SlideShare a Scribd company logo
1 of 1
Download to read offline
Developing and Connecting Cybersecurity Leaders Globally
 The Information Systems Security Association (ISSA)® is dedicated to developing and connecting cybersecurity leaders
                                                                    globally. ISSA is the community of choice for
                                                                    international cybersecurity professionals dedicated to
                                                                    advancing individual growth, managing technology
                                                                    risk and protecting critical information and
                                                                    infrastructure.

                                                                    The primary goal of the ISSA is to promote
                                                                    management practices that will ensure the
                                                                    confidentiality, integrity, and availability of
                                                                    information resources. ISSA facilitates interaction and
                                                                    education to create a more successful environment
                                                                    for global information systems security and for the
                                                                    professionals involved. Members include practitioners
                                                                    at all levels of the security field in a broad range of
                                                                    industries such as communications, education,
                                                                    healthcare, manufacturing, financial, and government.


                                                                    ISSA is dedicated to providing the
                                                                    following services to the information
                                                                    security community

 Promote the education and expand the knowledge and skills of its members in the interrelated fields of
  information systems security and information data processing
 Encourage a free exchange of information security techniques, approaches, and problem solving by its members
 Provide communication to keep members abreast of current events in information processing and security,
  providing benefits to them and their employers
 Communicate to Executives and senior management, and to systems and information processing professionals the
  importance of establishing cyber awareness and the controls necessary to ensure the secure organisation.

   Contact: Mike Loginov – Director ISSA UK – Security Leadership Academy e: mike.loginov@issa-uk.org M: +44 (0)
   7785238251 www.issa-uk.org

More Related Content

What's hot

Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
Dejan Jeremic
 
Information systems security_awareness_fy10
Information systems security_awareness_fy10Information systems security_awareness_fy10
Information systems security_awareness_fy10
Wesen Tegegne
 
Ensuring Effective Information Security Management Information Classification...
Ensuring Effective Information Security Management Information Classification...Ensuring Effective Information Security Management Information Classification...
Ensuring Effective Information Security Management Information Classification...
ijtsrd
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
360 BSI
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
Claudia Warwar
 
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
Marce Torres
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
JAYANT RAJURKAR
 

What's hot (20)

Research Agenda in Security Research
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Research
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
Chief Security Officer
Chief Security OfficerChief Security Officer
Chief Security Officer
 
Information systems security_awareness_fy10
Information systems security_awareness_fy10Information systems security_awareness_fy10
Information systems security_awareness_fy10
 
Information Security: quali aree di investimento?
Information Security: quali aree di investimento? Information Security: quali aree di investimento?
Information Security: quali aree di investimento?
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?
 
Ensuring Effective Information Security Management Information Classification...
Ensuring Effective Information Security Management Information Classification...Ensuring Effective Information Security Management Information Classification...
Ensuring Effective Information Security Management Information Classification...
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
 
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 

Similar to Developing And Connecting Cybersecurity Leaders Globally

Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReport
finance40
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
Ricky Lionel Vaz
 
Information security threats encountered by Malaysian public sector data cen...
Information security threats encountered by Malaysian public  sector data cen...Information security threats encountered by Malaysian public  sector data cen...
Information security threats encountered by Malaysian public sector data cen...
nooriasukmaningtyas
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 

Similar to Developing And Connecting Cybersecurity Leaders Globally (20)

Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReport
 
Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Information security threats encountered by Malaysian public sector data cen...
Information security threats encountered by Malaysian public  sector data cen...Information security threats encountered by Malaysian public  sector data cen...
Information security threats encountered by Malaysian public sector data cen...
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
IANS-2008
IANS-2008IANS-2008
IANS-2008
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
 
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
 

Developing And Connecting Cybersecurity Leaders Globally

  • 1. Developing and Connecting Cybersecurity Leaders Globally The Information Systems Security Association (ISSA)® is dedicated to developing and connecting cybersecurity leaders globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure. The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity, and availability of information resources. ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, financial, and government. ISSA is dedicated to providing the following services to the information security community  Promote the education and expand the knowledge and skills of its members in the interrelated fields of information systems security and information data processing  Encourage a free exchange of information security techniques, approaches, and problem solving by its members  Provide communication to keep members abreast of current events in information processing and security, providing benefits to them and their employers  Communicate to Executives and senior management, and to systems and information processing professionals the importance of establishing cyber awareness and the controls necessary to ensure the secure organisation. Contact: Mike Loginov – Director ISSA UK – Security Leadership Academy e: mike.loginov@issa-uk.org M: +44 (0) 7785238251 www.issa-uk.org