As an (ISC)2 member or a practitioner considering certification or membership, wouldn't you like to have the ability to interact with an (ISC)2 Board Member, Director or Manager to ask questions or discover what's being worked on within the organization that will benefit the members or the industry in general? Our new webinar series, Inside (ISC)2 will feature various key personnel within the organization interacting with and answering questions from members and non-members alike in a moderated webcast setting. This is chance to find out, first hand, what's going at (ISC)2 and ask your questions of the key people making decisions at the organization. First up, join us on May 28, 2015 at 1:00PM as David Shearer, Executive Director, stops by to answer your questions.Read more >
Every two years, (ISC)2 surveys infosecurity practitioners from around the world about the profile of the global information security workforce. This year, over 12,000 professionals from 135+ countries responded to the survey to provide invaluable insight about their careers, positions and organizations. Join Julie Peeler, (ISC)2 Foundation Director and other industry experts on April 30, 2015 at 1:00pm Eastern for an examination and discussion of the survey results, gain insight into what hiring managers and looking for in job candidates, the areas of expertise in demand and the challenges facing infosec pros around the world.Read more >
(ISC)2 will hold its 3rd Annual Security Congress at the Annual ASIS Conference this September in Chicago, IL. This year’s conference promises to be bigger and better as it brings together thought leaders in traditional and information security for three days of educational sessions and an exhibit floor featuring over 350 solution providers. Join (ISC)2 and several of the conference speakers who’ll be presenting at the Security Congress on August 21, 2013 at 1:00pm Eastern as we discuss their sessions, get a preview of what will be discussed at the event and examine some of the “hot button” issues facing security practitioners today.Read more >
As a truly global organization, (ISC)2 membership stretches to over 110,000 members in over 160 countries. To help serve the needs of the membership, (ISC)2 has regional offices to oversee the operations and efforts in North America (NA), Asia-Pacific (APAC), Europe, Middle East, & Africa (EMEA) and Latam America (Latam). These offices are managed by regional directors with their own teams to offer regional support and resources and to be the voice of the region. On January 28, 2016 at 1:00PM Eastern you'll have the opportunity to discover what's going on in each of these regions as we gather our three Regional Directors Dan Waddell (NA), Clayton Jones (APAC), Adrian Davis (EMEA) and Gina Van Dijk (Latam) for a view into what they have planned for 2016.Read more >
Research has shown that organisations typically have 3-4 times as many privileged accounts as employees. What all of these accounts have in common is that they act as a gateway to an organisation's most sensitive data. Unfortunately, the management and monitoring of privileged accounts is not a key priority in many organisations due to their other seemingly more critical aspects of running an organisation.
Join CyberArk and (ISC)2 on Thursday, Nov 26, 2015 at 2:00PM (GMT+8) as Mr Z. H. Tan will deconstruct recent attacks to demonstrate how the commonly traveled "privileged pathway" is a fast pass to your organisation's most sensitive data or operations, whether on-premise or in the cloud. Traditionally thought of as a vulnerability for insider-based attacks only, privileged accounts are increasingly being used by cyber attackers to perpetrate some of the most devastating advanced attacks.
While the economics of moving workloads to the cloud is well understood by small and medium sized businesses (SMBs), they often struggle with corresponding economics associated with these changes in security challenges. These SMBs often rely on service providers and suppliers for security, but how can they take control or have more of a hand in the security of the cloud services they are using? Join (ISC)2 and our sponsor Sophos on June 25, 2015 for our next From the Trenches where we’ll discuss cloud security and challenges SMBs face when leveraging cloud services.Read more >
Cybersecurity is a mess. The number of guides, standards, laws, rules, and regulations grows every day, and most organisations don’t have the ability or the resources to handle the continuously changing (and expanding) set of requirement:
In this webinar run jointly by (ISC)2 and Unified Compliance, you will learn
· How to efficiently manage complex compliance requirements by creating customised control sets and compliance templates in seconds
· What harmonisation of compliance across multiple regulations, standards & frameworks looks like—including Sarbanes Oxley to FFIEC, PCI, GLBA and HIPAA to CMS, NERC, NIST, and ISO among others
· How to understand and clarify overlaps and conflicts between documents in your regulatory requirements
· How to save time and eliminate duplicate efforts by asserting compliance across multiple authority documents simultaneously
Taking this new approach will save organisations considerable time, effort, and resources when it comes to audit and cybersecurity compliance. More importantly, this will improve the efficiency and effectiveness of their overall Governance, Risk Management, and Compliance programs.
Join IBM and (ISC)2 to learn about the latest Cost of a Data Breach study and discuss the implications of the study for today's businesses.
In this live webinar, you will learn the key findings of the Cost of a Data Breach study, including:
-Major factors that affect the financial consequences of a data breach
-How companies changed their operations and compliance following a breach
-Most common cybersecurity governance challenges
-Why companies failed to stop data breaches
Osterman Research and (ISC)2 recently conducted a survey of individuals in mid-sized and large organizations on how they choose off-the-shelf applications, how they develop custom applications, and how they select third-party application developers. Join (ISC)², Michael Osterman and a panel of experts for a discussion about the findings from the survey and the state of software development quality on Tuesday, April 7th at 1:00pm Eastern. Attendees will also have the opportunity to download the entire survey report.Read more >
Moving to the cloud is always a difficult decision, but when you look at the impact of solutions as broad reaching as Office 365, chances are your primary concern is going to be about security. There are a number of facets and features (e-mail, OneDrive, Lync) to Office 365 and the security issues can be myriad. Join Intel Security and (ISC)2 on May 7, 2015 at 1:00PM Eastern for a discussion on how to overcome these challenges through critical protection and often overlooked best practices to build the confidence you need to securely deploy Office 365.Read more >
The threats continue to multiply and morph on a daily basis, meaning that today's organizations need to be just as nimble in their efforts to defend against these new menaces. New threats need new approaches to meet them head on. Collaborative solutions that provide for a holistic view across the organization and up the technology stack are critical. Join (ISC)2 and McAfee on December 4, 2014 at 1:00PM Eastern as we have a discussion about Next Generation Threats and the Solutions we can field to respond to them.Read more >
Whether you are implementing a SIEM solution for the first time or you are “ripping and replacing” with something newer, it’s crucial to prepare the organization and infrastructure for what you have in mind. Once the solution has been installed, optimizing it for threat detection and alert output will be critical to your project's success. Join (ISC)2 and McAfee on October 16, 2014 at 1:00PM Eastern for a discussion about SIEM, including the preparation for a SIEM rollout and tips on using it to get ahead of the threats.Read more >
I used to be a security professional, but even my boss didn’t remember my name. My brilliant ideas weren’t listened to, I was never invited to speak at conferences and not even my mother visited my blog." In this talk, we've distilled the key skills and traits taken from personal experience as well as industry professionals to present strategies you can employ to increase your stock internally within an organization as well as within the industry. Simply being hard working and skilled in your job is not enough.Read more >
The biggest challenge in security is no longer technology. We need to rise from recognition as security experts and experts within security teams to leaders protecting information from a world of risk and vulnerabilities.
Michael Santarcangelo cracked the code on the pathway to becoming an exceptional security leader. On July 30, 2015 at 1:00PM Eastern Michael will share the Exceptional IT Leadership Framework, including the 5 foundational elements, 9 competencies, and 5 essential habits. The webcast will explore the benefits of a framework-based, competency-driven approach to developing your leadership and how to assess where you really are in your leadership journey.
Security and risk professionals are increasingly turning to risk-based authentication as an alternative to other authentication solutions. Usability, ease of deployment, and the ability to work well on mobile devices are just some of the reasons driving the adoption of risk-based authentication in the enterprise. But even more important, rapid advances in cyber threats - from phishing to session hijacking - call for a new risk-based approach that allows for continuous learning of the environment and the user and enables authentication and access controls to be adjusted in real-time. Join (ISC2)2 and RSA on January 17, 2013 at 1:00pm Eastern for a discussion on risk, authentication and access control.Read more >
It seems that all organizations are talking about these days is "Big Data". As security professionals, we all know that there are challenges in securing it, making it appropriately accessible and classifying the growing mountains of data. How do organizations deal with these issues, as well as adding the appropriate controls for identity and access to limit the disclosure and leakage of sensitive data. Join (ISC)2 and CA Technologies on December 20, 2012 at 1pm Eastern as we present the final part of our Security Briefings series on Identity and Access Management.Read more >
(ISC)2 will have its 2nd Annual Security Congress at the Annual ASIS Conference this September in Philadelphia, PA. This conference brings together thought leaders in traditional and information security for three days of educational sessions and an exhibit floor featuring over 350 solution providers. Join (ISC)2 and several of the conference speakers who’ll be presenting at the Security Congress On August 23, 2012 at 1:00pm Eastern as we preview their sessions, get a preview of what will be discussed at the event and examine some of the “hot button” issues facing security practitioners today.Read more >
Despite facing an ever-growing number of cyber-threats targeting highly sensitive and valuable information, many organizations fail to establish a last line of defense for their business-critical databases without compromising performance for threat protection. Join security experts from (ISC)2 and McAfee on August 16, 2012 at 1:00pm Eastern time for a discussion on how the right database security strategy and posture can help organizations of all sizes and types achieve robust security, continuous compliance, and optimal security management costs and practices.Read more >
As security practitioners, we have an enormous amount of raw data at our fingertips. Technology has come a long way in compiling and helping us manage vast sums of log data that is collected, but we haven't met the
technology halfway and we often don't understand what the information is trying to tell us. The problem isn't in finding the needle in the proverbial
haystack, but how to choose from the whole haystack of needles the ones that matter most.
Join (ISC)2 and HP Enterprise Security on January 25, 2012 at 1:00pm
Eastern as we discuss how to cultivate the threat intelligence we need to
shift our defenses against the evolving adversary.
Join this unique roundtable chat with three InfoSec Professionals who have recently climbed the BYOD mountain and come back down to share their stories. We’ll discuss the industry and regulatory differences, managing user expectations of privacy, legal implications and technical pitfalls in this 60 minute Security Leadership Series webinar, brought to you on April 10, 2014 at 1PM Eastern in partnership with Capella University.Read more >
(ISC)2 will debut its inaugural Security Congress at the Annual ASIS Conference this September in Orlando, FL. This conference brings together thought leaders in traditional and information security for three days of educational sessions and an exhibit floor featuring over 350 solution providers. Join (ISC)2 and several of the conference speakers who’ll be presenting at the Security Congress On August 25, 2011 at 12:00pm Noon Eastern as we preview their sessions, get an idea of what will be discussed and examine some of the “hot button” issues facing security practitioners today.Read more >
During WWII, the saying “Loose Lips Sink Ships” was critical to maintaining our advantage over the enemy. Nearly 70 years later, it is making a come back. You can learn a tremendous amount of confidential information just by overhearing a cell phone conversation or glancing over the shoulder of a mobile user at a coffee shop or in an airport. This problem gets minimal attention; overshadowed by the deeply technical threats that enamor security professionals. Join (ISC)2 and 3M on May 26, 2011 at 12:00pm (Noon) Eastern time as we discuss topics such as visual privacy, social engineering and unintentional data loss. Learn how common sense and low-tech solutions can help solve the problem.Read more >
Just as the threats are becoming increasingly complex, so are our own enterprise needs. Today’s security managers need the right tools to respond effectively to these new requirements and the rapid growth and distribution of data. An integrated view of information security across the enterprise and the valuable business context associated with risk is paramount to our future success. We need to be able to see more, act faster and spend less on security management.
Join (ISC)2, and RSA, The Security Division of EMC, on Thursday, March 10, 2011 when will discuss how organizations can develop a more integrated, streamlined and business-aligned approach to managing information security risk and compliance.