isc2

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit

Research cites strengthening of cloud security skills top priority over next three years

CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it's partnering with the Cloud Security Alliance (CSA) for the CSA Summit, gathering world-leading security experts and cloud providers to discuss the latest cloud adoption trends and best practices for secure operation of cloud environments. The event is taking place ahead of (ISC)² Security Congress on September 24, 2017 at the JW Marriott Austin in Austin, TX.

As more companies migrate to the cloud and incorporate cloud services into business operations, a new wave of attack vectors surface for malicious actors to jeopardize personal and business assets,” said Wesley Simpson, (ISC)² chief operating officer. “To stay ahead of challenging attack methods coordinated through the cloud, the cybersecurity profession needs to focus resources on training talent working within cloud environments – the future of an agile enterprise. Partnering with organizations such as CSA is an important step to bring awareness to the challenges and opportunities associated with the cloud.”

Cloud Security is a Top Priority

According to (ISC)²'s 2017 Global Information Security Workforce Study, 60% of cybersecurity professionals believe cloud security training is the top skill needed over the next three years. Moreover, and the number of professionals planning to acquire (ISC)²'s Certified Cloud Security Professional (CCSP) within the next 12 months is on the rise.

Cloud Security Takes Center Stage at Congress

(ISC)² Security Congress brings together nearly 1,500 industry colleagues, offers more than 90 educational and thought-leadership sessions and fosters collaboration with other forward-thinking companies. The addition of the CSA Summit provides further resources for event attendees to remain current on the latest industry threats and best practices.

Simpson will host a collaborative session From 10% Cloud to 100% Cloud in 3 Years – How (ISC)² is Doing it and Putting Security First. Simpons will share the (ISC)² transition to a 100% cloud-based services model. This interactive discussion will explore how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security remains front and center throughout the entire process.

More information about Security Congress and the CSA Summit is available here.

About (ISC)²® 

(ISC)² is an international nonprofit membership association best known for its award-winning Certified Information Systems Security Professional (CISSP®) certification, with additional certification and education programs that holistically address security. Our membership, 125,000 strong internationally, is made up of sought-after cyber, information, software and infrastructure security professionals who are making a difference and helping to advance this new industry. Our vision to inspire a safe and secure cyber world reaches the general public through a commitment to social responsibility via our charitable foundation – The Center for Cyber Safety and Education™. For more information on (ISC)², visit http://www.isc2.org, follow us on Twitter or connect with us on Facebook. 

CloudBuzz

The latest in curated technology related news collected from many of the leading news distribution, industry research and technology vendor firms on the planet.

Here you will find recent news sources from companies such as Reuters, Marketwired, IDC, Gartner or directly from cloud vendors such as Google, Microsoft or Amazon.

CONTRIBUTORS

Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

The Multi-cloud Landscape The digital universe is expanding rapidly, and cloud computing is building the foundation for almost infinite use ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

WikiLeaks’ Vault 7 If you haven’t heard of the Vault 7 WikiLeaks data dump, you’ve probably been living under a ...
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
How Big Data Can Empower Native Ads

How Big Data Can Empower Native Ads

Empower Native Ads The realm of big data is expanding an astonishing rate, and its presence can be felt across ...

NEWS

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...
Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...