As business leader--whether with an international non-profit organization like ISACA or a corporation, like my employer, Intralot--your perspective must always be global. That very perspective infused my thinking as I went to compose this ISACA point of view on National Cyber Security Month, which begins tomorrow.
While events such as “National Cyber Security Month” have taken shape, grown and serve a purpose, their positive impact may fall short and be somewhat artificial because of the limited number of nations that annually mark the progress and challenge of cyber security in October’s month-long observances.
One look at the faces and names of industry speakers, writers and influencers shows a relative dearth of female contributors. The same can be seen throughout the global technology workforce. The reality of too few women entering technology fields and moving up the ladder to leadership positions is not a new one, but it is something that the ISACA Women’s Leadership Council is actively addressing through a new program called Connecting Women Leaders in Technology.
The empowerment of women within the global technology workforce is critical to advancing female leadership and sustaining the profession. Through this program ISACA will provide a robust platform to:
ISACA Now recently had a virtual sit-down interview with Brett Kelsey, vice president & chief technology officer for the Americas, Intel Security Group. Kelsey shared his thoughts on the biggest single information security (InfoSec) challenge that organizations face today, how to solve the InfoSec labor shortage and other critical issues he deals with on a daily basis.
As a keynote speaker at CSX 2016 North America 17-19 October in Las Vegas, Kelsey will reveal how the industry is under duress and is being forced to adapt. He’ll provide compelling data on the current threat landscape, the extreme talent shortage, evidence of security inefficiency across the board, and will emphasize the importance of having an adaptive and collaborative, connected security infrastructure.
Editor’s note: ISACA’s Detroit Chapter recently sponsored its third annual Cybersecurity Scholarship Case Competition, which saw 25 students vying for $13,500 in prize money at the University of Detroit Mercy. Michael Talamonti, a Lawrence Technological University Masters of Science in IT student, was part of a winning team for the second consecutive year. Here is Talamonti’s account of the competition:
Participants in the ISACA Detroit Chapter’s Cybersecurity Scholarship Case Competition were presented with a case positioned around a general security theme and had 42 hours to investigate and prepare a presentation for a panel of judges. The judges were comprised of industry professionals specializing in cybersecurity. This year’s theme: social media.
Are you interested in becoming a Certified Information Security Manager (CISM)? If so, are you ready for the exam?
The CISM exam is demanding, and it will be difficult to pass without adequate preparation. But realistic expectations and a reasonable plan can help.
I recently earned a CISM Worldwide Excellence Award for achieving the highest score in the world on the December 2015 CISM examination, and this is my advice based on that experience:
This blog is intended to offer a way for ISACA leaders, constituents and staff to exchange information of interest pertinent to the association, the business environment and/or the profession.
The comments on this site are the author’s own and do not necessarily represent ISACA’s opinions or plans. ISACA does not endorse, monitor or control any links to external sites offered in this blog, and makes no warranty or statement regarding the content on those external sites.
Anyone posting comments on this site should ensure that the content remains on-topic and steers well clear of any statements that could be considered insensitive, offensive or threatening. Given ISACA’s global nature, the need to communicate in a way that is accessible and acceptable to many cultures should be taken into account. ISACA retains the right, at its sole discretion, to refuse content that is considered inappropriate.
To volunteer to write a blog or suggest a topic send an email here.