www.infosecurity-magazine.com Open in urlscan Pro
18.66.248.31  Public Scan

Submitted URL: https://links.e.rsaconference.com/els/v2/XX4-hDaPXZJE/Zko3QWJsUXpOV3dqcWFUSFBLL00vMGVlQkU5VjhEMWY5NlUvZWlpUXU0dWRHcDRSSjRTU1krNFdm...
Effective URL: https://www.infosecurity-magazine.com/interviews/interview-isc2s-ceo-human-element/
Submission: On May 26 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Infosecurity Group Websites
 * 
 * Magazine
 * Events
   * Infosecurity Europe
   * Infosecurity Leadership Summit
   * Infosecurity Magazine Events
   * Infosecurity North America
   * Infosecurity Netherlands
   * Infosecurity Belgium
   * Infosecurity Russia
   * Infosecurity Mexico
   * Infosecurity Middle East
 * Insight
   * Infosecurity Webinars
   * Infosecurity Whitepapers
   * Infosecurity Online Summits

 * Log In
 * Sign Up

 * ×
   
   search
    

 * News
 * Magazine Features
 * Opinions
 * News Features
 * Interviews
 * Editorial
 * Blogs
 * Reviews
 * Slackspace
 * Next-Gen Infosec
 * Webinars
 * White Papers
 * Podcasts
 * Industry Events & Training
 * Magazine Events
 * Online Summits
 * Company Directory

 * Application Security
 * Automation
 * Big Data
 * Business Continuity
 * Cloud Security
 * Compliance
 * Cybercrime
 * Data Protection
 * Digital Forensics
 * Encryption
 * Human Factor
 * Identity Access Management
 * Industry Announcements
 * Internet Security
 * Malware
 * Managed Services
 * Mobile Security
 * Network Security
 * Payment Security
 * Physical and Information Security Convergence
 * Privacy
 * Risk Management
 * The Internet of Things
 * Infosec Blog

 * Log In
 * Sign Up


Latest
 * Multi-Continental Operation Leads to Arrest of Cybercrime Gang Leader
 * Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will
   Shortly Be Obsolete
 * State of Cybersecurity Report 2022 Names Ransomware and Nation-State Attacks
   As Biggest Threats
 * Organizations Urged to Fix 41 Vulnerabilities Added to CISA’s Catalog of
   Exploited Flaws
 * 18 Oil and Gas Companies Take Cyber Resilience Pledge



 *  
 * News
 * Topics
 * Features
 * Webinars
 * White Papers
 * Podcasts
 * Events & Conferences
 * Directory
 * Search
   * ×
     
     search
      


Infosecurity Magazine Home » Interviews » Interview: (ISC)2's CEO Discusses
Cybersecurity's Human Element
6 May 2022 Interview


INTERVIEW: (ISC)2'S CEO DISCUSSES CYBERSECURITY'S HUMAN ELEMENT

JAMES COKER REPORTER, INFOSECURITY MAGAZINE

 * Follow @ReporterCoker



Thankfully, the cyber skills gap is a topic receiving a growing amount of
attention, and given the urgency of the situation, rightly so. It also features
heavily in the UK government’s recent national cyber strategy, published at the
end of last year. However, the shortfall of skilled workers in the industry
remains critical, with the (ISC)2’s most recent Cybersecurity Workforce
Study finding it is 65% below what it needs to be.

It’s a problem requiring both long and short-term solutions, and these are at
the heart of the raison d’etre of (ISC)2, a professional association
specializing in training and certifications for cybersecurity professionals.

Recently, Infosecurity met with the association’s CEO Clar Rosso at (ISC)2’s
office in Mayfair, in the heart of London, UK, to discuss tackling the cyber
skills gap in addition to other pertinent topics in the field, including the
impact of the Russia-Ukraine conflict on the cyber-threat landscape.


BOOSTING THE TALENT PIPELINE

Rosso, who was appointed to her current post in October 2021, outlined several
new initiatives the (ISC)2 is taking to boost the pipeline of skilled workers in
the industry. One of these is its Entry-Level Cybersecurity Certification,
“which will help demonstrate that an individual has an aptitude for moving into
a cybersecurity career.” Rosso revealed that the certification’s exam is being
piloted and a full launch is planned this summer.

In conjunction with the new certification, (ISC)2 is working with employers to
help ensure entry-level cybersecurity professionals are able to work
independently in paid roles as soon as possible. This is an attempt to deal with
the ‘chicken and the egg’ situation that permeates the sector – whereby
employers generally only employ those who already have significant work
experience. “They want them to come into the profession fully experienced, and
that’s a problem – where are they going to get that experience?” explained
Rosso.

(ISC)2’s entry-level certification is part of a broader initiative to make it
easier for youngsters to develop their technical skills or for those working in
other industries to retrain in cybersecurity. Developing these alternative
routes into the sector will undoubtedly be critical in closing the skills gap,
and Rosso has observed some positive recent signs in this direction. She noted
that new recruitment practices are starting to take hold in many organizations,
whereby a greater emphasis is being placed on soft skills, such as problem
solving and communication, above technical qualifications. For example, she
observed that recruiters increasingly attend cybersecurity competitions to watch
the participants in action. “They don’t focus on interviewing them; they watch
and see whether they’re demonstrating those kinds of non-technical skills –
analytical thinking, problem-solving and ability to communicate – and hire them
based on that alone,” said Rosso. 



Clar Rosso, CEO, ISC(2)

Rosso herself came into the sector through an unorthodox route – following a
lengthy career in accounting and finance. Despite the lack of technical
knowledge, she quickly found significant similarities between the two sectors,
particularly in areas like risk management and compliance. This experience and
perspective are likely to prove invaluable as the relatively young cybersecurity
industry matures. This includes how it is regulated, which is an area of focus
for the recently formed UK Cyber Security Council. For instance, “the model used
to govern accountancy in the UK would be one to think about if we do move
forward with chartering individuals in cybersecurity,” stated Rosso.  


KEEPING CERTIFICATIONS RELEVANT

To help improve her technical skills and knowledge, Rosso is currently
undertaking (ISC)2’s renowned Certified Information Systems Security
Professional (CISSP). At a time when the relevance of certifications in the
sector is increasingly being questioned, Rosso argued that qualifications like
CISSP continue to play a significant role by providing “an extra level of
confidence” to employers about an individual’s capabilities following their
earlier education pathway.

Nevertheless, Rosso said (ISC)2’s approach to certifications is evolving to
ensure it remains relevant. This includes marrying qualifications together more
with other educational pathways such as university degrees “so they’re not
looked at as separate paths but as complementary things.” She pointed out that
certifications are already embedded in many relevant university courses in the
US, and this is an area now being actively explored in the UK, particularly with
the new entry-level certification.

Another essential means of closing the cyber skills gap is making the sector
more diverse in areas like neuro, ethnicity and gender. This is also vital in
improving the quality of the cybersecurity profession, as “the more diverse
teams you have, the better they are at solving problems.”

Rosso acknowledges that lack of diversity is a particular issue at (ISC)2, where
only around 9% of its members are women. This is despite the accreditation body
estimating that females make up 22-24% of the global cyber workforce, a figure
which, while improving, remains too low in itself. She believes the even lower
female representation in industry associations like (ISC)2 could be due to not
seeing enough people who look like them in those organizations and attending
their events. Indeed, Rosso admitted she was taken aback by the lack of female
attendees at the (ISC)2 Secure London conference last month. “You have to have a
programmed effort so that when new people are coming into the organizations,
they can connect with others and feel welcome,” she noted.





> “You have to have a programmed effort so that when new people are coming into
> the organizations, they can connect with others and feel welcome”


CYBER IMPLICATIONS OF RUSSIA-UKRAINE

One topic that simply has to be mentioned at the moment is the ongoing
Russia-Ukraine conflict, and this context, its implications for the global
cyber-threat landscape. One observation made by Rosso is that certain
cyber-threats emanating from the crisis may not be public knowledge due to
intelligence services withholding the information for security reasons.
Therefore, she believes that government agencies need to be more forthcoming
with providing such information in the future. “That creates a huge risk for
businesses, and at some point, we need to talk about that,” outlined Rosso.
“Just like the government wants businesses to report breaches, the government
needs to help businesses understand their risks.”

(ISC)2 also recently surveyed its members about their biggest concerns relating
to Russia’s invasion of Ukraine, producing some interesting findings. The
biggest fear outlined by participants was the immediate threat to critical
infrastructure and essential supply chains, which could potentially put lives at
risk throughout the world. This was followed by a lack of preparedness to combat
attacks on critical services and data loss/ability to do business.

Rosso found the next three concerns listed by the respondents especially
noteworthy. In fourth place was precedent, with cybersecurity professionals
predicting that cyber warfare tactics will become the global norm, affecting all
types of organizations. “I think there is agreement that this is going to become
the global norm, and we’re going to have to figure out how we deal with it,” she
stated.

In fifth was opportunism, with a number of cybersecurity professionals
foreseeing cyber-criminals using the attention placed on the conflict to sneak
through attacks undetected. The final and “most sobering” concern was not to
lose sight of the human cost of the conflict, remembering that the real damage
of the war is not being caused by cyber-attacks but by weapons. A respondent
from Ukraine summed up this sentiment: “Right now all our services are under
physical attack, so cyber-attacks in comparison with physical [destruction] of
our infrastructure and people [takes] second place.”

The discussion concluded with Rosso revealing what she believes is the sector’s
biggest challenge over the coming years. Perhaps unsurprisingly, this focuses on
the human element, addressing the human-technology tension. She believes many
people see technology alone as the “magic pill” to cyber-threats, which is a
dangerous mindset to have. “Technology is only going to be as good as the people
using it or the people providing input into it,” she emphasized. “So the
solution involves technology but it also involves people.”

The importance of focusing on people, despite the technical nature of
cybersecurity, was a constant theme of Infosecurity’s conversation with Rosso.
This is something industry professionals should not lose sight of as we prepare
for an era of unparalleled technical advances, such as artificial intelligence
and quantum. Such technologies will only be a force for good with the right
personnel and skillsets at the helm.




Related to This Story
 * #CCSE22: The Latest Cybersecurity Workforce Trends
 * #PrideMonth: Charles Britt Discusses LGBTQ Representation in Cyber
 * Is the "Cyber Skills Shortage" a Misnomer?
 * #BSidesSF2019: We Must Question Unintentional Biases to Fix the Cybersecurity
   Diversity Gap
 * Cyber Scholarship to Build Multicultural Workforce


WHAT’S HOT ON INFOSECURITY MAGAZINE?

 * Read
 * Shared
 * Watched
 * Editor's Choice

1
8 Jul 2021 News


NEW PRINTNIGHTMARE PATCH CAN BE BYPASSED, SAY RESEARCHERS


2
8 Jul 2021 News


CYBERCRIME COSTS ORGANIZATIONS NEARLY $1.79 MILLION PER MINUTE


3
8 Jul 2021 News


CTOS KEEPING QUIET ON BREACHES TO AVOID CYBER BLAME GAME


4
7 Jul 2021 News


OVER 170 SCAM CRYPTOMINING APPS CHARGE FOR NON-EXISTENT SERVICES


5
7 Jul 2021 News


MOST INSIDER DATA BREACHES AREN'T MALICIOUS


6
7 Jul 2021 News


KREMLIN HACKERS REPORTEDLY BREACHED REPUBLICAN NATIONAL COMMITTEE



1
26 May 2022 News


18 OIL AND GAS COMPANIES TAKE CYBER RESILIENCE PLEDGE


2
26 May 2022 News


MULTI-CONTINENTAL OPERATION LEADS TO ARREST OF CYBERCRIME GANG LEADER


3
26 May 2022 News


THREE-QUARTERS OF SECURITY PROS BELIEVE CURRENT CYBERSECURITY STRATEGIES WILL
SHORTLY BE OBSOLETE


4
26 May 2022 News


STATE OF CYBERSECURITY REPORT 2022 NAMES RANSOMWARE AND NATION-STATE ATTACKS AS
BIGGEST THREATS


5
25 May 2022 News


ORGANIZATIONS URGED TO FIX 41 VULNERABILITIES ADDED TO CISA’S CATALOG OF
EXPLOITED FLAWS


6
25 May 2022 News


MESSAGES SENT THROUGH ZOOM CAN EXPOSE PEOPLE TO CYBER-ATTACK



1
8 Jul 2021 Webinar


OVERCOMING 'SHADOW IT' NEED AND RISK


2
23 Sep 2021 Webinar


HOW TO RETHINK END-USER PROTECTION AND ELIMINATE PHISHING AND RANSOMWARE


3
21 Oct 2021 Webinar


MACHINE ID MANAGEMENT AND DIGITAL TRANSFORMATION: BUILDING A SECURE FUTURE


4
16 Sep 2021 Webinar


NEW STRATEGIES FOR MANAGING MACHINE IDENTITIES


5
7 Oct 2021 Webinar


THIRD-PARTY VULNERABILITIES: DEMYSTIFYING THE UNKNOWN


6
24 Jun 2021 Webinar


DEFINING THE ZERO TRUST AND SASE RELATIONSHIP



1
14 Feb 2022 Digital Edition


INFOSECURITY MAGAZINE, DIGITAL EDITION, Q1, 2022, VOLUME 19, ISSUE 1


2
24 Feb 2022 Webinar


HACKERS ARE STRIKING GOLD WITH YOUR EMPLOYEES' PII


3
3 Feb 2022 Podcast


INTOSECURITY CHATS, EPISODE 8: BRIAN HONAN, BROUGHT TO YOU BY HP


4
14 Feb 2022 News Feature


AS NATION-STATE AND CYBERCRIME THREATS CONFLATE, SHOULD CISOS BE WORRIED?


5
14 Feb 2022 Editorial


EDITORIAL: ONLY THE GOOD DIE YOUNG (Q1 2022 ISSUE)


6
17 Mar 2022 Webinar


THE JOURNEY BEYOND THE ENDPOINT




 * The Magazine
 * About Infosecurity
 * Subscription
 * Meet the Team
 * Contact Us
 * Cookies Settings

 * Advertisers
 * Media Pack

 * Contributors
 * Forward Features
 * Op-ed
 * Next-Gen Submission

 * Copyright © 2022 Reed Exhibitions Ltd.
 * Terms and Conditions
 * Privacy Policy
 * Intellectual property statement
 * Cookie Policy
 * Sitemap
 * 

Please wait…









COOKIE PREFERENCE CENTRE

We process your information, to deliver content or advertisements and measure
the delivery of such content or advertisements, extract insights, and generate
reports to understand service usage; and/or accessing or storing information on
devices for that purpose.

You can choose not to allow some types of cookies. However, blocking some types
of cookies may impact your experience of the site and the services we are able
to offer. Click on the different category headings to find out more, to change
our default settings, and/or view the list of Google Ad-Tech Vendors.


Cookie Policy



MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.



Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. If you do not allow these cookies, you will
experience less targeted advertising.

Cookies Details‎

UNCATEGORISED COOKIES

Uncategorised cookies

Uncategorised cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

Cookies Details‎
Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES



Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed

 * HOST DESCRIPTION
   
   View Cookies
   
   REPLACE-WITH-DYANMIC-HOST-ID
    * Name
      cookie name

Confirm My Choices


We use cookies to analyse and improve our service, to improve and personalise
content, advertising and your digital experience. We also share information
about your use of our site with our social media, advertising and analytics
partners. Cookie Policy

Accept All Cookies
Cookies Settings