Meet the newest members of your association membership management team as David Shearer, (ISC)2 CEO interviews Patrick Craven the new Director for the Center for Cyber Safety and Education (formally (ISC)2 Foundation and Dan Waddell the newest (ISC)2 Managing Director for the North America region. This was originally held on September 11, 2016. (NOTE: Due to length of presentation, this video DOES NOT qualify for a CPE)Read more >
As an (ISC)2 member or a practitioner considering certification or membership, wouldn't you like to have the ability to interact with an (ISC)2 Board Member, Director or Manager to ask questions or discover what's being worked on within the organization that will benefit the members or the industry in general? Our new webinar series, Inside (ISC)2 will feature various key personnel within the organization interacting with and answering questions from members and non-members alike in a moderated webcast setting. This is chance to find out, first hand, what's going at (ISC)2 and ask your questions of the key people making decisions at the organization. First up, join us on May 28, 2015 at 1:00PM as David Shearer, Executive Director, stops by to answer your questions.Read more >
Every two years, (ISC)2 surveys infosecurity practitioners from around the world about the profile of the global information security workforce. This year, over 12,000 professionals from 135+ countries responded to the survey to provide invaluable insight about their careers, positions and organizations. Join Julie Peeler, (ISC)2 Foundation Director and other industry experts on April 30, 2015 at 1:00pm Eastern for an examination and discussion of the survey results, gain insight into what hiring managers and looking for in job candidates, the areas of expertise in demand and the challenges facing infosec pros around the world.Read more >
(ISC)2 will hold its 3rd Annual Security Congress at the Annual ASIS Conference this September in Chicago, IL. This year’s conference promises to be bigger and better as it brings together thought leaders in traditional and information security for three days of educational sessions and an exhibit floor featuring over 350 solution providers. Join (ISC)2 and several of the conference speakers who’ll be presenting at the Security Congress on August 21, 2013 at 1:00pm Eastern as we discuss their sessions, get a preview of what will be discussed at the event and examine some of the “hot button” issues facing security practitioners today.Read more >
Cloud apps offer several advantages over premises-based apps, from lower costs to easy deployment. In fact, 59% of organizations have already deployed apps like Office 365, Box, and Salesforce. As data moves to the cloud, security is of utmost importance. On April 6, 2017 at 1:00PM Eastern, join Bitglass and (ISC)2 for Part 2 of our Briefings series where we will discuss security threats such as external sharing, compromised credentials, lost/stolen devices and how you can best mitigate these threats. Learn how Cloud Access Security Brokers (CASBs) can provide end-to-end data protection, in the cloud and on any device.Read more >
Over 1,500 attended the 2016 Security Congress in Orlando, FL. This year’s Congress advanced security leaders with an exciting week packed full of education, networking, vendor solutions, and fun. Take a look into the week at #ISC2Congress to see what it’s all about! Save the date for 2017 Security Congress – September 25 – 25, 2017 – Austin, TX.
(ISC)² Website: https://www.isc2.org
© Copyright 1996-2016. (ISC)², Inc. All rights reserved.
Access to and within DevOps environments have proliferated over the past few years, with both users and scripts (with embedded credentials). This privileged identity sprawl poses significant risks that need to be addressed.Join CA Technologies and (ISC)2 on December 7, 2017 at 1:00PM Eastern. In this session, we'll look at the technology and approach that CA takes to secure such environments.Read more >
Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.Read more >
Hear from your association membership from a panel made up of (ISC)2 executive management, senior staff and board members addressing members inquires at the 2016 Security Congress Town Hall session. This was originally held on September 11, 2016.Read more >
If it bleeds, it leads and the headlines these days indicate that more and more companies are succumbing to ransomware. A user clicks the wrong link and the next thing you know, you’re your data is being held hostage...for a price. It leads to nonproductive downtime, tests the limits of your back-up strategy, and saps your bottom line. How do you combat a threat like ransomware? Do you pay up? Join Imperva and (ISC)2 on November 10, 2016 at 1:00PM Eastern for a discussion on ransomware, its impact and how organizations should respond.Read more >
The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.Read more >
The General Data Protection Regulation (GDPR) is being instituted to improve data protection and privacy for individuals in the European Union (EU). Additionally, it addresses the export of data outside the EU, which will impact all multi-national businesses operating in the EU. Almost 3/4 of US Privacy professional believe that this is the most significate change to privacy regulations in the last 20 years. What should an organization be doing now to prepare for this new regulation to avoid non-compliance, fines and increased spending? Join Oracle and (ISC)2 on April 14, 2016 at 1:00PM Eastern for a discussion on this new regulation and how your organization could be impacted.Read more >
In today’s complex security landscape, networks are getting larger and more complicated, creating myriad holes in defenses, while cyberattacks are increasing in sophistication and persistence. CISOs are challenged to centralize security and gain visibility over the attack surface, the ways in which their IT systems are vulnerable to threats, including potential attack vectors.
According to a 2015 Gartner report1, enterprises are shifting security budgets to security management platforms that integrate existing technologies, unify data from multiple vendors, provide greater insight through advanced analytics and enable security operations teams to automate and prioritize activities.
Register today to learn how to:
* Visualize and analyze your attack surface with an interactive model that links network topology, network connections, business units and organizational hierarchy
* Categorize Indicators of Exposure (IOEs), rank the severity of those IOEs and display the data in a format understandable to both technical and business-oriented viewers
* Drill down with interactive tools to get quick summaries of actionable intelligence; pinpoint and protect the systems most vulnerable to threats
* Systematically manage and reduce the attack surface by allocating security resources to where they are most needed
1 Gartner Innovation Tech Insight for Security Operations, Analytics and Reporting, Oliver Rochford and Paul E. Proctor. November 11, 2015.
Join Skybox Security and (ISC)2 on April 12, 2016 at 1PM (GMT+8; Hong Kong, Singapore, Beijing) for a discussion on this topic.
As a truly global organization, (ISC)2 membership stretches to over 110,000 members in over 160 countries. To help serve the needs of the membership, (ISC)2 has regional offices to oversee the operations and efforts in North America (NA), Asia-Pacific (APAC), Europe, Middle East, & Africa (EMEA) and Latam America (Latam). These offices are managed by regional directors with their own teams to offer regional support and resources and to be the voice of the region. On January 28, 2016 at 1:00PM Eastern you'll have the opportunity to discover what's going on in each of these regions as we gather our three Regional Directors Dan Waddell (NA), Clayton Jones (APAC), Adrian Davis (EMEA) and Gina Van Dijk (Latam) for a view into what they have planned for 2016.Read more >
Research has shown that organisations typically have 3-4 times as many privileged accounts as employees. What all of these accounts have in common is that they act as a gateway to an organisation's most sensitive data. Unfortunately, the management and monitoring of privileged accounts is not a key priority in many organisations due to their other seemingly more critical aspects of running an organisation.
Join CyberArk and (ISC)2 on Thursday, Nov 26, 2015 at 2:00PM (GMT+8) as Mr Z. H. Tan will deconstruct recent attacks to demonstrate how the commonly traveled "privileged pathway" is a fast pass to your organisation's most sensitive data or operations, whether on-premise or in the cloud. Traditionally thought of as a vulnerability for insider-based attacks only, privileged accounts are increasingly being used by cyber attackers to perpetrate some of the most devastating advanced attacks.
See how InfoSecurity professionals react when asked what their password is at (ISC)² Security Congress.Read more >
Cybersecurity is a mess. The number of guides, standards, laws, rules, and regulations grows every day, and most organisations don’t have the ability or the resources to handle the continuously changing (and expanding) set of requirement:
In this webinar run jointly by (ISC)2 and Unified Compliance, you will learn
· How to efficiently manage complex compliance requirements by creating customised control sets and compliance templates in seconds
· What harmonisation of compliance across multiple regulations, standards & frameworks looks like—including Sarbanes Oxley to FFIEC, PCI, GLBA and HIPAA to CMS, NERC, NIST, and ISO among others
· How to understand and clarify overlaps and conflicts between documents in your regulatory requirements
· How to save time and eliminate duplicate efforts by asserting compliance across multiple authority documents simultaneously
Taking this new approach will save organisations considerable time, effort, and resources when it comes to audit and cybersecurity compliance. More importantly, this will improve the efficiency and effectiveness of their overall Governance, Risk Management, and Compliance programs.
Join IBM and (ISC)2 to learn about the latest Cost of a Data Breach study and discuss the implications of the study for today's businesses.
In this live webinar, you will learn the key findings of the Cost of a Data Breach study, including:
-Major factors that affect the financial consequences of a data breach
-How companies changed their operations and compliance following a breach
-Most common cybersecurity governance challenges
-Why companies failed to stop data breaches
While the economics of moving workloads to the cloud is well understood by small and medium sized businesses (SMBs), they often struggle with corresponding economics associated with these changes in security challenges. These SMBs often rely on service providers and suppliers for security, but how can they take control or have more of a hand in the security of the cloud services they are using? Join (ISC)2 and our sponsor Sophos on June 25, 2015 for our next From the Trenches where we’ll discuss cloud security and challenges SMBs face when leveraging cloud services.Read more >
Osterman Research and (ISC)2 recently conducted a survey of individuals in mid-sized and large organizations on how they choose off-the-shelf applications, how they develop custom applications, and how they select third-party application developers. Join (ISC)², Michael Osterman and a panel of experts for a discussion about the findings from the survey and the state of software development quality on Tuesday, April 7th at 1:00pm Eastern. Attendees will also have the opportunity to download the entire survey report.Read more >
Moving to the cloud is always a difficult decision, but when you look at the impact of solutions as broad reaching as Office 365, chances are your primary concern is going to be about security. There are a number of facets and features (e-mail, OneDrive, Lync) to Office 365 and the security issues can be myriad. Join Intel Security and (ISC)2 on May 7, 2015 at 1:00PM Eastern for a discussion on how to overcome these challenges through critical protection and often overlooked best practices to build the confidence you need to securely deploy Office 365.Read more >