INSPIRING A SAFE AND SECURE CYBER WORLD



Similar documents
The Value of Information Security Certifications

CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES

HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper. Piloted by the Cyber Security Programme

(ISC)² Foundation Announces 2014 Information Security Scholarship Recipients

(ISC) Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

The Next Generation of Security Leaders

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Management School. MSc/PG Dip/PG Cert. Banking and Finance. University of Stirling Management School

APC. ASIS Assets Protection Course. ASIS Assets Protection Course PAID. Distinctive Education. ASIS Delivers NOVEMBER 2015 APRIL 2016 MAY 2016

Security Transcends Technology

HKIHRM HR PROFESSIONAL STANDARDS MODEL

The National Skills Academy for IT. Cyber Security

What is the ACCA Approved Employer Programme?

Understanding the Federal IT Security Professional (FITSP) Certification

NAVSEA Leadership Development Continuum

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals

WCA WEBINAR SERIES: The Case for Cyber Security Training

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES

STRATEGY MANAGEMENT EDUCATION Leadership and Management Development

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

STRATEGY FOR ENHANCING STUDENT EMPLOYABILITY

Professional Certificate in Operational Risk Management (including Conduct Risk) 2015/2016

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ADVANCING SECURITY, TOGETHER

CYBER SECURITY TRAINING SAFE AND SECURE

Career Paths in Information Security v6.0

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

PARTNERSHIP FOR DEMONSTRABLE COMPETENCE

the asset management journey

Management School. MSc/PG Dip/PG Cert. International Accounting & Finance. University of Stirling Management School

Certification and Training

Cyber Risk & Insurance

HEALTH INFORMATION MANAGEMENT (HIM) HUMAN RESOURCE PACKAGE

DMI ME. Professional Diploma in Digital Marketing. phone: marketing@dmime.com. DIGITAL MARKETING INSTITUTE Middle East

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

Building HR Capabilities. Through the Employee Survey Process

BUILDING A BRIDGE 5/5/2015. Empowering CPA s in a Digital World. CPA.com an AICPA company Empowering CPAs and Businesses for the Digital Age

Application Software Assurance Center of Excellence Relies on Professionalized Teams to Train Air Force Programmers in Securing the SDLC

Student Handbook. Chartered Institute of Customer Relationship Management Africa

Hosted by Lunarline: School of Cyber Security

Britepaper. How to grow your business through events 10 easy steps

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

BIOS Steven Penn, Senior Director CSF Development And Educa9on Programs Bryan Cline, PhD Senior Advisor

PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

ASK PC Certified Information Systems Security Expert - CISSE

fundraising resources

CompTIA Continuing Education Program and Certification Renewal Policy

HRCI and You: Past, Present and Future. Stephanie T. Runyan, PHR

Certification for Information System Security Professional (CISSP)

IEEE-USA Employment and Career Services Member Survey Summary and Report of Findings

Earn the leading credential for the development of sustainable facility management strategies. Sustainability Facility Professional

Head Office: Northern Office:

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016

MASTER S COURSES FASHION RETAIL MANAGEMENT

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

New PDU Category Structure and Policies

HE learning and teaching: vision

CFA INSTITUTE EUROPEAN INVESTMENT CONFERENCE

PNG Institute of Banking and Business Management

National Initiative for Cyber Security Education

2017 Environments for Aging Expo & Conference- Call for Presentations Deadline for submissions- June 24, p.m. PST

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Legislative Council Panel on Information Technology and Broadcasting. Information Security

IRAP Policy and Procedures up to date as of 16 September 2014.

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY)

PROVING YOUR GRC KNOWLEDGE WITH CERTIFICATIONS

JOB DESCRIPTION. IS teams, Hanover colleagues, third party suppliers. Principal Duties and Responsibilities

Certification. Is it Right for You? 2013 Micron Technology, Inc. February 12, 2014

2015 INFORMATION SECURITY BREACHES SURVEY

Diploma of International Business 2016

Cisco Cyber Security. Professional Courses. About. Course Outline

IT and Cyber Security Training Courses

PROFESSIONAL SERVICES MARKETING. CIM PROFESSIONAL CERTIFICATE CIM PROFESSIONAL DIPLOMA CIM CHARTERED DIPLOMA

Information Systems Security Engineering Professional (ISSEP)

Physical Security: Introductory Applications and Technology

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

Securing the Nation: Creating cyber security, resilience and readiness

Region 7 Teacher In-Service Program Training Workshop Delta Meadowvale Resort Mississauga, Ontario, Canada Evaluation Summary

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

MASTER S COURSES FASHION & LUXURY BRAND MANAGEMENT

National standards of excellence for headteachers. Departmental advice for headteachers, governing boards and aspiring headteachers

ASLA. American Society of Landscape Architects. Join the premier organization for landscape architecture professionals.

MANAGEMENT DEVELOPMENT COURSES

GRADUATE CERTIFICATE IN ORGANISATIONAL DEVELOPMENT

Faculty of Law. Master Programme in European Economic Law

N252; N250; N250; I120; I160; I210 KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University

Professional Certificate in Investment Fund Services 2015/2016

Level 4 - Certificate of Higher Education in Applied Social Studies UEL Academic School

ADVANCED DIPLOMA FELLOWSHIP

International Executive Development Programme 2011

Programme Specification

Transcription:

INSPIRING A SAFE AND SECURE CYBER WORLD M

Follow us on...

1 STEP ONE: CHOOSE YOUR CERTIFICATION CISSP FOR SECURITY LEADERS CISSP recognises information security leaders with the knowledge and experience to design, develop and manage the overall security posture of an organisation. www.isc2.org/cissp SPECIALISATION AREAS FOR SECURITY ARCHITECTS AND MANAGERS CISSP Concentrations recognise CISSPs who expand their knowledge into specific subject matter areas such as architecture and management. www.isc2.org/concentrations CCFP FOR CYBER FORENSICS PROFESSIONALS CCFP credential indicates expertise in forensics techniques and procedures, standards of practice, and legal and ethical principles to assure accurate, complete, and reliable digital evidence. www.isc2.org/ccfp CCSP FOR CLOUD SECURITY EXPERTS CCSP is the only credential that confirms demonstrated experience and competence in protecting and managing the security of cloud computing environments. www.isc2.org/ccsp SSCP FOR IT PROS SSCP provides confirmation of a practitioner s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures. www.isc2.org/sscp CSSLP FOR SOFTWARE PROFESSIONALS CSSLP recognises the key qualifications of developers building secure software applications. www.isc2.org/csslp HCISPP FOR HEALTHCARE PRACTITIONERS HCISPP credential confirms a practitioner s core knowledge and experience in security and privacy controls for personal health information. www.isc2.org/hcispp CERTIFYING THE WORLD S INFORMATION SECURITY PROFESSIONALS 3

1 CERTIFYING THE WORLD S INFORMATION SECURITY PROFESSIONALS STEP TWO: CHOOSE YOUR STUDY PLAN FREE TOOLS Exam Outline SELF STUDY TOOLS (ISC)² Practice Tests App TRAINING Webcasts (ISC)² Study Guides Training Seminar Live OnLine Boot Camp 4

1 STEP THREE: PASS THE EXAM Register at your local Pearson VUE Test Centres www.pearsonvue.com/isc2 Once you pass the exam, you need to complete the endorsement process to become certified. All (ISC)² exams are based on a common body of knowledge that is recognised internationally and exam content are based on a job task analysis conducted as recommended by ISO/IEC/ANSI 17024 standards. STEP FOUR: GET YOUR ENDORSEMENT When applying for (ISC)² certification, you must be endorsed by another (ISC)² certified professional in good standing before the credential can be awarded. This requirement applies to all credentials and concentrations, even if you already hold an (ISC)² certification, as the domains for each credential vary. Once you have received your (ISC)² email informing you that you have passed the exam, you will need to download and submit the Candidate Endorsement Form. The form must be completed and signed by an (ISC)² certified professional. The (ISC)² certified professional is anyone who: Is able to attest to your professional experience Is an active (ISC)² credential holder in good standing The endorser will attest that your assertions regarding professional experience are true to the best of the endorser s knowledge, and that you are in good standing within the cybersecurity industry. STEP FIVE: BECOMING AN (ISC)² MEMBER CERTIFYING THE WORLD S INFORMATION SECURITY PROFESSIONALS Once you are certified, you become a member of (ISC)². Recertification is required every three years, with ongoing requirements to maintain your credentials in good standing. This is primarily accomplished through earning CPE credits and pay an Annual Maintenance Fee (AMF). 5

1 CERTIFYING THE WORLD S INFORMATION SECURITY PROFESSIONALS MAINTAIN YOUR CPEs Certification CISSP CSSLP, CCFP, CCSP SSCP, CAP, HCISPP Associates ISSAP, ISSEP, ISSMP Type Annual Req. 3-Year Total Group A Group A or B Total Required Group A Group A or B Total Required Group A Group A or B Total Required Group A Total Required 30 10 40 20 10 30 15 5 20 15 15 90 30 120 60 30 90 45 15 60 N/A N/A During your subsequent full 3-year certification periods for these concentrations, 20 of the 120 CPEs already required for the underlying CISSP certificate must be in the specific area of concentration. For example, if a CISSP took the ISSEP concentration examination and passed, he/she would be required to submit at least 20 of the total 120 hours required to submit for the CISSP certificate to be in the specific area of engineering. 6

2 MEMBER BENEFITS ACCESS TO RESOURCES Free InfoSecurity Professional member magazine and (ISC)² Blog Security Central & Threat Central online portal (ISC)² Global Information Security Workforce study, white papers, research and more Discounts on (ISC)² Official Study Guides A rich online programme of free webinars, esymposia and think tanks DEVELOP PROFESSIONALLY & NETWORK Free (ISC)² SecureEvent: one-day conferences in major cities around the world Global and regional Security Congress Member Receptions and member social media groups Access to major industry events and conferences at discounted rates GETTING THE MOST OUT OF YOUR MEMBERSHIP GET INVOLVED Local Chapters and programmes Safe and Secure Online awareness for children, parents and teachers Speaking and writing opportunities Advisory Boards and special interests programmes 7

2 GETTING THE MOST OUT OF YOUR MEMBERSHIP (ISC)² SECURE EVENTS Europe Middle East Africa FREE ONE-DAY CONFERENCES FOR (ISC)² MEMBERS AND CPE OPPORTUNITY These conferences have been designed as a platform for open discussion and presentation around the latest information security topics. Members tell us that the sessions are invaluable for connecting, learning and ensuring continued value within the roles that they deliver. 2015 CALENDAR MANAGING RISK IN AN EVER-CHANGING THREAT LANDSCAPE EVENT CITY MONTH SecureIreland Dublin March SecureCEE Budapest April SecureNetherlands Rotterdam May SecureScandinavia Stockholm May SecureZürich Zürich May SecureTurkey Istanbul September SecureJohannesburg Johannesburg September SecureDubai Dubai November SecureLondon London December WWW.ISC2.ORG/ISC2-LOCAL-SECURE-EVENTS 8

Join us for the Second Annual (ISC)² Security Congress EMEA 2015 20-21 October 2015 Germany Sofitel Munich Bayerpost SECURE TOMORROW TODAY (ISC)² Security Congress EMEA offers attendees over 40 education sessions, designed to transcend all industry sectors, focus on current and emerging issues, best practices, and challenges facing cybersecurity leaders. As cyber threats and attacks continue to rise, the goal of (ISC)² Security Congress EMEA is to secure tomorrow today by arming them with the knowledge, tools, and expertise to protect their organisations. emeacongress.isc2.org #ISC2congressemea

20-21 October 2015 Germany Sofitel Munich Bayerpost 40+ Education Sessions Focussing on 6 Key Tracks Mobile and Cloud Analytics and Forensics Risk and Governance Technology, Business and the Future Privacy and Data Security Hackers and Threat Intelligence Pre-Conference Workshops Cloud Security Digital Forensics Top Reasons to Attend Front-line insights from EMEA s largest information security membership Great couple of days. I can take away excellent learning and employ this in my day job - Phil Clucas, Shop Direct Educational programme offering board review of current industry concern A unique opportunity to bring together professionals at all levels Build on training and event management experience of two industry leaders; (ISC)² and MISTI Networking receptions included an ideal chance to meet EMEA information security peers from various sectors Special discount for (ISC)² members and opportunity to earn up to 24 CPEs emeacongress.isc2.org #ISC2congressemea

3 Being a member of an (ISC)² chapter has its benefits. Not only will you gain a sense of fellowship with colleagues in your profession, you will also be able to network, share knowledge, exchange resources, and collaborate on projects with fellow information security professionals in your local area. There are more than 140 official chapters worldwide with 35+ based in Europe, Middle East, and Africa. CHAPTER SPOTLIGHT: (ISC)² ATLANTA CHAPTER Atlanta Chapter Lends a Hand at Security Congress If you attended last year s (ISC)² Security Congress, then there s a good chance you met members of the Atlanta Chapter. They served as session moderators, including introducing speakers on a wide variety of topics at the Georgia Congress complex. They also helped distribute and gather evaluation forms at each session and, in general, augmented staff during the annual event. (ISC)2 Atlanta was established in February, 2012. With a starting base of 20 users, the chapter has grown to nearly 200 users in the two years since the chapter s founding. Mikal Haas, the chapter president, attributes the growth to "being active in the IT security community." FEBRUARY 2015 IN THIS ISSUE: Chapter Spotlight: Atlanta Chapter (ISC)² Member Survey Annual Chapter Reports Due RSA Conference/CLM New CISSP Textbook Download Slides for (ISC) 2 Updates WORKING FOR YOUR COMMUNITY The chapter s activities pay dividends as Haas notes in two of their recent efforts. The 2014 (ISC)² Security Conference brought in thousands of attendees and the opportunity for making connections. The chapter's participation in the 2014 SecureWorld Expo also had rewards: "We had a booth and we also had a user group meeting that was one of our more successful meetings to date." In 2015, (ISC)² Atlanta became part of the advisory council of the Atlanta Interface Conference, joining national and community based organizations in this annual presentation of the latest news and developments information security and technology. Official (ISC) 2 Chapters Established in January 2015 Northeast Wisconsin (ISC)² Atlanta, in keeping with the mission to educate the next generation of information security professionals, is partnering with the Gwinnett College to bring the Global Academic Program to campus. Haas sees this as a win win: I think this has a lot of upside to both the GTC and the (ISC)² Atlanta user group. Roanoke Tacoma (ISC)² Atlanta Chapter contact information: WWW.ISC2.ORG/CHAPTERS 11

3 WORKING FOR YOUR COMMUNITY Whether you choose to donate, champion corporate support, volunteer, or merely spread the word, (ISC)² is your opportunity to give back and work for the future of the profession. SAFE AND SECURE ONLINE (ISC)² members wanted a way to educate the most vulnerable members of society children. The Safe and Secure Online (SSO) programme was introduced in 2006 in conjunction with Childnet International, and brings (ISC)² s information security expert members into classrooms to help children ages 7-14 learn how to protect themselves online and become responsible digital citizens. Supported by: SCHOLARSHIPS GROUP The math is simple: A high demand for skilled cyber security experts and not enough supply of qualified candidates equals a world of opportunity. The (ISC)² Foundation aims to bridge this gap by providing future information security professionals with scholarships to prepare them for a rewarding career in this important field. INDUSTRY RESEARCH: THE GLOBAL INFORMATION SECURITY WORKFORCE STUDY The (ISC)² Global Information Security Workforce Study reflects the opinions of the dynamic information security workforce. It is the largest study of its kind and provides detailed insight into important trends and opportunities within the information security profession. It aims to provide a clear understanding of pay scales, skills gaps, training requirements, corporate hiring practices, security budgets, career progression and corporate attitude toward information security that is of use to companies, hiring managers and information security professionals. GET YOUR FREE WORKFORCE STUDY WWW.ISC2CARES.ORG 12

3 (ISC)² collaborates with an ever-expanding network of university partners to establish a joint framework for delivering essential skills to support the growth of a qualified information security workforce. Join a global network of colleges and universities around the world that influence the next generation information security professionals. The programme is open to accredited educational institutions that have programmes or grant degrees in the IT realm. GAP PROGRAMME FOCUS EDUCATION Provide education and training that are incorporated into an overall approach for academic curriculum development Create just in time joint academic and industry content Influence the readiness of the future IT professional Emphasise the importance of education, certification, and continual learning (CPEs), increasing workplace value RESEARCH Thought leadership collaboration (roundtables, executive panels) Workforce analysis Conference participation Track development Grant collaboration Engagement with regulatory and standards issuring boards (e.g. NIST, NICE, ISO, IEEE, CISSE, DOL) OUTREACH Connect with future IT professionals and nurture potential (ISC)² membership: Global Chapters Young Professionals Network Foundation WORKING FOR YOUR COMMUNITY WWW.ISC2.ORG/GLOBAL-ACADEMIC-PROGRAM 13

ADVISORY COUNCILS AND MEMBER-DRIVEN INITIATIVES As the largest not-for-profit membership body of certified information and software security professionals worldwide and within EMEA, (ISC)² works with its membership to support development needs within the profession, communities, academia, and government. Six regional and expert Advisory Councils managed by (ISC)² create opportunities for members to become ambassadors for the profession, become active in a variety of projects, and offer thought leadership on how we can inspire a safe and secure cyber world. Within EMEA, Advisory Councils are active in: Projects to enhance recognition of our profession and its career potential along with the academic and educational options that can support newcomers into the field. Inform the development of bodies of knowledge, skills frameworks, standards and academic accreditation to reflect the requirements of our digital society. Provide a professional perspective to policy and resilience initiative and the development of national cybersecurity strategies. Lead debate around ethical issues that affect the practice of cyber security. Global ADVISORY COUNCIL Global

Europe, Middle East and Africa 6 Hay s Lane London SE1 2HB United Kingdom Phone: +44 (0) 203 283 4383 Email: isc2europe@isc2.org www.isc2.org