About the
(ISC)² Blog

  • (ISC)² believes in the importance of open dialogue and collaboration, between both (ISC)², its certified members and members of business and society.

    (ISC)² established this blog to provide a voice to its certified members, who have significant knowledge and valuable insights to share that can benefit the information security industry, the people in it and the public at large.

    The postings on this site are the author's own and don't necessarily represent
    (ISC)²'s positions, strategies or opinions. (ISC)² does not control, monitor, or endorse any links provided in this blog and makes no warranty or statement regarding the content on any linked website.

    Those who post comments to blogs should ensure their comments are focused on the topic at hand. (ISC)² reserves the right to remove any post or comment from this site.

    Should you find objectionable content in this blog, please notify us as soon as possible at blog@isc2.org.

    Please click here for FAQs.

    Please click here for the Blog guidelines.

« Technological Setbacks In 2013 Will Pave The Way For A New, Human-Focused Defense Strategy In 2014 | Main | Food for Fraud: Android & Tech Support Scams »

14 January 2014

Comments

Hello,

Thanks for this great feedback on how to maintain the CISSP certification with the CPEs. That is very valuable information for students who didn't started to study and need to know more about how to have the certification valid.
thank you

Very well written article. I have had my cert since March of this year and I have been going to the ISC2 website and taking the esymposium classes as well as joining a chapter to earn my CPE. Thank you for clarifying the audit process should one ever occur.

The comments to this entry are closed.

Recent Contributors

Past Contributors