Every CISSP and CCSP started out by committing to and passing one of our certification exams. No matter which certification you choose, you’ll find everything you need to prepare for the big day in the (ISC)² Exam Action Plan, including:
Exam registration, policies and testing guidelines
Details on what to expect...
As Cybersecurity Awareness Month kicks off this week, U.S. President Joe Biden has weighed in on his administration's efforts to curb cyberattacks and bolster the federal government's security posture.
How your organisation can use behaviour science to reduce your organisation's security risk profile.
61% of cybercrime victims said they did not report the incident, seriously limiting organisations’ ability to identify and respond to cyber attacks.
And, alarmingly, 48% of respondents say they have never heard...
Of all the areas under his direction - business continuity, GRC, data governance - third-party risk is the most challenging, says Peter Gregory, senior director of cyber GRC at GCI General Communications Inc. "Their breach is my breach," he says, offering mitigation advice.
Rant of the day: Are we getting hacked because we now work remotely in the new normal? No, we're being hacked because we're not managing our risks and being lazy - and because the CISO is not being heard.
Technology alone it is not enough to protect you from modern cyber threats. Cybercriminals regularly exploit the human element. By focusing on changing people’s behaviour, cyber resilience can be achieved.
Download this white paper and learn about:
Tackling the human aspect of cyber security;
The psychology of...
By focusing on meaningful security metrics, organisations can benchmark, assess progress, and measure with a view to reducing the risk inherent in the human aspect of cyber security.
Download this white paper and learn:
Why metrics are so important;
What makes a metrics "meaningful";
How to use meaningful...
It’s clear, and it has been for a long time, that traditional tickbox security awareness training efforts aren’t working. And they’re not working because they make little or no effort to change people’s behaviour.
To reduce human cyber risk, security awareness training must go beyond raising awareness and...
CybSafe’s analysis of ICO data finds the number of incidents of ransomware reported has doubled in a year. What action can leaders make to reduce their risk of falling victim to attacks?
Download this white paper and learn:
Why ransomware is on the rise;
How phishing works as the on-ramp to ransomware;
Four editors at Information Security Media Group discuss important cybersecurity issues, including the rise of quadruple extortion attacks employed by ransomware gangs, the FBI reportedly withholding the Kaseya ransomware decryption key for weeks, and raising security posture during a pandemic.
Brian Barnier, a director of analytics who is developing a course on critical and design thinking in cybersecurity for CyberEd.io, is a firm believer in the importance of critical thinking today. He discusses how that, plus systems and design thinking, can improve the way cybersecurity functions.
The latest edition of the ISMG Security Report features an analysis of how the U.S. government has been tracking an increase in the pace of attacks tied to Conti ransomware. Also featured are what "protection" means today and building a new cybersecurity operating model.
The COVID-19 crisis has posed an unparalleled challenge for cybersecurity. Like COVID-19, cyberattacks spread fast and far - creating more and more damage. But the pandemic has also had a positive impact on the cybersecurity function, which Tarun Kumar, CISO at Nissan, describes here.
For fraudsters, there has been no respite. The fraud
economy took no pandemic hit. There was no
reduction in schemes among adversaries and they
experienced no job losses. Instead, shifts toward an increased dependency on digital channels have presented a myriad of new opportunities for illicit