ISC2 Insights
The latest ISC2 updates, along with member views on global cybersecurity trends and issues, public policy, technology innovation and more.
Article •March 4, 2025 ISC2 Honors Women in Cybersecurity During Women’s History Month
To mark International Women’s Day and Women’s History Month, ISC2 will be honoring women in cybersecurity and showcasing their career experiences.
Article •February 28, 2025 Deadline Approaching to Submit Presentations for ISC2 Security Congress 2025
Last chance to submit your presentation submissions for ISC2 Security Congress 2025. Accelerate your career as a speaker in Nashville, Tenn. October 28-30 at ISC2 Security Congress 2025. The final extended deadline is March 7!
Article •February 28, 2025 Diving into DeepSeek
The arrival of a new, unexpected and highly functional AI platform, from a Chinese developer costing a fraction of its competitors has raised a variety of questions for users and organizations alike. These include whether DeepSeek poses a cybersecurity risk – or a greater risk – compared to existing platforms originating from other markets.
Article •February 27, 2025 Investigating a Cybersecurity Incident: Making a Start
When incidents happen, its essential that organizations and their cybersecurity teams can get the most complete picture of what happened, how to fix it and how to prevent a recurrence. Digital forensics play an essential role in cybersecurity incident response. But where do you start?
Article •February 26, 2025 ISC2 Recognized as an Elite Credentialing Partner
ISC2 is acknowledged by Credly as a top badge issuer. This distinction is given to leading organizations making strides in digital credentialing.
Article •February 25, 2025 ISC2 Member Spotlight: Honoring Cyber Pop-up Founder and CEO, Christine Izuakor, CISSP During Black History Month
In honor of Black History Month, Cyber Pop-up Founder and CEO, Christine Izuakor, CISSP shares her efforts to bridge the cybersecurity employment gap by empowering job seekers from underrepresented communities.
Article •February 21, 2025 The Data Fortress: Protecting and Governing Information
Asad Rathore, CISSP, has managed multiple data platforms containing sensitive data for various financial and aviation organizations. Most of those data platforms reside on cloud infrastructure, with numerous endpoints, any of which might be vulnerable to a nefarious actor. He explains the notion of a data fortress, applying the defensive and operational concepts of the medieval castle to modern IT environments, to deliver robust perimeter security and internal policing.
Newsletter •February 20, 2025 Cybersecurity and the Deepfake, Disinformation and Misinformation Challenge
The ability of AI platforms to produce extremely convincing audio and video fakes to commit fraud, distribute misinformation or disinformation is growing at pace, and bad actors are increasingly leveraging these capabilities and creating new technology and awareness challenges for cybersecurity professionals and organizations as a whole.
Article •February 18, 2025 Am I Logging the Right AWS Log Sources?
As organizations increasingly rely on external cloud platforms such as Amazon Web Services (AWS), maintaining a clear understanding of what’s going on with external services is essential. Based on his experience, Jatin Mannepalli CISSP, CCSP, argues that effective logging is one of the most critical aspects of securing any cloud environment. He considers why having the right logs and knowing how to use them can make or break your security posture.
Video •February 18, 2025 Dennis Lee – Business Adoption of AI
Dennis Lee, CISSP, talked to ISC2 Insights about the growing adoption of AI tools and technologies in organizations, along with the considerations that are needed to ensure risk is effectively managed.