CISSP certification: Data, system, mission ownership, custodians and users.

Data, System, Mission Ownership, Custodians and Users: Each role has unique roles and responsibilities to keep the data safe. Mission/Business Owner: Senior executives make the policies that govern our data…

Continue ReadingCISSP certification: Data, system, mission ownership, custodians and users.

IT Security – from (ISC)² “Looking for cybersecurity job? Healthcare is hiring!”

Looking for cybersecurity job? Healthcare is hiring! Looking for cybersecurity job? Healthcare is hiring! While the projected 1.8 million cybersecurity workforce gap is a staggering number, the Global Information Security…

Continue ReadingIT Security – from (ISC)² “Looking for cybersecurity job? Healthcare is hiring!”

IT Security – from Cyberseek.org “More open CISSP job openings, than the total number CISSP certified individuals in the US”

Cybersecurity Supply And Demand Heat Map Cybersecurity talent gaps exist across the country.Closing these gaps requires detailed knowledge of the cybersecurity workforce in your region. ~300,000 open Cybersecurity jobs in…

Continue ReadingIT Security – from Cyberseek.org “More open CISSP job openings, than the total number CISSP certified individuals in the US”

CISSP certification: Thor Pedersen’s answer to “Is it a good idea to prepare for CISSP now?” – Quora

I think any time you are ready and you can dedicate the time you need to do it is good, so YES!. It will get you past the recruiter to…

Continue ReadingCISSP certification: Thor Pedersen’s answer to “Is it a good idea to prepare for CISSP now?” – Quora

IT Security – from UpGuard “The RNC Files: Inside the Largest US Voter Data Leak, 198 million voters personal information exposed.”

The RNC Files: Inside the Largest US Voter Data Leak UpGuard has discovered an open database containing information on what appear to be approximately 198 million American voters left misconfigured…

Continue ReadingIT Security – from UpGuard “The RNC Files: Inside the Largest US Voter Data Leak, 198 million voters personal information exposed.”

IT Security – from (ISC)² “Is IT the solution to filling cybersecurity workforce gap?”

Is IT the solution to filling cybersecurity workforce gap? Insights from the 2017 Global Information Security Workforce Study show that the IT players in your organization may be the key…

Continue ReadingIT Security – from (ISC)² “Is IT the solution to filling cybersecurity workforce gap?”

CISSP certification: Hacktivism and state sponsored hacking.

Types of attackers: Hacktivism/Hacktivist (hacker activist): Hacking for political or socially motivated purposes. Often aimed at ensuring free speech, human rights, freedom of information movement. Famous attacks: Anonymous – DDOS…

Continue ReadingCISSP certification: Hacktivism and state sponsored hacking.

IT Security from The Guardian “Deloitte hit by cyber-attack revealing clients’ secret emails”

Deloitte hit by cyber-attack revealing clients’ secret emails Exclusive: hackers may have accessed usernames, passwords and personal details of top accountancy firm’s blue-chip clients. The Guardian understands Deloitte discovered the…

Continue ReadingIT Security from The Guardian “Deloitte hit by cyber-attack revealing clients’ secret emails”