CENTER FOR CYBER SAFETY AND EDUCATION PATHWAY TO CERTIFICATION SCHOLARSHIPS
SCHOLARSHIP AWARDS: Up to thirty (30) Total
In recognition of the 30th anniversary of the CISSP, the Center, sponsors, and supporters, are proud to award up to 30 recipients of the Center for Cyber Safety and Education Pathway to Certification Scholarship. Each recipient will receive an ISC2 certification education package consisting of the following:
- One ISC2 certification exam voucher of the recipient’s choice: CISSP, CSSLP, CCSP, SSCP, CGRC, ISSAP, ISSEP, ISSMP
- Hardcover or digital textbook
- Hardcover or digital study guide
- Practice tests
- ISC2 Direct Online Self-Paced Training
- First year AMF paid upon passing the exam and becoming endorsed.
To access scholarship application details, visit the Center for Cyber Safety & Education website
Implementing ISO 27001:2022 for Startups and SMEs
Hannah Suarez, SSCP, takes us through the experience of implementing the substantially revised ISO 27001:2022 and upgrading from the 2013 version of the framework.
It’s been more than a year since the ISO 27001:2022 standards were released, replacing the 2013 version and including new and updated texts related to Cloud Security, Digital Trust and Cybersecurity Leadership. For startups and SMEs, these updates pose challenges around retrofitting their existing workforce to tackle the new standards – be it upgrading or implementing an ISMS (Information Security Management System). For organizations beholden to regulatory rules, the focus on third party and supply chain assessments will enable them to focus on securing business growth via the ISO 27001 certification process.
I’m writing this article fresh from finishing an ISO 27001:2022 implementation for a startup. I implemented their ISMS according to the previous standard, and now I want to share with the ISC2 community what it’s like to upgrade.
To access this free resource, visit the ISC2 website here
Free Tools for Cloud Environments
Free Tools for Cloud Environments provides network defenders and incident response/analysts open-source tools, methods, and guidance for identifying, mitigating, and detecting cyber threats, known vulnerabilities, and anomalies while operating a cloud or hybrid environment.
To access this free resource, visit the cisa.gov website here
The Business Case for Security
Amid competing financial priorities, investments in physical and cybersecurity measures are crucial for operational continuity and employee safety. This resource provides data and considerations for senior leaders as they prioritize budget items.
To access this free resource, visit the cisa.gov website here
Introducing the guidelines for secure AI
New guidelines will help developers make informed decisions about the design, development, deployment and operation of their AI systems.
Artificial Intelligence (AI) systems have the potential to bring many benefits to society. However, for the opportunities of AI to be fully realised, it must be developed, deployed and operated in a secure and responsible way.
To access this free resource, visit the UK National Cyber Security Center website here