ISC2 Insights
The latest ISC2 updates, along with member views on global cybersecurity trends and issues, public policy, technology innovation and more.
Article •May 30, 2025 Quantum Computing and the Future of Cryptography
The EU Digital Operational Resilience Act is now in effect, but reports suggest some affected organizations struggled to meet the deadline for compliance and still have not been able to fully comply with the Act. Does DORA apply to your organization? If it does, is it and your cybersecurity team DORA compliant?
Article •May 30, 2025 Exploring DORA
The EU Digital Operational Resilience Act is now in effect, but reports suggest some affected organizations struggled to meet the deadline for compliance and still have not been able to fully comply with the Act. Does DORA apply to your organization? If it does, is it and your cybersecurity team DORA compliant?
May 28, 2025 New Zero Trust Training - Courses and Strategy Certificate
Zero trust goes beyond physical walls into cloud, edge and remote environments. With recently revised courses and an all new Zero Trust Strategy Certificate, ISC2 has the training to secure your organization.
Article •May 27, 2025 GRC and Exception Handling
It’s one thing to develop and execute a strategy to manage governance and risks, but how do you deal with the things that the strategy can’t manage – the exceptions to the rule?
Article •May 23, 2025 Post Quantum Cryptography and Payments: An Approach to 'What's Next'?
While post quantum cryptography has been sidelined by the recent advances in AI and the final results in the NIST competition, one question is still very much on a lot of executives’ lips: "Are we quantum safe?". Yvan Rolland-Chatila, CISSP, CCSP, a cybersecurity consultant working with banks and payment companies for over a decade, shares his view.
Article •May 21, 2025 The Hidden Dynamics a CISO Should Know
According to Shahee Mirza, CISSP, the daily routine for many Chief Information Security Officers (CISOs) and their teams revolve around the usual suspects: patching systems, setting up firewalls and keeping an eye on threat feeds. However, he argues that some of the biggest threats aren’t malicious code or compromised hardware at all, but people, processes and subtle misalignments that live outside of technology.
Article •May 20, 2025 CYBERUK 2025 Addresses Cybersecurity Resilience in an Unpredictable World
Transforming resilience in the face of unprecedented and rapidly evolving cybersecurity threats was top of mind as stakeholders gathered in Manchester for the NCSC’s annual conference.
Newsletter •May 19, 2025 Securing Hybrid Working Environments
Hybrid working environments combine on-premise and remote systems (as well as users), creating a challenging environment to secure and monitor.
Article •May 19, 2025 ISC2 Workshops – Choose an In-Person or Virtual Session and Earn CPE Credits
Gain knowledge by joining your peers in-person or virtually for ISC2 workshops. Choose your topic, AI or cybersecurity leadership, along with the learning style that best fits your schedule and earn CPE credits.
Article •May 16, 2025 Following the Money: Insights from RSAC2025 on Critical Infrastructure Risk Management
Daksha Bhasker, CISSP attended the new critical infrastructure track at RSAC2025, where sessions focused on both the technical and economic impacts of disruption as well as protecting essential networks, services and supply chains from cyberattacks.

Earn the SSCP certification from ISC2, a foundational credential for IT security professionals & system administrators focused on security operations.

Earn the ISSMP certification with ISC2 & become a security management professional, allowing you to lead cybersecurity management efforts in organizations.

Become a certified systems security engineer with ISC2’s ISSEP certification, focusing on security engineering & cybersecurity risk management.