Looking back at the week that was, ISC2 Insights took a closer look at the content you can experience at ISC2 Security Congress, free courses to bolster your knowledge and earn CPE credits, and ISC2 members shared their experiences around digital trust and the impact of insider threats on security strategy.

Governance, Risk and Compliance at ISC2 Security Congress 2024

At ISC2 Security Congress 2024, you’ll have the opportunity to explore the latest GRC trends, technologies and best practices, including sessions on core principles, deepfakes and navigating third-party risk management. We pulled out some of the GRC-related talks from our agenda, being delivered by ISC2 members alongside industry experts and end-user case studies.

Free Linux Foundation Courses for Cybersecurity Beginners

Announced in 2023, ISC2 and the Linux Foundation, together with Linux’s Open Source Security Foundation (OpenSSF) have partnered to fortify the open-source cybersecurity landscape. As global leaders in cybersecurity training and open-source software development, the collaboration is set to transform the security of enterprise software development and lifecycle management for open-source code worldwide. If you’re an ISC2-certified member, or an Associate of ISC2, you can also submit these courses via the CPE portal to earn credits for continuing your education.

ISC2 Security Congress 2024: Artificial Intelligence, Your Sneak Peek

ISC2 Security Congress 2024With ISC2 Security Congress 2024 just over two months away, we have produced sneak peek webinars on several of our popular topics, starting with all things AI. Hear about what you can expect from three of our Congress session presenters as they look closer at AI strategy, risk and deepfake threats. Once you've enjoyed this sneak peek webinar, be sure to register for the next webinar, focused on Cloud Security at Security Congress, coming up August 22.

Insider Threats and Prevention Strategies

Kaushal Perera, CISSPCybersecurity challenges are not exclusive to external threat sources. As organizations rely ever more heavily on digital systems to store and manage sensitive data, the corresponding risk of security breaches looms larger than ever. While threats from external sources are often the focus of security measures, it's crucial not to overlook the dangers posed by insiders with various levels of access to internal networks, applications, and data. Kaushal Perera, CISSP shared some of his advice and first-hand experience in addressing this challenge and his approach to developing a strategic approach to insider threats, intentional or otherwise.

Maintaining Digital Trust with Cloud-Centric Environments

If a colleague approached you and said: “Let’s talk about cybersecurity”, what would you end up talking about? Ransomware, probably, or the latest hack on a well-known company or government agency. Maybe supply chain risk, because that has become a critical concern in the last couple of years. Or, perhaps, global software updates going wrong. However, if the same person said: “We need to talk about digital trust”? What would you say? Recent software reliability and cloud availability incidents events have put digital trust back in the spotlight for organizations reliant on cloud services and cloud-based updating. We took a closer look at the issue for our bi-monthly Cloud Insights newsletter.