ISC 2 - CCSP

Cybersecurity Skills Shortage Takes Center Stage at (ISC)2 Security Congress

Industry Leaders Discuss Workforce Strategy

CLEARWATER, Fla., Aug. 10, 2017 /PRNewswire-USNewswire/ — (ISC)²® today announced Gary Beach, author of The U.S. Technology Skills Gap, will moderate a panel titled, Help Wanted! – Addressing the Cybersecurity Skills Shortage, at its seventh annual Security Congress, taking place Monday, September 25 at the JW Marriott Austin in Austin, TX.Moderator, Gary Beach, author, The U.S. Technology Skills Gap and panelists, including David Shearer, CISSP, CEO, (ISC)²; Brandon Dunlap, managing director, Brightfly; Deidre Diamond, founder and CEO, Cyber SN and #brainbabe; and Don Freese, deputy assistant director, FBI will discuss the state of the job market, why there's a skill shortage and how organizations can position themselves to find and attract the best candidates.

As we approach a 1.8 million worker shortage in cybersecurity, industry leaders need to find a solution to expand the talent pool and combat a growing threat landscape,” said Brian Correia, managing director, North America, (ISC)². “Guests attending the luncheon panel will hear from experts in the field on how to attract the best candidates, find new recruitment channels and train new and existing staff with the skills critical for succeeding in cybersecurity.”

As we approach a 1.8 million worker shortage in cybersecurity, industry leaders need to find a solution to expand the talent pool and combat a growing threat landscape,” said Brian Correia, managing director, North America, (ISC)². “Guests attending the luncheon panel will hear from experts in the field on how to attract the best candidates, find new recruitment channels and train new and existing staff with the skills critical for succeeding in cybersecurity.

According to (ISC)²'s 2017 Global Information Security Workforce Study, respondents believe the number one reason for the cybersecurity workforce shortage is the difficulty finding qualified personnel. They also said that job requirements are not understood by leadership. Also, women make only 11% of the workforce. It's evident that employers need to look for new recruitment channels and unconventional strategies and techniques to expand the reach of job opportunities.

More information about this luncheon panel and the other sessions taking place at (ISC)² Security Congress is available here.

About (ISC)² Security Congress

(ISC)² Security Congress will bring together more than 1,500 professionals from around the world for three days of education, best-practice sharing and networking. This year's conference tracks include: Cloud Security; Cyber Crime; Critical Infrastructure; Incident Response & Forensics; Governance, Regulation & Compliance; Identity Access Management; People & Security; Professional Development; Software Assurance/Application Security; Swiss Army Knife; and Threats.

(ISC)² members are eligible for special discounted pricing. More details are available at congress.isc2.org.

About (ISC)²®

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 120,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and EducationTM. For more information on (ISC)², visit www.isc2.org, follow us on Twitter or connect with us on Facebook.

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and consultancy services.

Are you a cloud services expert in a world of digital transformation? If so, contact us for information on how to become part of our growing cloud consultancy ecosystem.

CONTRIBUTORS

What is shadow IT?

How to Make the Move to the Cloud Securely

Move to the Cloud Securely The 2016 Enterprise Cloud Computing Survey from IDG offers multiple interesting insights concerning the state ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...
4 Open Source Business Intelligence Tools For Big Data Reporting

4 Open Source Business Intelligence Tools For Big Data Reporting

Open Source Business Intelligence Tools It’s impossible to take the right business decisions without having insightful information to back up ...
Scale Matters in the Enterprise Cloud

Scale Matters in the Enterprise Cloud

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly ...
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
Chris Gerva

Why Containers Can’t Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason - they are lightweight and ...

NEWS

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

DOWNERS GROVE, Ill., Dec. 8, 2017 /PRNewswire-USNewswire/ -- New hiring in computer and electronics manufacturing and technology services and custom ...
Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...