Blog Posts Tagged with "Certification"


ISMS Certification Does Not Equal Regulatory Compliance

December 27, 2012 Added by:Rebecca Herold

“By becoming ISO 27001 certified does that automatically mean we comply with HIPAA and HITECH requirements? Are there any requirements of HIPAA/HITECH that are not required to meet ISO 27001 standards?”

Comments  (0)


CISSP for Dummies

October 24, 2012 Added by:Ben Rothke

The CISSP is the most popular and arguably most valuable information security certification. While SANS GIAC certifications are technically more intensive, the CISSP is the 900-pound gorilla of information security certifications. For those looking review guide, CISSP for Dummies is a worthwhile reference...

Comments  (2)


Four Horsemen of the Infosec Apocalypse and the Freak Power Ticket

September 18, 2012 Added by:Infosec Island Admin

All of this will be tempered by what happens next for Dave and Chris. Will they be able to penetrate the old boy network? Will they be able to, once ensconced in the ISC(2) inner sanctum, make any kinds of change that would make the CISSP more meaningful? Time will tell my friends...

Comments  (1)


Four Days and Counting for (ISC)2 BoD Petitioners

September 13, 2012 Added by:Le Grecs

The same "good 'ol boys/girls" keep returning time and time again. When their terms are up, they "sit out a year" and then the next board nominates them as one of the BoD-recommended candidates. Keeping the same old board will result in a certification that continues to be disconnected...

Comments  (0)


Chief Information Security Officer (CISO) Certified?

September 09, 2012 Added by:Jayson Wylie

The requirements involved with obtaining a certification past September 30th 2012 may not be beneficial for a CISO, andI do not know how applicants with this new certification will stand apart from those with graduate degrees in their understanding of security solutions...

Comments  (8)


Scot Terban ISC(2) Board Petition UPDATE

September 05, 2012 Added by:Infosec Island Admin

It seems that when one “petitions” to run for the board, one must have the signatories send an email instead of just fill out their information on some excel sheet or online petition. If you are wanting to sign the petition for my being able to run for the BoD please email me...

Comments  (0)


Official Statement on ISC2 and the Freak Power Ticket

August 26, 2012 Added by:Infosec Island Admin

Vote for the horsemen. If not me, then the others for a bigger point here. Those of you who take the ISC and CISSP seriously need to look at your org. Do you think that any with this certification are good at what we do because we took a test and adhere to some ethics rules the board ignores when they see fit?

Comments  (0)


Your CISSP is Worthless - So Now What?

August 23, 2012 Added by:Dave Shackleford

OK, so it’s not really worthless. So what do I propose? I say scrap the whole thing. Start over. Build a cert and program that tests fundamental skills and means something to employers who really need things done. Offer existing cert holders one year and a free test to get the new one. Otherwise, they’re out...

Comments  (22)


Vote for Boris Sverdlik aka JadedSecurity for ISC2 Board

August 23, 2012 Added by:Boris Sverdlik

I’m not going to promise things that I may or may not be able to deliver on, but I can promise I will stick to what I believe is a shared vision in the community for a value add certifying body. In order to change perception of the certification and the certifying body we need to change...

Comments  (0)


Scot Terban ISC2 Board Candidacy

August 23, 2012 Added by:Infosec Island Admin

Ok, so after a flurry of tweets about the candidacy of others, my name got thrown in there like so much pasta being chucked at a wall. Well, it stuck in my case and I decided to run. So, if you think that I can get in there and stir up some trouble, and maybe make some changes then VOTE FOR ME in this petition...

Comments  (0)


Sign Dave Lewis' Petition for the ISC2 Board Election

August 22, 2012 Added by:Infosec Island Admin

Dave Lewis wants to work to restore the CISSP exam and it’s place in the community as something to be respected, help bring the ISC2 into the wider acceptance, help make it a force for positive change, and ensure that the ISC2 is representative and accountable to it’s membership...

Comments  (1)


How to Become a Network Security Engineer

July 18, 2012 Added by:InfoSec Institute

While no two jobs are alike, there are some specific skills that will help network security engineers face the various challenges they will face day to day. What follows are just a handful of specific skills and duties required of network security engineers...

Comments  (2)


CISSP Reloaded Domain Eight: BCPs and DRs

June 14, 2012 Added by:Javvad Malik

Some companies are not factoring cloud-based or 3rd party hosted applications into their DR plans because contractually the cloud provider is responsible. What would you do if your cloud-provider got hit by a disaster they couldn’t recover from. What would you do in order to continue your business operations?

Comments  (0)


Security Field Entry Advice

June 08, 2012 Added by:Jayson Wylie

Government reports show that there is up to a fifty percent gap for information security needs to those able to fill them. This means that more and more people will attempt to enter into the information technology security field as the compensation for those who have security talent rises...

Comments  (2)


PCI’s Money Making Cash Cow Not So Good for the Industry

June 07, 2012 Added by:Andrew Weidenhamer

The level of scrutiny the PCI DSS has been subject to the last couple of years has been bad enough to accentuate it with the advent of the ISA program. The false sense of confidence the ISA program gives individuals is insanely bad for the industry. Like any other certification, the test isn’t difficult..

Comments  (1)


The Great Compliance Conundrum

May 10, 2012 Added by:Mark Gardner

The crux of the matter is why people bemoan compliance: To comply in this case requires no external verification, and in order to meet compliance you may avoid some as they're too hard to do or do not go deep enough, but still have the ability to turn and say that "we are compliant"...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked