Blog Posts Tagged with "Certification"

65be44ae7088566069cc3bef454174a7

ISMS Certification Does Not Equal Regulatory Compliance

December 27, 2012 Added by:Rebecca Herold

“By becoming ISO 27001 certified does that automatically mean we comply with HIPAA and HITECH requirements? Are there any requirements of HIPAA/HITECH that are not required to meet ISO 27001 standards?”

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

CISSP for Dummies

October 24, 2012 Added by:Ben Rothke

The CISSP is the most popular and arguably most valuable information security certification. While SANS GIAC certifications are technically more intensive, the CISSP is the 900-pound gorilla of information security certifications. For those looking review guide, CISSP for Dummies is a worthwhile reference...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Four Horsemen of the Infosec Apocalypse and the Freak Power Ticket

September 18, 2012 Added by:Infosec Island Admin

All of this will be tempered by what happens next for Dave and Chris. Will they be able to penetrate the old boy network? Will they be able to, once ensconced in the ISC(2) inner sanctum, make any kinds of change that would make the CISSP more meaningful? Time will tell my friends...

Comments  (1)

32137b352537f11c1efe063869f00e0e

Four Days and Counting for (ISC)2 BoD Petitioners

September 13, 2012 Added by:Le Grecs

The same "good 'ol boys/girls" keep returning time and time again. When their terms are up, they "sit out a year" and then the next board nominates them as one of the BoD-recommended candidates. Keeping the same old board will result in a certification that continues to be disconnected...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Chief Information Security Officer (CISO) Certified?

September 09, 2012 Added by:Jayson Wylie

The requirements involved with obtaining a certification past September 30th 2012 may not be beneficial for a CISO, andI do not know how applicants with this new certification will stand apart from those with graduate degrees in their understanding of security solutions...

Comments  (8)

7fef78c47060974e0b8392e305f0daf0

Scot Terban ISC(2) Board Petition UPDATE

September 05, 2012 Added by:Infosec Island Admin

It seems that when one “petitions” to run for the board, one must have the signatories send an email instead of just fill out their information on some excel sheet or online petition. If you are wanting to sign the petition for my being able to run for the BoD please email me...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Official Statement on ISC2 and the Freak Power Ticket

August 26, 2012 Added by:Infosec Island Admin

Vote for the horsemen. If not me, then the others for a bigger point here. Those of you who take the ISC and CISSP seriously need to look at your org. Do you think that any with this certification are good at what we do because we took a test and adhere to some ethics rules the board ignores when they see fit?

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Your CISSP is Worthless - So Now What?

August 23, 2012 Added by:Dave Shackleford

OK, so it’s not really worthless. So what do I propose? I say scrap the whole thing. Start over. Build a cert and program that tests fundamental skills and means something to employers who really need things done. Offer existing cert holders one year and a free test to get the new one. Otherwise, they’re out...

Comments  (22)

7c5c876d1933023ac375eead04302e1a

Vote for Boris Sverdlik aka JadedSecurity for ISC2 Board

August 23, 2012 Added by:Boris Sverdlik

I’m not going to promise things that I may or may not be able to deliver on, but I can promise I will stick to what I believe is a shared vision in the community for a value add certifying body. In order to change perception of the certification and the certifying body we need to change...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Scot Terban ISC2 Board Candidacy

August 23, 2012 Added by:Infosec Island Admin

Ok, so after a flurry of tweets about the candidacy of others, my name got thrown in there like so much pasta being chucked at a wall. Well, it stuck in my case and I decided to run. So, if you think that I can get in there and stir up some trouble, and maybe make some changes then VOTE FOR ME in this petition...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Sign Dave Lewis' Petition for the ISC2 Board Election

August 22, 2012 Added by:Infosec Island Admin

Dave Lewis wants to work to restore the CISSP exam and it’s place in the community as something to be respected, help bring the ISC2 into the wider acceptance, help make it a force for positive change, and ensure that the ISC2 is representative and accountable to it’s membership...

Comments  (1)

86d8831c7ce6fcda920aac867a984d98

How to Become a Network Security Engineer

July 18, 2012 Added by:InfoSec Institute

While no two jobs are alike, there are some specific skills that will help network security engineers face the various challenges they will face day to day. What follows are just a handful of specific skills and duties required of network security engineers...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain Eight: BCPs and DRs

June 14, 2012 Added by:Javvad Malik

Some companies are not factoring cloud-based or 3rd party hosted applications into their DR plans because contractually the cloud provider is responsible. What would you do if your cloud-provider got hit by a disaster they couldn’t recover from. What would you do in order to continue your business operations?

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Security Field Entry Advice

June 08, 2012 Added by:Jayson Wylie

Government reports show that there is up to a fifty percent gap for information security needs to those able to fill them. This means that more and more people will attempt to enter into the information technology security field as the compensation for those who have security talent rises...

Comments  (2)

Ad5130e786d13531cc0f2cde32dacd0f

PCI’s Money Making Cash Cow Not So Good for the Industry

June 07, 2012 Added by:Andrew Weidenhamer

The level of scrutiny the PCI DSS has been subject to the last couple of years has been bad enough to accentuate it with the advent of the ISA program. The false sense of confidence the ISA program gives individuals is insanely bad for the industry. Like any other certification, the test isn’t difficult..

Comments  (1)

1f2f664e68a603b3c54890fbbcd37857

The Great Compliance Conundrum

May 10, 2012 Added by:Mark Gardner

The crux of the matter is why people bemoan compliance: To comply in this case requires no external verification, and in order to meet compliance you may avoid some as they're too hard to do or do not go deep enough, but still have the ability to turn and say that "we are compliant"...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »