Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

C-Level & Studying for the CISSP
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
2/4/2020 | 11:44:40 AM
C-Level and Cramming a CISSP for the sake of a qualification...
There is a VERY strong argument that a CISSP that has been aquired by cramming information during a "boot camp" is both wasted and ineffective, esepcially if this is a certification that is outide of your professional scope.

CISSP/CISM/CISA qualifications should be used as a validation of your existing expertese within the Security industry.  Its also important to note that if people have not been directly working within one of the security domains for a minimum of 5 years, then it is likely that they are stretching the truth when it comes to attesting their eligability.  

Too many people are jumping on this nowadays trying to get a Cyber paycheck when instead they should focus on doing what they are doing, and doing it well.  This results in poor cyber professionals who learn "by the book" concepts as apposed to the pragmatic application of security concepts.

Its honestly undermines a certification and execs should be VERY wary of this as the industry starts to mature.

Also, for all the people who crammed andallowed their CISSP/CISM to lapse - please take this off of your resume if you arent going to maintain your experience and knowledge...

Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-04-02
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
PUBLISHED: 2020-04-01
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware u...
PUBLISHED: 2020-04-01
The UniFi Video Server (Windows) web interface configuration restore functionality at the “backup� and “wizard� endpoints does not implement sufficient privilege checks. Low privileged users, belonging to the PUBLIC_GROUP ...
PUBLISHED: 2020-04-01
In UniFi Video v3.10.1 (for Windows 7/8/10 x64) there is a Local Privileges Escalation to SYSTEM from arbitrary file deletion and DLL hijack vulnerabilities. The issue was fixed by adjusting the .tsExport folder when the controller is running on Windows and adjusting the SafeDllSearchMode in the win...
PUBLISHED: 2020-04-01
LearnDash Wordpress plugin version below 3.1.6 is vulnerable to Unauthenticated SQL Injection.