UPDATED: June 2018
The mission of this online community is to provide a shared space where (ISC)² members, cyber experts, and IT security professionals can go to connect, collaborate, share knowledge, and develop the best practices required to manage the ever-evolving needs and interests of the cyber industry.
The (ISC)² Community welcomes everyone with an interest in cyber, information, software and infrastructure security. It is important that you observe these community rules:
Discussing (ISC)² Examination questions, answers and responses with other individuals is a violation of the (ISC)² Examination Non-Disclosure Agreement that is signed prior to taking an (ISC)² examination. Any posts related to this will be removed.
Please do not share personal information. If someone asks you for personal information, do not post it. Personal information may include things like your home address, full name, credit card numbers, social security numbers, email address, etc. In addition, please do not request the personal information of other users. If you would like to exchange personal information with a Community member that you know and trust, please feel free to do so using the Private Message function.
Lengthy posts can be a bit intimidating on a forum and might discourage people from reading. Summarize your thoughts or question into a short paragraph with a few points to start a discussion within the community. When reposting information from a blog, contributed article, or other information, provide a brief overview and include a link to the original source.
If you notice any content that violates these guidelines, please use the menu of the top right of a post, then select “Report Inappropriate Content” from the bottom of the menu and it will be reviewed by a Community team member.
(ISC)² employees will be properly marked by a lime green icon containing the word “(ISC)²". These are members of the Community who will share their knowledge and expertise on (ISC)² products and services.
This Community is monitored by (ISC)2 Administrators and Moderators, who are labeled appropriately within the Community. Posts may be edited, including deleting of content, or completely removed if they violate any of these guidelines. Community users who violate these guidelines may also be subject to further action up to and including a temporary suspension or permanent ban from the Community.
If you have any questions about the community or are unsure about any of these guidelines, please feel free to reach out to anyone with the ADMIN (Administrator) or MOD (Moderator) tag next to their username, or email firstname.lastname@example.org.
UPDATED: June 2018
I cannot stress enough the no solicitation and no advertisement rules. I am looking forward to an active discussion on all topics IT Security that should be geared towards learning from each other and not trying to sell a product or service.
@isc2jadeand @SamanthaO_isc2, I've noticed that members often create posts without doing a search on the community --- in many cases, other posts have already discussed their matter and provided solutions.
I would suggest adding a section to the guidelines, recommending that members perform a search to find items that may relate to their queries / concerns / updates / news, before they post the same anywhere.
(Alternatively, they could turn on the feature to enable suggestions when typing a subject, but if the subject being typed isn't relevant to the post, this won't do any good)