CISSP Exam Refresh
On April 15, 2024, ISC2 will refresh the CISSP credential exam. These updates are the result of the Job Task Analysis (JTA), which is an analysis of the current content of the credential evaluated by ISC2 members on a triennial cycle. Q: Why are changes being made to the CISSP exam? A: ISC2 has an obligation to its membership to maintain the relevancy of its credentials. These enhancements are the result of a rigorous, methodical process that ISC2 follows to routinely update its credential exams. This process ensures that the examinations and
CISSP Mind Map
We have updated the Mind Map to reflect the refreshed CISSP Exam Outline effective June 1, 2022. This resource is designed to help students when studying for the CISSP exam. Use the mind map as a visual guide when reviewing the CISSP domains. Read more information and find out more about the next scheduled dates for (ISC)² Official Certified Information Systems Security Professional (CISSP) CBK Training Seminar. Remember that all (ISC)² members are eligible for a 10% discount – available until registration deadline. Click on the image or HERE to view the
Five Key Considerations when Engaging a vCISO
The Chief Information Security Officer (CISO) is the senior-level role that oversees the development, implementation, and operation of the organisation’s security program. The CISO works with other senior management to align security initiatives with the overall business objectives and to manage risks that may threaten the organisation achieving its goals. Filling a CISO role can be challenging for many organisations. A vCISO can be the answer, but finding the right vCISO is essential. Cybersecurity is a top priority for organisations. The frequency and sophistication of cyberattacks have increased business risk. Specialist
Why Train with Cycubix?
At Cycubix we are passionate about education and the fundamental role it plays in the development and ongoing management of an effective cybersecurity programme. The latest cybersecurity knowledge and relevant skills are essential to manage a business securely while driving success and growth. Why train with Cycubix? Here are just some of the reasons
CISSP Exam Length Change
Effective June 1, 2022, the CISSP exam in the Computerized Adaptive Testing (CAT) format will contain 50 pretest (unscored) items, which will increase the minimum and maximum number of items you will need to respond to from 100-150 to 125-175 items during your exam. To allow for these additional items, the maximum exam time will increase from three to four hours. The additional 25 pretest items are evaluated for inclusion as operational (scored) items in future exams, however, as these pretest items are indistinguishable from operational (scored) items, you should consider each item carefully and select the best possible
Top Five Cybersecurity Predictions for 2022
2021 was a challenging year for IT security professionals. As the pandemic continued the work-from-home movement extended with its associated cybersecurity risks. Ransomware attacks grew at record levels with some very high-profile attacks on critical infrastructure – all in the face of the ongoing shortage of IT security talent. In this webinar, Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), discusses his Top Five Cybersecurity Predictions for 2022. Top Five Cybersecurity Predictions for 2022 1. The Overall Volume of Successful Attacks Will Decline 2. IT Budgets Will Rebound (Slightly) 3. Quantity and
(ISC)² Certified Information Systems Security Professional (CISSP) – FAQ
Learn about the Certified Information Systems Security Professional (CISSP) certification Many cybersecurity professionals have questions about the Certified Information Systems Security Professional CISSP certification – what is it, why should I consider it, what is involved and lots more. If you are thinking about becoming CISSP certified and are interested in learning more about the process and requirements, the Certified Information Systems Security Professional CISSP - FAQ may give you some answers. If you do not find what you are looking for, please contact us and we would be delighted to answer your
Top Marks for (ISC)² Certified Information Systems Security Professional (CISSP)
The Information Security Careers Network (ISCN) asked a 90,000-member LinkedIn community of cybersecurity professionals to rate their top certifications in order to compile a list of the top 10 most desirable certifications for 2021. The list included certifications from other associations and vendors, as well as the (ISC)2 Certified Cloud Security Professional (CCSP). Nearly three quarters of respondents (72%) identified the CISSP as the certification with the greatest demand in cybersecurity. Why is the CISSP the Most Valuable Cybersecurity Certification? CISSP validates skills and knowhow to design, implement and manage best-in-class cybersecurity programs.
CISSP or SSCP – Which One Is Right For Me?
When evaluating certification courses to advance their careers, cyber security professionals (or aspiring cybersecurity professionals) frequently consider both the SSCP and the CISSP. Both are a means to develop skills and expand knowledge. On first look, these two certifications seem to be similar. We are often asked to clarify what the differences are between the two, to assist candidates with selecting the one that is best placed to suit their goals. Read on to find the answer to the question - CISSP or SSCP - Which One Is Right For
Certified Information Systems Security Professional (CISSP) Domain Refresh
Effective May 1st 2021 Updating the CISSP exam ensures the certification remains current and relevant in a rapidly changing profession. This helps ensure that CISSPs demonstrate their expertise across the latest cybersecurity processes and best practices no matter when they earned their certification. The refreshed content of the CISSP reflects the most pertinent issues that cybersecurity professionals currently face, along with the best practices for mitigating those issues. The exam reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization's