Women’s Society of Cyberjutsu

ABOUT WOMEN’S SOCIETY OF CYBERJUTSU: Founded in 2012, The Women’s Society of Cyberjutsu (WSC) is a Northern Virginia-based 501(c)3 non-profit organization focused on empowering women to succeed in the cybersecurity industry. WSC’s mission is to advance women in cybersecurity careers by providing programs and partnerships that promote networking, education, training, mentoring, resource-sharing and other professional[…]

Read More

CompliancePoint is a leading Information Security and Risk Management company, delivering assessment, cyber security, and managed security services. CompliancePoint offers these services for a wide range of industry and regulatory standards such as PCI DSS, HIPAA/HITECH, SSAE SOC, ISO 27001, FISMA/NIST, and FedRamp. CompliancePoint’s expertise also expands beyond the compliance requirements to include comprehensive protection[…]

Read More
Tech Fetch

IT and tech jobseekers post resumes for free on TAG’s job board. Click candidate tab at http://www.techfetch.com/job/tagonline to post. The TAG-TechFetch co-branded job board will connect you to over 400 tech recruiters and representatives from tech enabled companies located in Georgia. Choose TAG’s job board for your career search and find your next opportunity today[…]

Read More
ISSA Connecticut

As Connecticut’s preeminent community of IT Security professionals, ISSA-CT connects local cyber security professionals with unique networking opportunities. We also serve as a platform for professional development — for those willing to volunteer organizing chapter activities. Finally, we’re a resource to national events, through our parent organization Information Systems Security Association (ISSA). We look forward[…]

Read More

Chiron’s Pyramid Capture the Flag (CTF) competition has a different perspective from most CTFs you’ll find at conferences and on-line events. The Pyramid is an individually played CTF within a contained virtual network by using either the (very) limited laptops provided or your own laptops (not designed for team play). Players can access the Pyramid[…]

Read More
National Cybersecurity Student Association

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration. This group supports the cybersecurity educational programs of academic institution, inspires career awareness and encourages creative efforts to increase the number of underrepresented populations in the field. Benefits of Membership ($25 Annual[…]

Read More

Not All Network Security is Created Equal Cyber Security Solutions Tailored for Small to Mid-sized Businesses Ensuring data security and regulatory compliance means protecting your small to mid-sized business from the increasing threat of a cyber-attack with cost effective enterprise-class solutions. Protection of critical business networks requires specific cyber security and information assurance expertise. Depend[…]

Read More

Gemalto Brings Trust to Every Day Services SafeNet and Gemalto have recently joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering security services that are used[…]

Read More

  CounterTack | MCSI is the leading provider of real-time, Big Data endpoint detection and response technology for the enterprise. CounterTack | MCSI provides unprecedented visibility and context around operating system and binary behaviors to detect zero-day attacks, rootkits, targeted malware and advanced persistent threats, enabling our customers to improve incident response and advanced threat[…]

Read More

CBI manages IT security risk and helps ensure your data is secure, compliant and available. No matter your industry our Subject Matter Experts, tailored assessments and custom solutions help safeguard your organization’s information. Our proven process and CBI Guarantee allows you to prepare, manage and navigate issues that can damage your business and reputation. For[…]

Read More

Are you Ready to be a CCISO?

Subscribe to the CISO Podcast

CCISO Body of Knowledge

The EC-Council CCISO Body of Knowledge covers all five of the CCISO Information Security Management Domains in depth and was written by seasoned CISOs for current and aspiring CISOs.

Get your copy today

Featured Whitepaper