New Cybersecurity Reports Point to Increased Need for Retraining and Vulnerability Management

By now you’re well aware of the widely-reported (ISC)² research that shows there is a global cybersecurity shortage of 2.93 million professionals. Identifying, recruiting and training skilled talent to adequately secure organizational data assets obviously remains a top priority in our industry. Well, over the past few weeks, both Tripwire and IBM have published reports that focus on different layers of the problem and add to the conversation. In its Cybersecurity Skills Gap Survey 2019, Tripwire found that 80% of IT security professionals believe it’s becoming more difficult to find skilled cybersecurity professionals. Not a surprising figure. The interesting wrinkle…

CISSP Recognized as Top Cybersecurity Certification Program by SC Media

Winner, winner, chicken dinner. That’s what was on the menu for (ISC)² at this week’s SC Awards gala event held in San Francisco, where the CISSP was recognized as the industry’s Best Professional Certification Program for 2019 by SC Media, which is coincidentally celebrating its 30th anniversary in the same year as (ISC)². The SC Awards are recognized throughout the cybersecurity industry as the crowning achievement for IT security, and winners are run through a rigorous judging process that includes testimonials, industry assessments and additional research. The CISSP was hand-picked by a panel of judges for its advancements in cybersecurity…

Software Licensing & Import/Export Law

As a Security professionals should also be familiar with the legal issues surrounding software licensing agreements. There are four main types of License Agreement in use today. Refer to below mindmap for details. Also, Import/Export law will help company to control their Information across multiple countries. Case Study: Below case study will help us to … Continue reading “Software Licensing & Import/Export Law”

Privacy Law

Privacy is becoming more threatened as the all of us increasingly relies on computing technology & Digital content. There are several approaches/laws government has taken to addressing privacy issues. Below figure illustrate the U.S. & Eu…

Laws, Regulations, Compliance

Every country follows some kind of Legal system. Below figure shows different types of Legal system. Since CISSP discuss more on U.S. Laws and Regulation; hence we will restrict our-self to U.S. only. We can observe that U.S. follow “Common Legal System”. As a IT professional / Security professional; we understand that Laws and regulations … Continue reading “Laws, Regulations, Compliance”

Personnel Security

So, Who is the Weakest element in Security Realm – “Human” Who is biggest culprit in Security Realm – “Human” No matter what controls have been deployed in any environment; Human will always discover a way to avoid/circumvent/disable it. Image a situation if that Human belongs to your own organization i.e. Employee. In such case; … Continue reading “Personnel Security”

(ISC)² Member Spotlight: Jasmine Rodriguez

Name: Jasmine Rodriguez Title: Managed Services Engineer Employer: KnowBe4 Location: Clearwater, FL Education: BA, Psychology from San Diego State University and Masters, Education from Vanderbilt University Years in IT: 3 Years in cybersecurity: 2 Cybersecurity certifications: SSCP, Associate of (ISC)², Security+, CEH How did you decide upon a career in cybersecurity? I found my way into the cybersecurity field a couple years after entering the workforce. I always had a passion for technology. My entry point was in a Network Operations Center where I soaked in knowledge quickly. How did you decide to pursue your CISSP? I utilized self-study materials…