Sign In

Sign In here to pay AMFs, submit CPEs, update profile settings, review transactions, and more.



isc2 news collage(ISC)² in the News

(ISC)² is regularly featured in publications around the world. Below is a partial list of articles and publications about (ISC)² and its certification programs. (ISC)² does not guarantee that all links are current and operative, as these articles are time-dated.  

 

2014 Media Highlights 

April

dave lewis town hall

(ISC)² Board of Directors Insight: Chair Wim Remes and Secretary Dave Lewis talk about New Roles

Wim Remes and Dave Lewis spoke to Editor Dan Raywood of IT Security Guru about their new roles as officers on the 2014 (ISC)² Board of Directors and how they're influencing the organization.

• Read the article

 

john colley cover of sc magazine

(ISC)² EMEA's John Colley on Cover of SC Magazine UK

In John Colley's SC Magazine UK cover story "Surety Business," he says that the UK is making strides toward being the safest place to do business online, but that aim is threatened by the shortage of cybersecurity skills.

• Read the article

 

risk clouds

Better Late than Never: 5 Steps to Mitigating XP Risks

The (ISC)² U.S. Government Advisory Board Executive Writers Bureau has published a new article in Government Computer News on the impending end-of-life date for Windows XP. See how government agencies are reacting.

• Read the article

 

March

hord congress 2013(ISC)² is 25 This Year: So What's Ahead for the Organization?  

Listen to (ISC)² Executive Director Hord Tipton's podcast in Careers Info Security to hear about how the organization has changed over the past 25 years and what's ahead. As we celebrate the 25th anniversary of (ISC)², Hord also reflects on how the information security industry has evolved.

Hear the podcast or read the article

 

hospitalHCISPP Steve Person Talks to Health IT Security About Choosing IT Security Products for Hospitals  

While compliance is a baseline minimum, Steve encourages his staff at North Valley Hospital to treat patient data as though it was their own. He explains that choosing the right IT security products is complicated due to the expanding product marketplace, and has a mixed environment like most organizations - hosted, cloud-based, and on-premises solutions.

Read more of Steve's recommendations

 

women infosecurityWhy is the Information Security Industry Struggling to Attract Women?  

(ISC)² Foundation Director Julie Peeler's comments on the struggle to attract more women into the information security industry are featured in the CIO article "Info Sec Industry Still Struggles to Attract Women." Julie says doubling the current percentage of women in the workforce would actually fill the current gap in this industry's workforce as a whole.

Read the article

 

doctor tablet hcisppHCISPPs are CISSPs with Skillsets Built for Healthcare Security

According to a recent report from Burning Glass Technologies, the CISSP is the most in-demand requirement for cybersecurity jobs, especially in federal positions. So how does the demand for CISSPs affect healthcare? For healthcare, HCISPPs are available to meet provider-specific needs.

Read more in the Health IT Security article

 

cyber security awareness month(ISC)² EMEA's Dr. Adrian Davis Says Security can Add Value by Being More Focused on Business

At the CW500 security event titled "The Next Threat Landscape: What to Expect," Dr. Davis spoke about how CISOs need to think beyond the threats and look at their role as part of the business and consider the threat of opportunity. He mentioned that CISOs must prove to the business that they add value and not just protect it, otherwise, they will struggle to get the budget they want.

• Read the full article in Computer Weekly

 

eugene spaffordCall for Nominations for (ISC)² U.S. Government Information Security Leadership Awards (GISLA) Now Open

Nominate an individual or team for an outstanding project or initiative for the 11th annual (ISC)² GISLA program in the one of the following categories by April 11, 2014: Workforce Improvement, Process/Policy Improvement, Technology Improvement, Community Awareness Federal Contractor, Federal Contractor

Nominate a person or team today 

 

passport laptopHow to Keep Your Data Secure While Traveling Abroad  

Executive Writers Bureau (EWB) member Edward Yacabovicz, CISSP, gives advice on keeping your data secure while traveling abroad. Ed outlines a checklist with 24 steps to keep in mind to protect your personal and corporate data, as well as your individual privacy.

• Read the article in Security Magazine

 

adrian davis(1)New (ISC)² EMEA Managing Director Dr. Adrian Davis Publishes Article in Computer Weekly UK 

After last week's appointment of new EMEA MD Dr. Davis, he has published an opinion article in Computer Weekly UK's security think tank titled, "Enterprise adoption of context-based security slow".

• Read the article

 

big data56% of Cyber Jobs in Contracting Industry Require CISSP

The Washington Post published an analysis by Burning Glass Technologies that demonstrates demand for cybersecurity workers in the Washington, D.C. area. The Burning Glass analysis found that 56 percent of cyber jobs in the contracting industry require the CISSP.

Read the article

 

hord rsa award(ISC)² CISSP Named Best Professional Certification Program

Recognized for the fifth time as "Best Professional Certification Program", the (ISC)² CISSP certification continues its reputation as the gold standard for the information security industry. (ISC)² is honored to be recognized by SC Magazine for its efforts to build a stronger security workforce.

• Read the press release

 

career paying off with it certification(ISC)²'s CSSLP, ISSAP, ISSEP listed in Top 20 Tech Certs that are Paying Off

Foote Partners released its latest estimate of pay and premium rates for a range of IT skills, which found that IT professionals with certs continue to see a competitive edge for compensation. Out of the top 20 certs that Foote predicts will increase in value the first half  of 2014, CSSLP is #1, ISSEP #8, and ISSAP #9.

Read the article at ZDNet

 

conference session5 Reasons Security Certifications Matter

The (ISC)² Global Information Security Workforce Study is featured in the InformationWeek article "5 Reasons Security Certification Matters." The study finds sizable increases in the salaries of certified information security professionals when compared to those of their uncertified colleagues.

Read the article at InformationWeek

 

February

scmagazine awards 2014 winner cissp(ISC)² CISSP Named Best Professional Certification Program for 2014 SC Magazine Awards

Recognized for the fifth time as "Best Professional Certification Program", the (ISC)² CISSP certification continues its reputation as the gold standard for the information security industry. (ISC)² is honored to be recognized by SC Magazine for its efforts to build a stronger security workforce.

• Read the press release

 

man at desk(1)(ISC)²’s Dr. Rae Hayward Publishes White Paper on Cultivating the Global Workforce Landscape 

(ISC)² senior manager of Product Development, Dr. Rae Hayward, has published a white paper, "Certification and Education: Cultivating the Global Workforce Landscape". The paper explores the current state of affairs for the information security workforce, mechanisms for success, and a look into the future. This week at the RSA 2014 Conference, Dr. Hayward and other members of the (ISC)² management team will discuss the paper during a panel session.

Download the white paper

 

F Lynn McNultyF. Lynn McNulty, (ISC)² Fellow and Former Colleague, Recognized with RSA Lifetime Achievement Award

F. Lynn McNulty, CISSP, who passed away in June 2012 has been recognized with the one of the highest honors in the world of cybersecurity – The RSA Lifetime Achievement Award. McNulty was considered the pioneer of government information security, having served in a number of critical and high-profile capacities, including as associate director for computer security at the National Institute of Standards and Technology, as the first information systems security director at the U.S. State Department and as director of government affairs for RSA.

• Read the press release

 

Globe Business PeopleSolving the Security Workforce Shortage 

Foundation Director Julie Peeler is quoted in a new Dark Reading article about the information security industry's skills shortage. The article also features the findings of the latest (ISC)² Foundation report on the skills gap. The report finds employers interested in expanding their security staff can't find people to fill the positions. Peeler speaks of the need to expand awareness of the profession to non-techies, women, and students at every level. 

Read the article in Dark Reading
• Download (ISC)² Foundation Skills Gap report 
Learn more about (ISC)² Foundation research

 

csslp eLearning Security CompassSecurity Compass Offers eLearning Course for (ISC)² CSSLP® Certification

(ISC)² and Security Compass have combined their expertise to deliver (ISC)²'s CSSLP curriculum through a convenient eLearning platform. This modern, accessible training option is patterned after the instructor-led experience, but allows candidates the freedom to learn at their own pace.

Learn more/Get the course
Read the press release

 

cybersecurity man 2New (ISC)² GISWS Subreport Reveals Diverse Skill Sets are Essential for InfoSec Pros

According to a new (ISC)² Foundation report, "Critical Times Demand Critical Skills: An analysis of the skills gap in information security," communication skills are the most important factor contributing to the success of an information security professional. The report also analyzes the skills gap by region, industry vertical, and company size to define the specific challenges that contribute to this gap.

Download the report 
Learn more about (ISC)² Foundation research

 

risk cloudsSecurity's Biggest Challenge is the Unknown

John Colley, Managing Director of (ISC)² EMEA, writes of the need for training more and better cybersecurity professionals to deal with the increased complexity and variety of security attacks/breaches. The biggest risk for the information security profession? The "unknown."

Read the blog in ComputerWorldUK

 

white house(ISC)² Applauds NIST Efforts to Develop Framework for Improving Security

Efforts to develop a Cybersecurity Framework were called for under Executive Order 13636, "Improving Critical Infrastructure Cybersecurity," as a means of providing guidance to organizations responsible for managing cyber risks in a critical infrastructure environment. The National Institute of Standards and Technology (NIST) has proposed an approach to managing cybersecurity risk that reemphasizes the growing need for businesses to demand qualified information security professionals.

• Read the press release

 

isc2 executives speaking(ISC)² Executives to Present at RSA US Conference

The (ISC)² leadership team will present on three different panel sessions at the RSA Conference in San Francisco. Don't miss these sessions featuring (ISC)² representatives: "The Future of Security Education", "Right Skills, Right Time, Right Industry: Women in Security", and "Cultivating the Global Workforce Landscape". In addition, we will host a members-only reception and Safe and Secure Online volunteer training session.

• Learn more  

 

SSO Ireland

Safe and Secure Online Programme Launches in Ireland on Safer Internet Day

Schools in Ireland have a new, free resource to call upon to ensure students, teachers, governors, and parents are prepared to take advantage of the Internet securely. The (ISC)² Foundation commemorates Safer Internet Day 2014 by launching the availability of its Safe and Secure Online® programme in Ireland.

• Read the press release

 

capitol buildingNew (ISC)² U.S. Government Advisory Board Executive Writers Bureau Article

U.S. federal government CIOs are facing a security dilemma. Three initiatives intended to improve government IT security have been impacted due to budget challenges: Continuous Diagnostics and Mitigation (CDM), the Federal Risk and Authorization Management Program (FedRAMP), and HSPD-12.

• Read more in the InformationWeek Government article

 

podium povCall for Speakers Open for Second Annual (ISC)² CyberSecureGov Conference

The two-day CyberSecureGov event themed "Vigilence in the Face of Cyber Set-Backs" and held June 2-3 in Arlington, VA, U.S.A., will include both management and technical tracks featuring U.S. government and industry premier speakers. Speaker submissions are being accepted until March 15.

• Submit your proposal

 

hord  speaking podium

(ISC)² Executive Director Hord Tipton Gives Password Security Advice in Wake of Yahoo Breach

In an article on lessons learned from the Yahoo breach, Hord Tipton mentions that diversifying passwords for each account is essential to protecting online information. Potential damage can be compounded by hackers attempting to access multiple accounts once a password is stolen.

• Read more in the eWeek article

 

conference session

Presenters at (ISC)² SecureDusseldorf Event Discuss the True Intention of a Secret

Over 90 security experts met in Dusseldorf on Jan 21 at the (ISC)² SecureDusseldorf event to discuss best practices for corporations to protect against threats. The day concluded with a panel discussion by (ISC)² Germany Chapter President.

Read more (article in German) 

 

cybersecurity man 2(ISC)² and University of South Florida Partner to Offer Certifications through Academic Programs

As part of its new cybersecurity initiative, USF is working with (ISC)² to offer CISSP prep courses and to administer the CISSP exam.

Read more about the partnership
See what USF is doing for cybersecurity education

 

January

Hord Tipton (ISC)2Latest Michael's Breach has (ISC)² Executive Director Hord Tipton Advocating for Secure Payment Transactions

The more big-name companies we see in the news reporting customer credit card information compromises, the more serious the realization that secure payment transactions are vital to both customer trust and company reputation. Michael's is just another retailer victimized by a point of sale breach, further highlighting the need for a higher level of security controls.

Read the full article in Dark Reading

 

cyber security awareness monthWhy is Filling the Cybersecurity Workforce Gap such a Challenge?

(ISC)²'s Executive Director Hord Tipton talks to FCW about the problems with filling the cybersecurity workforce shortage stemming from employers often overlooking entry-level people. In many cases, they're looking for those who can hit the ground running. Fixing the problem won't happen overnight.

Read the full article in FCW

 

tablet child

Are Tablets Portals to Trouble?

On ComputerWorldUK's blog "Infosecurity Voice," (ISC)² EMEA's regional coordinator for Safe and Secure Online voices concern over the widespread use of tablets among children. Should they come with warnings?

Read the blog on ComputerWorldUK
Learn about the Safe and Secure Online program

 

hord podium right(ISC)² Executive Director Hord Tipton Makes Top 10 InfoSec Career Influencer List

Careers Info Security released their first annual list of 10 leaders influencing and shaping information security careers in 2014. Selections include some of the most recognized leaders in promoting infosec careers.

Read the article to see who else made the list 

 

women infosecurity

Women - The New Face of Information Security

A report titled "Agents of Change: Women in the Information Security Profession" compiled by Frost & Sullivan and the (ISC)² Foundation reveals an industry in transition and the leadership role women are poised to take in that change.  

Read the article in Baseline 
Download the report

 

hord congress 2013(ISC)² Executive Director Says Human Defences Hold the Key to Cybersecurity in 2014

Hord Tipton gives his industry predictions for 2014, including what he feels will turn the tide in the cybersecurity war. Will a new emphasis this year help us avoid the game changing data breaches that occured last year?

Read the blog in Computerworld UK

 

foundation scholarship winner(ISC)² Foundation is Now Accepting Applications for 2014 Scholarships

The application period for the 2014 information security scholarship offerings from the (ISC)² Foundation is now open. The Foundation offers graduate and undergraduate scholarships, including awards for women and veterans.

Apply today

 

Hord Tipton Speaking(ISC)² Executive Director Hord Tipton Comments on the Target Breach

Hord Tipton raises the question of PCI-compliance in the massive Target breach incident. Once the investigation is complete, will the smoking gun be a matter of non-compliance or compliant and therefore, require revisions to PCI compliance guidelines?

• Read more of Tipton's thoughts in the full Dark Reading article  
• Check out Tipton's industry predictions for 2014   

 

security congress speaker

(ISC)² Security Congress Call for Speakers is Now Open

The Call for Speakers for the 4th Annual (ISC)² Security Congress is now open through February 10, 2014. Security Congress is colocated with ASIS International, and more than 20,000 professionals worldwide from both the traditional and information security disciplines are anticipated to attend.

Get more information

 

tipton scholarship winner

(ISC)² Foundation Names 2013 Harold F. Tipton Memorial Scholarship Recipient

Congratulations to Christopher Goes, undergraduate student at the University of Idaho, on receiving this year's Harold F Tipton Memorial Scholarship. Along with Christopher's passion for information security and outstanding academic record, he also authored a white paper on the need for Internet safety education and the importance of educating children.

 Read the press release
• Learn more about (ISC)² Scholarships

 

See past years archive orange arrow small