Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What does isc2 stand for

12/11/2021 Client: muhammad11 Deadline: 2 Day

InfoSecurity PROFESSIONAL

SEPTEMBER/OCTOBER 2018

A Publication for the (ISC)2‰ Membership

RAISING YOUR PROFESSIONAL DEVELOPMENT GAME

isc2.org facebook.com/isc2fb twitter.com/ISC2 linkedin.com/company/isc2 community.isc2.org

BUILDING AWARENESS Using existing standards and regs for a security program

CLOUD MIGRATIONS Deciding vs. deploying solutions to complete a digital transformation

http://isc2.org
http://facebook.com/isc2fb
http://twitter.com/ISC2
http://linkedin.com/company/isc2
http://community.isc2.org
CHRIS YOUNG Chief Executive Officer, McAfee

WALTER ISAACSON Best-Selling Author; Acclaimed Historian and Journalist

SIR TIM BERNERS-LEE Inventor of the World Wide Web

2018 Cybersecurity Summit McAfee’s 11th Annual Security Summit

LEARN from McAfee CEO Chris Young and other thought leaders on how a strong cybersecurity posture is an essential component of any innovation.

HEAR from the man who literally wrote the book on innovation, Walter Isaacson, and Sir Tim Berners-Lee, who invented the World Wide Web.

DISCOVER the latest trends and best practices across some 90 technical breakout sessions.

NETWORK with your peers from across industries and learn directly from other McAfee users.

EXPERIENCE our closing event featuring the Grammy Award-winning rock band Weezer!

MPOWER 18 features targeted, highly technical sessions guaranteed to provide valuable, tangible knowledge to help you maximize your security solutions and tackle today’s greatest security challenges, while the breakouts offer insights and best practices to help you optimize your security and compliance initiatives. The Sponsor Expo will feature an extensive lineup of McAfee partners, including some of the industry’s most successful businesses. Don’t miss out on this unique opportunity to meet with key players in the cybersecurity arena—all in one location.

To learn more about MPOWER 18, please visit www.mcafeempower.com

Dynamic keynotes from McAfee and innovative industry leaders

CPE credits awarded with a full MPOWER summit pass

Sponsor expo showcasing McAfee partner security solutions

Opportunities to see the McAfee Labs research team in action

Targeted breakout sessions and technical deep dives

McAfee and the McAfee logo are trademarks or registered trademarks of McAfee LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Copyright © 2018 McAfee, LLC

SAVE $100 As an (ISC)² member, you can save $100 off your registration by using promo code MPWR18!

OCTOBER 16–18 MGM GRAND, LAS VEGAS

www.mcafeempower.com
www.mcafeempower.com
RETURN TO CONTENTSInfoSecurity Professional • 3 • September/October 2018

InfoSecurity Professional is produced by Twirling Tiger‰ Media, 7 Jeffrey Road, Franklin, MA 02038. Contact by email: asaita@isc2.org. The information contained in this publication represents the views and opinions of the respective authors and may not represent the views and opinions of (ISC)2® on the issues discussed as of the date of publication. No part of this document print or digital may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written permission of (ISC)2. (ISC)2, the (ISC)2 digital logo and all other product, service or certification names are registered marks or trademarks of the International Information Systems Security Certification Consortium, Incorporated, in the United States and/or other countries. The names of actual products and companies mentioned herein may be the trademarks of their respective owners. For subscription information, please visit www.isc2.org. To obtain permission to reprint materials, please email infosecproeditor@isc2.org. To request advertising information, please email tgaron@isc2.org. ©2018 (ISC)2 Incorporated. All rights reserved.

features INCIDENT RESPONSE

18 One Year LaterWhat have we really learned from the Equifax breach? BY JOYCE FLORY

GRC

26 Building a PlatformKnowing what’s mandated—and what’s not—can help update or re-create a solid security awareness program. BY STEFAN BEISSEL, CISSP

CLOUD SECURITY

30 Our Journey to the Cloud(ISC)2’s COO explains why the organization decided now was the time to press forth. BY WESLEY SIMPSON

Cover image: JOHN KUCZALA Illustration above: L.J. DAVIDS

departments 4 EDITOR’S NOTE

Mind the Gap BY ANNE SAITA

6 EXECUTIVE LETTER

Taking Your Professional Development to the Next Level

BY MIRTHA COLLIN

8 FIELD NOTES Newest cybersecurity advo- cate; five CPEs per book read; cast your vote in the annual (ISC)2 board of directors elec- tion; highlights from 2018 Cost of Data Breach Study; Recom- mended Reading and more

14 #NEXTCHAPTER (ISC)2 Singapore Chapter

16 ADVOCATE’S CORNER

On African Safaris and Attribution

BY JOHN McCUMBER

34 CENTER POINTS

The Missing Piece (and How You Can Help Supply It) BY PAT CRAVEN

36 COMMUNITY

Is the New CISSP Format Better? Members weigh in on this as well as on listing certs in email signatures.

4 AD INDEX

contents VO LU M E 1 1 • I S S U E 5

Why start from scratch when you can lift from popular regulations and standards to build a security awareness program? PAGE 26

RETURN TO CONTENTSInfoSecurity Professional • 4 • September/October 2018

(ISC)2 MANAGEMENT TEAM

EXECUTIVE PUBLISHER Timothy Garon 571-303-1320 | tgaron@isc2.org

SENIOR MANAGER, CORPORATE COMMUNICATIONS Jarred LeFebvre 727-316-8129 | jlefebvre@isc2.org

MANAGER, CORPORATE PUBLIC RELATIONS Brian Alberti 617-510-1540 | balberti@isc2.org

COMMUNICATIONS SPECIALIST Kaity Eagle 727-683-0146 | keagle@isc2.org

MANAGER, MEDIA SERVICES Michelle Schweitz 727-201-5770 | mschweitz@isc2.org

EVENT PLANNER Tammy Muhtadi 727-493-4481 | tmuhtadi@isc2.org

SALES TEAM

EVENTS SALES MANAGER Jennifer Hunt 781-685-4667 | jhunt@isc2.org

REGIONAL SALES MANAGER Lisa O’Connell 781-460-2105 | loconnell@isc2.org

EDITORIAL ADVISORY BOARD

Kaity Eagle, (ISC)2

Jarred LeFebvre, (ISC)2

Yves Le Roux, EMEA

Cesar Olivera, Brazil and Canada

TWIRLING TIGER MEDIA EDITORIAL TEAM

EDITOR-IN-CHIEF Anne Saita | asaita@isc2.org

ART DIRECTOR & PRODUCTION Maureen Joyce | mjoyce@isc2.org

MANAGING EDITOR Deborah Johnson

EDITOR Paul South

PROOFREADER Ken Krause

Twirling Tiger‰ Media (www.twirlingtigermedia. com) is certified as a Women’s Business Enterprise (WBE) by the Women’s Business

Enterprise National Council (WBENC). This partnership reflects (ISC)2’s commit- ment to supplier diversity.

advertiser index For information about advertising in this publication, please contact Tim Garon at tgaron@isc2.org.

McAfee ..................................................................................... 2

(ISC)2 Secure Summit EMEA ..............................................5

Qualys ........................................................................................7

Wallix .......................................................................................13

CSA ...........................................................................................17

(ISC)2 Community ...............................................................23

eSentire ..................................................................................25

Symantec ...............................................................................29

TechTarget .............................................................................35

2018 Cloud Security Report .............................................37

SecurityMetrics ...................................................................38

AWS ........................................................................................39

(ISC)2 Security Congress ................................................. 40

Twirling Tiger Media ...........................................................41

editor’s note  B Y A N N E S A I TA

Mind the Gap

A S SOMEONE WHO’S DEVOTED a considerable portion of her career to covering information security, I’ve been on a mission to promote—in word and deed—the non-tech skills now needed for career advancement (even survival). Becoming competent, let alone fluent, in so-called “soft skills” is hard work. Employers still

value coding over communications skills. And too many of us are more comfortable mining event logs than mingling at actual events.

Promoting interpersonal communications to cyber professionals has never been an easy sell. But there are signs the working world is now providing an assist. A few months ago, Jeff Weiner, the CEO of LinkedIn, told a morning news program that interpersonal skills—communications, reasoning, team coordination, etc.—are now the number one quality sought by employers.

“It’s interesting because a lot of people are fixated on technology, and rightfully so. It’s an increasingly important part of how companies do business,” Weiner said. “But what we found when we did our skills gap analytical work is [with] interpersonal skills, the gap there is roughly three times higher than software engineering in the United States.”

That observation reminded me of a conversation I overheard decades ago when I was a junior attending an “engineering school.” A student newspaper editor was arguing on the phone with her computer science professor about an overdue assignment. I don’t recall the exact words she used, but in essence she told the teacher her future career didn’t rest on whether or not she passed Fortran. It did matter if she aced the communications classes competing for her time.

Everyone within earshot was a little in awe of the editor’s moxie and dedication to her craft. Perhaps what we should have respected back then was the importance she placed on a skill the rest of us tended to downplay. Especially given none of us ever had to program in Fortran after we graduated. •

Anne Saita, editor-in- chief, lives and works on the U.S. West Coast. She can be reached at asaita@isc2.org.

© R

ob A

nd re

w P

ho to

gr ap

hy

http://www.twirlingtigermedia.com
http://www.twirlingtigermedia.com
SUMMITS / EMEA #ISC2Summits ENRICH. ENABLE. EXCEL.

Join us at the (ISC)² Secure Summit EMEA 15 - 16 April | World Forum, The Hague

Our annual flagship event Secure Summit EMEA will bring together hundreds of security professionals from across Europe, Africa and the Middle East.

It will be two days of insightful discussions, workshops, panels and best practice sharing to stimulate feedback, challenge thinking, create debate and enable networking.

Learn more at:

securesummits.isc2.org

SAVE THE DATE

http://securesummits.isc2.org
https://twitter.com/isc2
RETURN TO CONTENTSInfoSecurity Professional • 6 • September/October 2018

executive letter  B Y M I R T H A C O L L I N

Taking Your Professional Development to the Next Level

THE LATEST FROM (ISC)2’S LEADERSHIP

A S WE APPROACH the last quarter of the year, you may have already reached many of your professional goals. But

there’s still time for self-improvement while earning all of your CPEs. We’re excited to be hosting the 2018 (ISC)2 North America Security Congress in New Orleans and have a multitude of robust learning opportunities through- out the week.

Our commitment to your professional development doesn’t stop with Security Congress. Training and educa- tion are the cornerstone of what we do at (ISC)2 and we’ve recently updated several of our certification education products and launched several new CPE courses—all designed to be even more engaging for our members.

In keeping with our theme of “Enrich. Enable. Excel.” much of what we’ll be focusing on in the upcoming year is creating more customized professional development for our members. While certification is a huge accomplish- ment, it’s quite another to continue upon your individual path of learning to support career growth. In 2019, (ISC)2 will become a go-to resource not only for certifications, but also for continuing development and self-improvement. The information security landscape is constantly changing; we

all need to keep pace. (ISC)2 wants to be there throughout your career, helping you remain relevant and on top of current industry trends.

After hearing feedback on your learning needs, we are committed to providing more self-paced learning opportu- nities, helping you to learn in your own time and in your own environment. These courses are more engaging and leverage state-of-the-art instructional design techniques. They include

clearly articulated learning objectives, audio content, graphics, videos, readings, assessments and immersive interactive experiences designed to enhance the overall learning experience. The best part: these are free to members! Among the new curriculum offerings are:

• GDPR for Security Professionals • DevSecOps – Integrating Security into DevOps • Building a Strong Security Culture

Besides self-paced additions to our training suite, we’re introducing some in-person workshops in conjunction with (ISC)2 Security Congress, (ISC)2 Secure Events and other third-party hosted programs. The newest additions to our portfolio include a workshop specifically for executives wanting to learn more about the organizational value of a strong security team and an OWASP Top 10 workshop designed specifically for security professionals.

And finally, many members have said they’d like to see security awareness training that they can pass along to others in their organizations. They know that the number one threat faced by organizations today often comes from non-malicious and unaware employees. To answer that need, I am pleased to announce that (ISC)2 has developed an interactive training course targeted at the layperson that can be shared widely within your organizations.

This easy-to-understand training lasts approximately two hours and is based on real-world scenarios users face in their daily lives. It includes important topics such as phishing, drive-by downloads, ransomware and other cybersecurity threats commonly found in the workplace.

As you can see, we’re excited about the enhancements we’ve made to our professional development portfolio, both in terms of content and ease of access. We look forward to hearing your feedback on these new offerings and to continuing to develop our programs to give you the best learning opportunities to excel as a security professional who helps ensure a safe and secure cyber world. For more information I invite you to visit learn.isc2.org. •

Mirtha Collin is the Senior Education and Training Manager at (ISC)2. She can be reached at mcollin@isc2.org.

http://learn.isc2.org
http://qualys.com/trial
RETURN TO CONTENTSInfoSecurity Professional • 8 • September/October 2018

field notes A ROUNDUP OF WHAT’S HAPPENING IN (ISC)2 COMMUNITIES

EDITED BY DEBORAH JOHNSON

Meet (ISC)2’s Newest Cybersecurity Advocate (ISC)2 RECENTLY NAMED Tony Vizza, CISSP, CRISC, CISM, as cybersecu- rity advocate for the Asia-Pacific (APAC) region to work with corporations, governments, academic institutions and others to collaborate to create the strongest cybersecurity policies. In addition, he recruits and develops cybersecurity professionals.

Vizza has more than 25 years of experience in information technology and information security. He has a B.S. in computing science from the University of Technology Sydney, a Global Executive MBA from the University of Sydney and is currently studying for a Juris Doctor degree at the University of New South Wales. He has provided expert services to several government agencies as well as professional organiza- tions. He is an expert speaker on information security and a regular contributor to several publications in the region.

“Tony will be a key addition to our growing team in Asia-Pacific and an excellent advocate for the security profession in the region,” said (ISC)2 CEO David Shearer, CISSP. “His varied experience in the regulatory, legal, computer science and information security fields gives him a well-rounded perspective on the challenges that our members face and will help further our mission to inspire a safe and secure cyber world.”

“Information security is all about people, and (ISC)2 is investing in and providing the tools to make us all that much smarter and better when facing the challenges before us,” said Vizza. “The skills shortage

in this industry is something I’m passionate about fixing, and I’m proud to be joining an organization like this at a time when I feel it’s needed most.”

Based in Sydney, Australia, Vizza will report to Clayton Jones, the (ISC)2 Regional Managing Director for APAC. •

“Information security is all about people, and (ISC)2 is invest-ing in and providing the tools to make us all that much smarter and better when facing the challenges before us.”

—TONY VIZZA, CISSP, CRISC, CISM

Award for (ISC)2

(ISC)2 webinars recently earned an industry award for work promoting the cybersecurity industry.

(ISC)2’s Think Tank webinar channel was named the 2018 Highest Growth Channel in IT by BrightTALK, an online platform that offers webinar and video products to IT professionals.

One of the organization’s free webinar channels, (ISC)2’s Think Tank features 60-minute roundtable discussions on cybersecurity chal- lenges with key security experts. The webinar series already has more than 60,000 views this year in North America alone.

“Delivering valuable educational experiences to our membership is the central goal for our team,” said Wesley Simpson, COO of (ISC)2. “BrightTALK’s recognition of the growth of our channel affirms that our members, as well as other IT and ICT professionals, are engaging in the discussions we are hosting.”

(ISC)2 has five additional free webinar channels:

• Security Briefings – Hour-long webinars providing a deep dive into topics in multi-part series

• From the Trenches – Experts providing accounts of hands- on experience in cybersecurity

• EMEA Webinars – Thought leadership on topics facing Europe, the Middle East and Africa

• APAC Webinars – Thought leadership on topics facing the Asia-Pacific region

• Security Congress – Top-rated sessions from (ISC)2’s annual flagship conference

To sign up for any (ISC)2 webinars, please visit https://www.isc2.org/ News-and-Events/Webinars/. •

Earn CPEs for Reading This Issue Please note that (ISC)2 submits CPEs for (ISC)2’s InfoSecurity Professional magazine on your behalf within five business days. This will automatically assign you two Group A CPEs.

Note: To access this members-only platform and quiz, you’ll need a Blue Sky account. If you don’t have an account, go to the Blue Sky homepage via the link and click on “Create User Profile” in the upper right-hand corner.

https://live.blueskybroadcast.com/bsb/client/CL_DE- FAULT.asp?Client=411114&PCAT=7777&CAT=10787

READ. QUIZ. EARN.

2 CPEs

https://live.blueskybroadcast.com/bsb/client/CL_DEFAULT.asp?Client=411114&PCAT=7777&CAT=10787
RETURN TO CONTENTSInfoSecurity Professional • 9 • September/October 2018

field notes

Earn CPEs by Reading—As Long as You Know What to Read BY BEN ROTHKE, CISSP

F OR MANY PEOPLE, it’s not passing the CISSP exam that is so difficult, it’s maintaining enough

continuing professional education (CPE) credits to ensure the continuation of their certification. CPE require- ments vary depending on one’s (ISC)2 certifications. Details about the CPE requirements can be found at https://www.isc2.org/Member-Resources/CPE- Overview. One of the ways in which to earn CPEs is by writing book reviews.

(ISC)2 recently updated the CPE program and members now get up to five CPEs per book read with a summary review attached with their CPE submission. For that, it doesn’t need to be a published review. But if you’d like to write a more extensive review and get additional CPEs, read on.

If knowledge is power, then one of the more effective ways to gain that power is by reading. When it comes to information security and risk manage- ment, it is a daunting task to try to keep up with the vast and ever-growing amount of written material. So, what is a security professional to do? How do you know which books are the most significant?

Presenting the Cybersecurity Canon project (https://cybercanon.paloal- tonetworks.com/), of which I’m a member. Started in 2014 by Rick Howard, CSO of Palo Alto Networks, the members of the canon identify lists of must- read books for cybersecurity professionals or those looking to get a better understanding of the security industry.

The canon-worthy books include those that focus on the core aspects of information security, are forward thinking, original and insightful. They also should stand the test of time, meaning that they should be relevant for several years. You won’t see specific technology such as those on operating systems or specific types of hardware or software.

Some examples of books in the canon include CISO Desk Reference Guide: A Practical Guide for CISOs, The Hardware Hacker: Adventures in Making and Breaking Hardware, and my perennial favorite, Measuring and Managing Information Risk: A FAIR Approach.

If there is a book you think is a candidate for the canon, you are invited to nominate it for entry and write a review. The review ensures the sincerity of the nomination and demonstrates to the canon committee that the person submitting the book is serious about it and feels strongly enough about it to take the time to write a review. The review does not have to be a monograph; a few hundred words will certainly suffice. There are plenty of good books out there to be read, so submit as many nominations as your time permits.

For more information or if you want to contact the canon, check out the Canon FAQ (https://cybercanon.paloaltonetworks.com/cybersecurity-can- on-faq/). Looking forward to your review.

And after your review has been published, don’t forget to submit your CPEs at the (ISC)2 site (https://cpe.isc2.org/). •

It’s Time to Vote

Don’t miss your opportunity to cast your vote in the annual (ISC)2 board of directors election. Voting takes place over the course of two weeks, from September 5 through Septem- ber 19, 2018. All members in good standing as of May 8, 2018 may vote in the election.

The 13-member board of direc- tors provides strategy, governance and oversight for the organization, grants certifications to qualifying candidates and enforces adherence to the (ISC)2 Code of Ethics.

Here is this year’s slate of candi- dates:

• Gabriel Alexander Bergel, CISSP – Chile

• Dr. Kevin Charest, CISSP – U.S.

• Aloysius Chai Luen Cheang, CISSP – Singapore

• Cindy Cullen, CISSP – U.S.

• Paul Innella, CISSP-ISSMP – U.S.

• Siu Cheong Leung, CISSP, CCSP – Hong Kong

• Dr. Brian David Anthony Mussington, CISSP – U.S.

• Lori O’Neil, CISSP – U.S.

For more information about (ISC)2 board elections, please visit https:// www.isc2.org/About/Board-of-Di- rectors/Board-Elections. •

https://www.isc2.org/Member-Resources/CPE-Overview
https://www.isc2.org/Member-Resources/CPE-Overview
https://cybercanon.paloaltonetworks.com/cybersecurity-canon-faq/
https://cybercanon.paloaltonetworks.com/cybersecurity-canon-faq/
https://cpe.isc2.org/
https://www.isc2.org/About/Board-of-Directors/Board-Elections
https://www.isc2.org/About/Board-of-Directors/Board-Elections
https://www.isc2.org/About/Board-of-Directors/Board-Elections
https://cybercanon.paloaltonetworks.com
RETURN TO CONTENTSInfoSecurity Professional • 10 • September/October 2018

field notes

The Cost of a Data Breach – 2018 Highlights from 2018 Cost of Data Breach Study: Global Overview, an IBM-Ponemon Institute study of nearly 500 companies worldwide. https://www.ibm.com/security/data-breach

ROOT CAUSES

Malicious or criminal attack 48%

Human error 27%

System glitch 25%

AVERAGE COST OF A DATA BREACH

$3.86 MILLION Up 6.4% (from the 2017 report)

INDUSTRY SECTOR

Highest per capita cost of a data breach (Millions)

Health $408

Financial $206

Services $181

AVERAGE COST OF A DATA BREACH BY REGION

Highest (Millions)

U.S. $7.91

Middle East $5.31

Canada $4.74

Lowest (Millions)

Brazil $1.24

India $1.77

Australia $1.99

DATA BREACHES CAUSED BY MALICIOUS OR CRIMINAL

ATTACK

Highest incidence

Middle East 61%

France 55%

U.S. 52%

Germany 51%

Lowest incidence

Turkey 38%

South Korea 40%

India 42%

Italy 42%

InfoSecurity Professional Recognized for Editorial and Design Excellence

InfoSecurity Professional took two awards in the 2018 TABBIES, presented by the Trade Association Business Publi- cations Interna- tional.

The maga- zine’s design team, including art director Maureen Joyce and photographer Matt Greenslade, received an hon- orable mention for Design/Opening Page or Spread for their work on “View from the C-Suite” in the 2017 July/August issue of InfoSecurity Professional.

The magazine feature titled “Change Manage- ment: Transform- ing Resistance into Acceptance,” landed at No. 18 among the Top 25 feature arti- cles—among the most popular, and therefore compet- itive, categories in the contest. The article was written by Paul South and appeared in the 2017 March/April issue. •

“Cyber risk is not yet fully understood by people who should be in the know. Many principals at small and medium healthcare organizations simply do not fully understand the impact of a significant cybersecurity incident until they experience it.” —Lee Kim, CISSP, from the June issue of Insights, a companion e-newsletter for the (ISC)2 membership

https://www.ibm.com/security/data-breach
RETURN TO CONTENTSInfoSecurity Professional • 11 • September/October 2018

Saluting the Finalists for the 2018 ISLA Americas Awards

field notes

(ISC)2 CONGRATULATES the finalists for the 2018 Information Security Leadership Awards (ISLA) for North and Latin America.

Held annually by (ISC)² in cooperation with the North and Latin American Advisory Councils, the ISLA Americas Program recognizes information security and management professionals throughout the private and public sectors in North, Central and South America, with the exception of the U.S. federal government (recognized through the ISLA Government Program), for their out- standing leadership and achievements in workforce improvement.

The winners will be announced in a luncheon ceremony at the 2018 (ISC)2 Security Congress in New Orleans on October 9, 2018.

Here are the 2018 finalists:

COMMUNITY AWARENESS

Joseph Carson, CISSP Chief Security Scientist, Thycotic Project/Initiative: Cyber Security for Dummies

Nemi George Senior Director, Information Security & Service Operations, Pacific Dental Services Project/Initiative: Okta Deployment

INFORMATION SECURITY PRACTITIONER

Domingo Castillo, CISSP AVP Regional Information Security Officer, Chubb Project/Initiative: Information Security Technology Convergence

Robb Van Eck, CISSP, CCSP Senior Information Security Architect Project/Initiative: ePHI Data Identification

SENIOR INFORMATION SECURITY PROFESSIONAL

Dave Bailey, CISSP Manager of Security Services, CynergisTek, Inc. Project/Initiative: Security Partner Network

Rinki Sethi, CISSP Vice President of Information Security, Palo Alto Networks Project/Initiative: Security Education Growth Initiative

Additional Awards Being Presented at the Ceremony In addition to recognizing the ISLA Americas winners, (ISC)2 is honoring other information security professionals for their contributions to (ISC)2’s efforts in creating a culture of information security:

(ISC)2 President’s Award This award recognizes volunteers who have made a significant impact on and/or contribution to (ISC)2. Multiple recipients are chosen annually for each region at the sole discretion of (ISC)2’s CEO.

Fellow Award The Fellow of (ISC)2 was established to honor and distinguish a select number of elite information security professionals who have made outstanding contributions, throughout their careers, to the information security profession.

Center for Cyber Safety and Education Awards Julie Peeler Franz “Do It for the Children” Volunteer Award honors a Center volunteer/ambassador for their work with the Garfield’s Cyber Safety Adventures program and/or the Safe and Secure Online program promoting cybersecurity efforts for children, parents, educators and seniors.

Center for Cyber Safety and Education’s Partnership Award is presented to a company or organization that has partnered with the Center to grow and expand its programs including education, research or scholarships. •

RETURN TO CONTENTSInfoSecurity Professional • 12 • September/October 2018

 RECOMME NDED READING Suggested by Dr. Richard N. Knepp, CISSP

Future Crimes: Inside the Digital Underground and the Battle for Our Connected World By Marc Goodman

(Anchor, 2016)

I F YOU THOUGHT you knew about every cyber threat, think again. Toasters and fake USB chargers? They are just the beginning. Author Marc Goodman does an excellent job

of identifying the many security threats, attacks, decep- tions, hacks, ransomware extortions and other crimes that were and are being heaped upon the users of the “connected world.” And there are some threats you would not have thought about until he discusses them.

The author draws interesting parallels between the computer security industry and the medical profession based on the terminology security profes- sionals use. Terms such as infection, quarantine, virus and users are discussed. He also proposes some interesting solutions based on the Centers for Disease Control (CDC) to help solve some of the security issues.

Goodman presents a serious eye-opening lesson about “friendly and free” service providers such as Facebook, Google, Instagram and Apple that harvest your personal information on a massive scale to sell it, and the impact of click- ing on the OK button after skipping over the option to read the lengthy terms of service (TOS) agreement.

These and other companies that maintain large data repositories of cus- tomers’ personal information are at great risk for theft by what the author calls “Crime, Inc.,” encompassing cybercriminals including the Chinese, terrorist organizations, script kiddies, Russian mafia and a host of other thieves plying their expertise in theft on Tor networks.

As an example, he cites a case of theft of a manufacturer’s trademarked and copyrighted intellectual property and the Chinese customer’s subsequent cancellation of millions of dollars in work because they already had everything they needed (stolen, of course).

In addition to covering past and present threats, the author also speculates on what may be most valuable to the reader: future threats. These include the impact of quantum computing on encryption, blockchains, artificial intelli- gence, robotics, biometrics and much more, such as risks inherent in DNA technology. He describes a case where DNA evidence was fabricated from DNA information stolen from a medical database.

This is an unusually long book (608 pages in paperback; the the author does warn the reader at the beginning). It is detailed and well composed. The three main sections and 18 chapters are logically organized and flow nicely from one chapter to the next. The threats are well documented. Marc Goodman does an excellent job of scaring the reader. •

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Financial Analyst
Premium Solutions
Professor Smith
Unique Academic Solutions
Instant Assignment Writer
A Grade Exams
Writer Writer Name Offer Chat
Financial Analyst

ONLINE

Financial Analyst

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$23 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$34 Chat With Writer
Professor Smith

ONLINE

Professor Smith

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$33 Chat With Writer
Unique Academic Solutions

ONLINE

Unique Academic Solutions

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$16 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$23 Chat With Writer
A Grade Exams

ONLINE

A Grade Exams

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$47 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Compute stefani's total standard cost per unit - Please find the attached file - Weasel like mammal crossword - Glasgow royal infirmary consultants - Why is eggshell a good material for edta to chelate - HRM 635-ACQUIRING EMPLOYEES - What are the functions and dysfunctions of immigration - Pick one of the following terms for your research: collaboration, divisional structure, functional structure, horizontal structure, matrix structure, outsourcing, reengineering, teams, vertical linkages, or virtual team. - Sittin on a bar stool by rehab - Attention getter for alcoholism speech - Philosophy-Discussion - MKT 345- Discussion 2 - Science - Heavy armoured glove crossword clue - Nutanix rf2 data loss - Snhu online bookstore at mbs direct - Hyper competition in strategic marketing - Iki indicator 1 ml 2.1 in glass vial - Btec business level 3 unit 12 m1 - Terms used in levelling - Umuc math 107 final exam answers - The soundtrack of my life essay - The sun also rises litcharts - How to make a gpa calculator in visual basic - Cooking cod in microwave - Crypto Week 8 discussion - Fostering student ownership - Number sense grades 4 6 - Group therapy - 7.2 the substitution method answers - Need help with Belbin's team theory - The template of templates they say i say - Adaptive Selling Personality Type - During raines umbrella corp had sales of - Clark civility index - A voltaic cell is constructed with an ag ag+ - University of birmingham regulations - Sixoxan weekia - Oligopolies may emerge in an industry because of - How to open skyui - Quantitative nursing research articles on diabetes - Car rental system project source code in c++ - Can a pmo accelerate the implementation process discussion - The giant swing at a county fair - Casestdy - Blackbaud gift range chart calculator - Example http www youtube com watch v qk6sbxwc4vs - Reflection 9 - The communication process involves all of the following except - Ethics theory and contemporary issues 7th edition pdf - Scrummage tool - Vendor disclosure legislation nsw - Utilitarian theory of corporate social responsibility - What is the theoretical yield of caco3 - Traffic scotland control centre - Engl 102 test 2 answers - Foundations of christian thought cosgrove - The undertaking john donne - Dunkin donuts organizational design - Education and training reform act 2006 summary - Define the key biographical characteristics - Estimated delivery date magento 2 - 2.05 bill of rights email - English Comp 2 - Gordon rule essay - The botany of desire chapter 1 - Proheart sr 12 leaflet - Please enter your pin followed by the hash key myntra - Ikea invades america case study pdf - How much does sodastream cost per bottle - History - History of organisational behaviour pdf - Australia day medallion defence - Hawaiian to english name translation - Jiri kylian falling angels essay - Early settlers food in canada - What is the image distance - Otzi the iceman robbery theory - Tesla product life cycle analysis - How to antidifferentiate on cas - The blind side discussion questions - Words that end in ate - From Broad to Focused Insights - Blue sea add a battery diagram - Nosotros preferimos comprar las entradas tickets para el museo - Business - MKTG201 Week 7 Assignment 7 - Wisc iv scores interpretation - Chapter 12 go math grade - The kitchen debate and cold war consumer politics ebook - Websense security override blocked - Research Paper on Arab Uprising - Picot statement and literature search gcu - I need an essay about this chapter - John maxwell five levels of leadership - Antrochoanal polyp surgery recovery - Economics 203 - Consumer meaning food chain - Law exam - Ees rankine cycle example