ISC 2 - CCSP

Cybersecurity Skills Shortage Takes Center Stage at (ISC)2 Security Congress

Industry Leaders Discuss Workforce Strategy

CLEARWATER, Fla., Aug. 10, 2017 /PRNewswire-USNewswire/ — (ISC)²® today announced Gary Beach, author of The U.S. Technology Skills Gap, will moderate a panel titled, Help Wanted! – Addressing the Cybersecurity Skills Shortage, at its seventh annual Security Congress, taking place Monday, September 25 at the JW Marriott Austin in Austin, TX.Moderator, Gary Beach, author, The U.S. Technology Skills Gap and panelists, including David Shearer, CISSP, CEO, (ISC)²; Brandon Dunlap, managing director, Brightfly; Deidre Diamond, founder and CEO, Cyber SN and #brainbabe; and Don Freese, deputy assistant director, FBI will discuss the state of the job market, why there’s a skill shortage and how organizations can position themselves to find and attract the best candidates.

As we approach a 1.8 million worker shortage in cybersecurity, industry leaders need to find a solution to expand the talent pool and combat a growing threat landscape,” said Brian Correia, managing director, North America, (ISC)². “Guests attending the luncheon panel will hear from experts in the field on how to attract the best candidates, find new recruitment channels and train new and existing staff with the skills critical for succeeding in cybersecurity.”

As we approach a 1.8 million worker shortage in cybersecurity, industry leaders need to find a solution to expand the talent pool and combat a growing threat landscape,” said Brian Correia, managing director, North America, (ISC)². “Guests attending the luncheon panel will hear from experts in the field on how to attract the best candidates, find new recruitment channels and train new and existing staff with the skills critical for succeeding in cybersecurity.

According to (ISC)²’s 2017 Global Information Security Workforce Study, respondents believe the number one reason for the cybersecurity workforce shortage is the difficulty finding qualified personnel. They also said that job requirements are not understood by leadership. Also, women make only 11% of the workforce. It’s evident that employers need to look for new recruitment channels and unconventional strategies and techniques to expand the reach of job opportunities.

More information about this luncheon panel and the other sessions taking place at (ISC)² Security Congress is available here.

About (ISC)² Security Congress

(ISC)² Security Congress will bring together more than 1,500 professionals from around the world for three days of education, best-practice sharing and networking. This year’s conference tracks include: Cloud Security; Cyber Crime; Critical Infrastructure; Incident Response & Forensics; Governance, Regulation & Compliance; Identity Access Management; People & Security; Professional Development; Software Assurance/Application Security; Swiss Army Knife; and Threats.

(ISC)² members are eligible for special discounted pricing. More details are available at congress.isc2.org.

About (ISC)²®

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 120,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and EducationTM. For more information on (ISC)², visit www.isc2.org, follow us on Twitter or connect with us on Facebook.

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information, resources and thought leadership services.

Contact us for a list of our leading programs.

Infosec thought leaders

Why you should add a connection broker to your suite of DevOps tools

DevOps Connection Broker When staring down the DevOps path, you have no lack of tools to help you pave the ...
Data Science And Machine Learning Jobs Most In-Demand on LinkedIn

Data Science And Machine Learning Jobs Most In-Demand on LinkedIn

Data Science And Machine Learning Jobs Machine Learning Engineers, Data Scientists, and Big Data Engineers rank among the top emerging jobs ...
Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in ...
Cloudification - Budgets are Shifting Toward a “Cloud-first” and “Cloud-only” Approach

Cloudification – Budgets are Shifting Toward a “Cloud-first” and “Cloud-only” Approach

Cloudification and the Budget Shift Gartner has recently predicted that by 2020, a corporate "no-cloud" policy will be as rare ...
David

The Coming Era of Simple, Fast, Incredibly Cheap Cloud Storage

Cheap Cloud Storage Is On Its Way Data storage, like other commodities such as bandwidth, electricity, or simple computer power, ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
AT&T Unveils $15-a-Month Video Service

AT&T Unveils $15-a-Month Video Service

Wireless company’s fees for programmers would depart from industry practice AT&T Inc. T -1.20% on Thursday unveiled a new video service, called WatchTV, that aims to use a “skinny bundle” of channels to recapture some ...
Tainted, crypto-mining containers pulled from Docker Hub

Tainted, crypto-mining containers pulled from Docker Hub

Security companies Fortinet and Kromtech found seventeen tainted Docker containers that were essentially downloadable images containing programs that had been designed to mine cryptocurrencies. Further investigation found that they had been downloaded 5 million times, suggesting that hackers were ...
F-Secure Takes A Big Step Towards Cyber Security Leadership By Acquiring MWR InfoSecurity

F-Secure Takes A Big Step Towards Cyber Security Leadership By Acquiring MWR InfoSecurity

Acquisition adds industry leading threat hunting platform to F-Secure’s detection and response offering and expands cyber security services to the biggest markets globally F-Secure Corporation, Stock Exchange Release 18 June, 2018 at 09:00 EEST F-Secure ...