? Improving the Intersection of Identity & Security - December 6, 2018, 1PM Eastern. With the multiple points of access to an organization, both internal and external,... read more
0 Kudos
0 Comments
199 Views
(ISC)² Team
(ISC)² Team
Join (ISC)2 and John McCumber, Director of Cybersecurity Advocacy for a Security Briefings Webinar - "The Workforce Gap Widens: The Need to Focus on Skills Development" on Tuesday, Nov 20, 2018 at 1PM Eastern. The 2018 (ISC)² Cybersecurity Workforce Study... read more
0 Comments
204 Views
(ISC)² Team
(ISC)² Team
Join (ISC)² on Thursday, Nov 8, 2018 at 1PM Eastern. Email and the Web – Defending Against Attackers’ Favorite Vectors According to the Verizon Data Breach Investigations Report 2018, 99% of malware, such as ransomware, trojans, and RATs, were delivered v... read more
0 Comments
213 Views
(ISC)² Team
(ISC)² Team
Security Briefings Webcast Someone in leadership always seems to ask the question “How can I tie my threat hunting activities to real impacts for the organization?” Threat hunting programs are encouraged as part of a mature and successful incident respons... read more
0 Kudos
0 Comments
195 Views
(ISC)² Team
(ISC)² Team
July/August 2018 Issue of  Infosecurity Professional
Making available to the community the July/August 2018 issue of Infosecurity Professional (PDF of the Issue can be downloaded below) read more
0 Comments
339 Views
(ISC)² Team
(ISC)² Team
May/June 2018 Issue of Infosecurity Professional Magazine
I'm pleased to make the May/June issue of Infosecurity Professional Magazine available for download to the members of the (ISC)2 Community. File can be download be downloaded below. read more
0 Kudos
2 Comments
1124 Views
(ISC)² Team
(ISC)² Team
Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine ... read more
3 Comments
848 Views
(ISC)² Team
(ISC)² Team
(ISC)2 and CSA present Taming the Cloud Together - CCSP & CCSK Cloud Certification Synergy on Tuesday, June 12, 2018 at 1 PM Eastern. Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney... read more
0 Comments
341 Views
(ISC)² Team
(ISC)² Team
Webcast - Organizational Dynamics of Information Security Positioning Information Security within the enterprise presents its own set of challenges. Our recent survey data from hundreds of senior security and IT leaders like you uncovered a number of syst... read more
0 Kudos
0 Comments
227 Views
(ISC)² Team
(ISC)² Team
While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to enc... read more
0 Comments
227 Views
(ISC)² Team
(ISC)² Team
Jan/Feb 2018 Issue of Infosecurity Professional Available Here
I'm pleased to make the Jan/Feb edition of Infosecurity Professional Magazine available to everyone to download. Download with the link below! read more
2 Comments
723 Views
(ISC)² Team
(ISC)² Team
Join us for our next webcast November 16, 2017 at 12:00PM (Noon) Eastern - Exchanging Cyber Threat Intelligence: There has to be a Better Way. Today’s increasingly complex and stealthy threats are causing organizations difficultly in defending against the... read more
0 Comments
697 Views