Knowledge (XXG)

ISC2

Source 📝

27: 222:
By 1990, the first working committee to establish something called the Common Body of Knowledge (CBK) had been formed. The work done by that committee resulted in the first version of CBK being finalized by 1992, with the CISSP credential launched by 1994, followed by the SSCP credential in 2001, the
326:
All certified ISC2 professionals are required to support the ISC2 Code of Ethics. Violations of the code of ethics are each investigated by a peer review panel, within the potential of revoking the certification. ISC2 (along with other security certification organizations) has been criticized for
218:
During the conference, the question was raised why virtually every group represented, save NIST and ISU, was creating a professional certification. The conference participants agreed to form a consortium that would attempt to bring together the competing agendas of the various organizations. In
219:
November 1988, the Special Interest Group for Computer Security (SIG-CS), a member of the Data Processing Management Association (DPMA), brought together several organizations interested in this. The ISC2 was formed in mid-1989 as a non-profit organization with this goal in mind.
164:
In the mid-1980s a need arose for a standardized and vendor-neutral certification program that provided structure and demonstrated competence in the field of IT security, and several professional societies recognized that certification programs attesting to the qualifications of
317:
All ISC2 certified professionals are required to earn Continuous Professional Education (CPE) credits on an annual basis in order to maintain their certifications. CPE credits can be obtained by attending industry events or conferences, writing articles/book reviews/books, etc.
226:
In 2001, ISC2 established its Europe, Middle East and Africa regional office in London. In 2002, ISC2 opened its Asia-Pacific regional office in Hong Kong. In 2015, ISC2 introduced its North America regional office in Washington, D.C.
308:
All ISC2 certifications are accredited and meet ANSI/ISO/IEC Standard 17024. Additionally, all certifications other than the CC meet DoD 8570.1 Baseline Certification standards. The CGRC is still listed as CAP on the DoD's table.
151:
which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization". The most widely known certification offered by ISC2 is the
641: 686: 415: 230:
Since 2011, ISC2 organizes the annual ISC2 Security Congress conference. The 2019 conference will be the first international iteration of the event and will be held in Orlando, Florida.
510: 485: 258: 266: 233:
In 2022, ISC2 pledged to expand and diversify the cybersecurity workforce by providing free ISC2 Certified in Cybersecurity education and exams to one million people worldwide.
274: 752: 336: 252: 211: 153: 180:(FISSEA) at Idaho State University in Pocatello, Idaho to address the need for standardized curriculum for the burgeoning profession. Organizations in attendance included: 742: 351: 173: 434: 616: 747: 419: 690: 596: 737: 205: 524: 393: 177: 193: 489: 236:
In August 2023, ISC2 launched their new website and rebrand, changing the abbreviation of their name from (ISC) to ISC2.
304:
Certified in Governance, Risk and Compliance Certification (CGRC) (formally Certified Authorization Professional (CAP))
549: 341: 187: 459: 438: 620: 301:
Health Care Information Security and Privacy Practitioner (HCISPP) (credential set to sunset December 1, 2026)
223:
CAP credential in 2005, and the CSSLP credential in 2008, the CCFP and HCISPP in 2013 and the CCSP in 2015.
148: 117: 65: 597:"ANSI Accreditation Services - International Information System Security Certification Consortium, Inc" 166: 78: 57: 199:
Data Processing Management Association Special Interest Group for Computer Security (DPMA SIG-CS)
732: 61: 726: 53: 26: 576:"Become an HCISPP – HealthCare Information Security and Privacy Practitioner" 575: 553: 525:"ISC2 Announces Major Milestone as Community Grows to Half a Million Strong" 460:"(ISC)2 releases government program for conference in Philly alongside ASIS" 511:"ISC2 Opens Global Enrollment for One Million Certified in Cybersecurity" 463: 416:"New board connects (ISC)2 security professionals to public policy" 394:"Skills shortage means no unemployment in IT security, says (ISC)2" 486:"(ISC)2 at a crossroads: CISSP value vs. security industry growth" 346: 277: 269: 261: 141:
International Information System Security Certification Consortium
20:
International Information System Security Certification Consortium
687:"Security Certifications' Ethics Programs Merely Window-Dressing" 196:
Special Interest Group for Certified Professionals (DPMA SIG-CP)
665: 371: 248:
for information security for the following certifications:
178:
Federal Information Systems Security Educators Association
292:
Certified Secure Software Lifecycle Professional (CSSLP)
714: 131: 462:. Government Security News. 2012-08-03. Archived from 259:
Information Systems Security Architecture Professional
267:
Information Systems Security Engineering Professional
275:
Information Systems Security Management Professional
337:
Certified Information Systems Security Professional
253:
Certified Information Systems Security Professional
212:
International Federation for Information Processing
154:
Certified Information Systems Security Professional
127: 115: 105: 97: 87: 71: 49: 41: 33: 174:National Institutes of Standards and Technology 298:Systems Security Certified Practitioner (SSCP) 184:Canadian Information Processing Society (CIPS) 172:In June 1988, a conference was hosted by the 8: 295:Certified Cloud Security Professional (CCSP) 19: 617:"DoD Approved 8570 Baseline Certifications" 753:Companies based in St. Petersburg, Florida 25: 18: 743:Non-profit organizations based in Florida 642:"ISC2 Certification Maintenance Handbook" 435:"(ISC)2: Execs Must Buy Into IT Security" 327:lack of education in the area of ethics. 206:Information Systems Security Association 16:Non-profit IT cybersecurity organization 363: 194:Data Processing Management Association 7: 619:. DoD Cyber Exchange. Archived from 433:Kerner, Sean Michael (2012-09-14). 169:personnel were desperately needed. 437:. eSecurity Planet. Archived from 418:. ComputerWorld UK. Archived from 14: 748:Organizations established in 1988 313:Continuous Professional Education 488:. SearchSecurity. Archived from 738:Computer security organizations 392:Ashford, Warwick (2012-09-11). 289:Certified in Cybersecurity (CC) 244:ISC2 maintains what it calls a 1: 689:. 2008-09-01. Archived from 414:Dunn, John E. (2012-04-18). 202:Idaho State University (ISU) 484:Parizo, Eric (2011-09-22). 342:UK cyber security community 240:Professional certifications 188:Computer Security Institute 101:Professional Certifications 769: 24: 246:Common Body of Knowledge 156:(CISSP) certification. 149:non-profit organization 66:Infrastructure Security 666:"ISC2 Code Of Ethics" 255:(CISSP), including: 167:information security 132:https://www.isc2.org 79:Alexandria, Virginia 58:Information Security 513:. ISC2. 2022-08-31. 21: 372:"ISC2 about page" 137: 136: 62:Software Security 760: 715:The ISC2 website 702: 701: 699: 698: 683: 677: 676: 674: 673: 662: 656: 655: 653: 652: 646: 638: 632: 631: 629: 628: 613: 607: 606: 604: 603: 593: 587: 586: 584: 583: 572: 566: 564: 562: 561: 552:. Archived from 546: 540: 539: 537: 536: 521: 515: 514: 507: 501: 500: 498: 497: 481: 475: 474: 472: 471: 456: 450: 449: 447: 446: 430: 424: 423: 411: 405: 404: 402: 401: 396:. ComputerWeekly 389: 383: 382: 380: 379: 368: 29: 22: 768: 767: 763: 762: 761: 759: 758: 757: 723: 722: 720: 711: 706: 705: 696: 694: 685: 684: 680: 671: 669: 664: 663: 659: 650: 648: 644: 640: 639: 635: 626: 624: 615: 614: 610: 601: 599: 595: 594: 590: 581: 579: 574: 573: 569: 559: 557: 548: 547: 543: 534: 532: 523: 522: 518: 509: 508: 504: 495: 493: 483: 482: 478: 469: 467: 458: 457: 453: 444: 442: 432: 431: 427: 413: 412: 408: 399: 397: 391: 390: 386: 377: 375: 370: 369: 365: 360: 333: 324: 315: 285:and including: 242: 176:(NIST) and the 162: 120: 111:600,000+ (2024) 108: 90: 83: 17: 12: 11: 5: 766: 764: 756: 755: 750: 745: 740: 735: 725: 724: 718: 717: 710: 709:External links 707: 704: 703: 678: 657: 633: 608: 588: 567: 541: 516: 502: 476: 451: 425: 422:on 2015-09-28. 406: 384: 362: 361: 359: 356: 355: 354: 349: 344: 339: 332: 329: 323: 322:Code of Ethics 320: 314: 311: 306: 305: 302: 299: 296: 293: 290: 283: 282: 281: 280: 272: 264: 241: 238: 216: 215: 209: 203: 200: 197: 191: 185: 161: 158: 135: 134: 129: 125: 124: 121: 116: 113: 112: 109: 106: 103: 102: 99: 95: 94: 91: 88: 85: 84: 82: 81: 75: 73: 69: 68: 51: 47: 46: 43: 39: 38: 35: 31: 30: 15: 13: 10: 9: 6: 4: 3: 2: 765: 754: 751: 749: 746: 744: 741: 739: 736: 734: 731: 730: 728: 721: 716: 713: 712: 708: 693:on 2013-05-21 692: 688: 682: 679: 667: 661: 658: 643: 637: 634: 623:on 2023-03-13 622: 618: 612: 609: 598: 592: 589: 577: 571: 568: 556:on 2008-12-17 555: 551: 550:"About (ISC)" 545: 542: 530: 526: 520: 517: 512: 506: 503: 492:on 2021-04-22 491: 487: 480: 477: 466:on 2013-05-21 465: 461: 455: 452: 441:on 2017-12-10 440: 436: 429: 426: 421: 417: 410: 407: 395: 388: 385: 373: 367: 364: 357: 353: 350: 348: 345: 343: 340: 338: 335: 334: 330: 328: 321: 319: 312: 310: 303: 300: 297: 294: 291: 288: 287: 286: 279: 278:(CISSP-ISSMP) 276: 273: 271: 270:(CISSP-ISSEP) 268: 265: 263: 262:(CISSP-ISSAP) 260: 257: 256: 254: 251: 250: 249: 247: 239: 237: 234: 231: 228: 224: 220: 213: 210: 207: 204: 201: 198: 195: 192: 189: 186: 183: 182: 181: 179: 175: 170: 168: 159: 157: 155: 150: 146: 142: 133: 130: 126: 122: 119: 114: 110: 104: 100: 96: 92: 86: 80: 77: 76: 74: 70: 67: 63: 59: 55: 54:Cybersecurity 52: 48: 44: 40: 36: 32: 28: 23: 719: 695:. Retrieved 691:the original 681: 670:. Retrieved 660: 649:. Retrieved 636: 625:. Retrieved 621:the original 611: 600:. Retrieved 591: 580:. Retrieved 570: 558:. Retrieved 554:the original 544: 533:. Retrieved 531:. 2023-08-18 529:www.isc2.org 528: 519: 505: 494:. Retrieved 490:the original 479: 468:. Retrieved 464:the original 454: 443:. Retrieved 439:the original 428: 420:the original 409: 398:. Retrieved 387: 376:. Retrieved 366: 325: 316: 307: 284: 245: 243: 235: 232: 229: 225: 221: 217: 171: 163: 144: 140: 138: 89:Area served 727:Categories 697:2024-05-16 672:2024-05-16 651:2024-05-16 627:2024-05-16 602:2024-05-16 582:2024-05-16 560:2024-05-16 535:2024-05-16 496:2024-05-16 470:2024-05-16 445:2024-05-16 400:2024-05-16 378:2024-05-16 358:References 123:Clar Rosso 45:Non-profit 107:Members 93:Worldwide 331:See also 98:Services 72:Location 565:. (ISC) 160:History 147:, is a 128:Website 34:Founded 733:(ISC)² 668:. ISC2 647:. ISC2 578:. ISC2 374:. ISC2 214:(IFIP) 208:(ISSA) 645:(PDF) 347:ISACA 190:(CSI) 143:, or 50:Focus 352:IAPP 145:ISC2 139:The 118:CEO 42:Type 37:1989 729:: 527:. 64:, 60:, 56:, 700:. 675:. 654:. 630:. 605:. 585:. 563:. 538:. 499:. 473:. 448:. 403:. 381:.

Index


Cybersecurity
Information Security
Software Security
Infrastructure Security
Alexandria, Virginia
CEO
https://www.isc2.org
non-profit organization
Certified Information Systems Security Professional
information security
National Institutes of Standards and Technology
Federal Information Systems Security Educators Association
Computer Security Institute
Data Processing Management Association
Information Systems Security Association
International Federation for Information Processing
Certified Information Systems Security Professional
Information Systems Security Architecture Professional
(CISSP-ISSAP)
Information Systems Security Engineering Professional
(CISSP-ISSEP)
Information Systems Security Management Professional
(CISSP-ISSMP)
Certified Information Systems Security Professional
UK cyber security community
ISACA
IAPP
"ISC2 about page"
"Skills shortage means no unemployment in IT security, says (ISC)2"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.