IT Security – from (ISC)² “Continuing the Conversation: Spearphishing”

Continuing the Conversation: Spearphishing If you’ve attended any of our (ISC)² ThinkTank Webinars (and we hope you have!) you know that moderator Brandon Dunlap shares your questions with panelists to…

Continue ReadingIT Security – from (ISC)² “Continuing the Conversation: Spearphishing”

CISSP certification: Data, system, mission ownership, custodians and users.

Data, System, Mission Ownership, Custodians and Users: Each role has unique roles and responsibilities to keep the data safe. Mission/Business Owner: Senior executives make the policies that govern our data…

Continue ReadingCISSP certification: Data, system, mission ownership, custodians and users.

IT Security – from (ISC)² “Looking for cybersecurity job? Healthcare is hiring!”

Looking for cybersecurity job? Healthcare is hiring! Looking for cybersecurity job? Healthcare is hiring! While the projected 1.8 million cybersecurity workforce gap is a staggering number, the Global Information Security…

Continue ReadingIT Security – from (ISC)² “Looking for cybersecurity job? Healthcare is hiring!”

IT Security – from Cyberseek.org “More open CISSP job openings, than the total number CISSP certified individuals in the US”

Cybersecurity Supply And Demand Heat Map Cybersecurity talent gaps exist across the country.Closing these gaps requires detailed knowledge of the cybersecurity workforce in your region. ~300,000 open Cybersecurity jobs in…

Continue ReadingIT Security – from Cyberseek.org “More open CISSP job openings, than the total number CISSP certified individuals in the US”

CISSP certification: Thor Pedersen’s answer to “Is it a good idea to prepare for CISSP now?” – Quora

I think any time you are ready and you can dedicate the time you need to do it is good, so YES!. It will get you past the recruiter to…

Continue ReadingCISSP certification: Thor Pedersen’s answer to “Is it a good idea to prepare for CISSP now?” – Quora

IT Security – from UpGuard “The RNC Files: Inside the Largest US Voter Data Leak, 198 million voters personal information exposed.”

The RNC Files: Inside the Largest US Voter Data Leak UpGuard has discovered an open database containing information on what appear to be approximately 198 million American voters left misconfigured…

Continue ReadingIT Security – from UpGuard “The RNC Files: Inside the Largest US Voter Data Leak, 198 million voters personal information exposed.”

IT Security – from (ISC)² “Is IT the solution to filling cybersecurity workforce gap?”

Is IT the solution to filling cybersecurity workforce gap? Insights from the 2017 Global Information Security Workforce Study show that the IT players in your organization may be the key…

Continue ReadingIT Security – from (ISC)² “Is IT the solution to filling cybersecurity workforce gap?”