SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
The Value of HISP
                    Certification
              John A. DiMaria;Six Sigma BB, HISP
                        President, HISPI




©2010 HISPI
On-Going Challenges Raise the Bar

              A study released by Gartner predicted that:
              "Security certification will be required of 40
              percent of personnel having d t d
                     t f            l h i day-to-day
              technical operations responsibility".




©2010 HISPI
Demand for qualified practitioners on
                      the i
                      th rise
         Recent trends show that the demand and
         funding for qualified information security
         p
         practitioners with industry credentials and
                                   y
         certifications continues to rise.




©2010 HISPI
Demand for qualified practitioners on
                      the i
                      th rise
          More specifically, companies are looking for
          information security professionals trained in the
          specific disciplines necessary to build and
          maintain a f
              i t i   formal I f
                             l Information Security
                                      ti S      it
          Management System (ISMS).
                                            Survey released by Ernest &
                                            Young titled: “Outpacing
                                            change Ernst & Young’s 12th
                                            annual global information
                                            security survey”
                                                     survey


©2010 HISPI
Governance, risk and compliance
                 spending to grow in 2010
              The bulk of the spending -- nearly 70% -- is
              pegged for people and processes, rather than
              technology.
              Risk mitigation, and cost reduction were cited
              as top motivators for GRC spending.




©2010 HISPI
K considerations th t are d i i
              Key     id ti      that      driving
                  the need for certification
              Ability to verify skills and/or competencies in
              the information security profession.
              Validation for companies seeking to hire.
              Ensuring information security staffs maintain
              up-to-date knowledge and skill-sets.
              Providing employers ‘ROI’.
              Assurance that information security
              practitioners maintain a high degree of
              confidence.
                  fid
©2010 HISPI
Why Consider the Holistic Information
   Security Practitioner (HISP) Certification?
          y              (    )
              The HISP certification has a unique body of
              knowledge.
              knowledge The HISP certification focuses on widely
              accepted frameworks for developing an Information
              Security program or Information Security
              Management System. These frameworks include:
              M             tS t     Th     f       k i l d
                  ISO/IEC 27001 and 27002;
                  CobIT (ISACA s framework for IT Governance);
                          (ISACA’s
                  COSO
                  ITIL

©2010 HISPI
Why Consider the Holistic Information
   Security Practitioner (HISP) Certification?
         The HISP enhances other certifications such as the CISSP, CISM,
         CISA, CFA.
         The HISP bridges the gap between existing professional certification
         programs.
         The HISP promotes cost-effective training and certification to
         information security, audit and compliance professionals.
         The HISP provides a vendor neutral forum that will facilitate the
         sharing of knowledge.
         HISP fosters collaborative efforts across various sectors
         internationally.
         HISP certification fosters a positive code of ethics amongst
         information security, audit and compliance professionals.
                             y,                p      p
         Finally, a HISP certified individual can help their organization reduce
         the cost of meeting legal, regulatory and contractual requirements.
©2010 HISPI
Some just “say what they can
              do”……….HISP’s can “do what they
              say”.
                 Take the challenge………………..




©2010 HISPI
8075 Mall Parkway
                               Suite
                               S it 101367
                            Lithonia, GA 30038
                             PH: 888-247-4858
                            Fax: 720-293-2118
                               www.hispi.org
                           questions@hispi.org
                           questions@hispi org

                            Governance Board
                  John DiMaria; President – jdimaria@hispi org
                                            jdimaria@hispi.org
              Gary Sheehan; Vice President - gsheehan@hispi.org
                   Taiye Lambo; Treasurer- tlambo@hispi.org
    Joesph Watts; Director of Higher Ed. & Member Services – jwatts@hispi.org
        p                       g                            j     @ p      g
                Ralph Johnson; Secretary – rjohnson@hispi.org
           Tom Stamulis; Accreditation Officer – tstamulis@hispi.org
©2010 HISPI

Contenu connexe

Tendances

Prinya acis slide for swpark - it & information security human resource deve...
Prinya acis slide for swpark  - it & information security human resource deve...Prinya acis slide for swpark  - it & information security human resource deve...
Prinya acis slide for swpark - it & information security human resource deve...TISA
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Dr. Ahmed Al Zaidy
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFLABS SRL
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Dr. Ahmed Al Zaidy
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3techcouncil
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Dr. Ahmed Al Zaidy
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Dr. Ahmed Al Zaidy
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0theonassiokas
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Dr. Ahmed Al Zaidy
 
The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0theonassiokas
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Dr. Ahmed Al Zaidy
 

Tendances (20)

Prinya acis slide for swpark - it & information security human resource deve...
Prinya acis slide for swpark  - it & information security human resource deve...Prinya acis slide for swpark  - it & information security human resource deve...
Prinya acis slide for swpark - it & information security human resource deve...
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
 
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
 
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
 

En vedette

Smark Brands & Communities 2014
Smark Brands & Communities 2014 Smark Brands & Communities 2014
Smark Brands & Communities 2014 Dana Pascu
 
AIG Third Quarter 2008 Earnings Press Release
AIG Third Quarter 2008 Earnings Press ReleaseAIG Third Quarter 2008 Earnings Press Release
AIG Third Quarter 2008 Earnings Press Releasefinance2
 
morgan stanley Earnings Archive 2004 3rd
morgan stanley Earnings Archive 2004 3rd morgan stanley Earnings Archive 2004 3rd
morgan stanley Earnings Archive 2004 3rd finance2
 
Alfabetització numèrica
Alfabetització numèricaAlfabetització numèrica
Alfabetització numèricaJuanjo Cardenas
 
valero energy Annual Reports 2003
valero energy Annual Reports 2003valero energy Annual Reports 2003
valero energy Annual Reports 2003finance2
 
Not Innocent Until Proven Guilty
Not Innocent Until Proven GuiltyNot Innocent Until Proven Guilty
Not Innocent Until Proven Guiltyguest949cfc
 
Apple WWDC Mobility Review 2014
Apple WWDC Mobility Review 2014Apple WWDC Mobility Review 2014
Apple WWDC Mobility Review 2014Manesh Lad
 
morgan stanley Earnings Archive 2002 3rd
morgan stanley Earnings Archive 2002 3rd morgan stanley Earnings Archive 2002 3rd
morgan stanley Earnings Archive 2002 3rd finance2
 
Aust dp
Aust dpAust dp
Aust dpkoutly
 
Bear Stearns 2003 Global Healthcare Conference Presentation
	 Bear Stearns 2003 Global Healthcare Conference Presentation	 Bear Stearns 2003 Global Healthcare Conference Presentation
Bear Stearns 2003 Global Healthcare Conference Presentationfinance2
 
morgan stanley Earnings Archive 2008 2nd
morgan stanley Earnings Archive 2008  2ndmorgan stanley Earnings Archive 2008  2nd
morgan stanley Earnings Archive 2008 2ndfinance2
 
Saint Luke’s at McKesson’s HIMSS Booth Side Review
	 Saint Luke’s at McKesson’s HIMSS Booth Side Review	 Saint Luke’s at McKesson’s HIMSS Booth Side Review
Saint Luke’s at McKesson’s HIMSS Booth Side Reviewfinance2
 
cardinal health Q2 2008 Earnings Release
cardinal health Q2 2008 Earnings Releasecardinal health Q2 2008 Earnings Release
cardinal health Q2 2008 Earnings Releasefinance2
 
home depot 2007 Annual Report
home depot 2007 Annual Reporthome depot 2007 Annual Report
home depot 2007 Annual Reportfinance2
 
SMLF Opening Presentation London Dec 2014
SMLF Opening Presentation London Dec 2014SMLF Opening Presentation London Dec 2014
SMLF Opening Presentation London Dec 2014Daniel Kraft
 
Evaluation
EvaluationEvaluation
Evaluationbirch_17
 
2002 CSFB Healthcare Conference
2002 CSFB Healthcare Conference2002 CSFB Healthcare Conference
2002 CSFB Healthcare Conferencefinance2
 
Mekesson Quarterly Reports 2003 3rd
Mekesson Quarterly Reports 2003 3rdMekesson Quarterly Reports 2003 3rd
Mekesson Quarterly Reports 2003 3rdfinance2
 
valero energy Annual Reports 2002
valero energy Annual Reports 2002valero energy Annual Reports 2002
valero energy Annual Reports 2002finance2
 
BERKSHIRE HATHAWAY INC Annual & Interim Reports2007 1st
BERKSHIRE HATHAWAY INC Annual & Interim Reports2007 1st BERKSHIRE HATHAWAY INC Annual & Interim Reports2007 1st
BERKSHIRE HATHAWAY INC Annual & Interim Reports2007 1st finance2
 

En vedette (20)

Smark Brands & Communities 2014
Smark Brands & Communities 2014 Smark Brands & Communities 2014
Smark Brands & Communities 2014
 
AIG Third Quarter 2008 Earnings Press Release
AIG Third Quarter 2008 Earnings Press ReleaseAIG Third Quarter 2008 Earnings Press Release
AIG Third Quarter 2008 Earnings Press Release
 
morgan stanley Earnings Archive 2004 3rd
morgan stanley Earnings Archive 2004 3rd morgan stanley Earnings Archive 2004 3rd
morgan stanley Earnings Archive 2004 3rd
 
Alfabetització numèrica
Alfabetització numèricaAlfabetització numèrica
Alfabetització numèrica
 
valero energy Annual Reports 2003
valero energy Annual Reports 2003valero energy Annual Reports 2003
valero energy Annual Reports 2003
 
Not Innocent Until Proven Guilty
Not Innocent Until Proven GuiltyNot Innocent Until Proven Guilty
Not Innocent Until Proven Guilty
 
Apple WWDC Mobility Review 2014
Apple WWDC Mobility Review 2014Apple WWDC Mobility Review 2014
Apple WWDC Mobility Review 2014
 
morgan stanley Earnings Archive 2002 3rd
morgan stanley Earnings Archive 2002 3rd morgan stanley Earnings Archive 2002 3rd
morgan stanley Earnings Archive 2002 3rd
 
Aust dp
Aust dpAust dp
Aust dp
 
Bear Stearns 2003 Global Healthcare Conference Presentation
	 Bear Stearns 2003 Global Healthcare Conference Presentation	 Bear Stearns 2003 Global Healthcare Conference Presentation
Bear Stearns 2003 Global Healthcare Conference Presentation
 
morgan stanley Earnings Archive 2008 2nd
morgan stanley Earnings Archive 2008  2ndmorgan stanley Earnings Archive 2008  2nd
morgan stanley Earnings Archive 2008 2nd
 
Saint Luke’s at McKesson’s HIMSS Booth Side Review
	 Saint Luke’s at McKesson’s HIMSS Booth Side Review	 Saint Luke’s at McKesson’s HIMSS Booth Side Review
Saint Luke’s at McKesson’s HIMSS Booth Side Review
 
cardinal health Q2 2008 Earnings Release
cardinal health Q2 2008 Earnings Releasecardinal health Q2 2008 Earnings Release
cardinal health Q2 2008 Earnings Release
 
home depot 2007 Annual Report
home depot 2007 Annual Reporthome depot 2007 Annual Report
home depot 2007 Annual Report
 
SMLF Opening Presentation London Dec 2014
SMLF Opening Presentation London Dec 2014SMLF Opening Presentation London Dec 2014
SMLF Opening Presentation London Dec 2014
 
Evaluation
EvaluationEvaluation
Evaluation
 
2002 CSFB Healthcare Conference
2002 CSFB Healthcare Conference2002 CSFB Healthcare Conference
2002 CSFB Healthcare Conference
 
Mekesson Quarterly Reports 2003 3rd
Mekesson Quarterly Reports 2003 3rdMekesson Quarterly Reports 2003 3rd
Mekesson Quarterly Reports 2003 3rd
 
valero energy Annual Reports 2002
valero energy Annual Reports 2002valero energy Annual Reports 2002
valero energy Annual Reports 2002
 
BERKSHIRE HATHAWAY INC Annual & Interim Reports2007 1st
BERKSHIRE HATHAWAY INC Annual & Interim Reports2007 1st BERKSHIRE HATHAWAY INC Annual & Interim Reports2007 1st
BERKSHIRE HATHAWAY INC Annual & Interim Reports2007 1st
 

Similaire à The Value Of HISP Certification [Compatibility Mode]

Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...empower
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Information Security Survey in Czech Republic 2007
Information Security Survey in Czech Republic 2007Information Security Survey in Czech Republic 2007
Information Security Survey in Czech Republic 2007Rastislav Turek
 
Transforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamTransforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamEMC
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Thoughtworks
 
Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)Paperjam_redaction
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIskcon Ahmedabad
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
 
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to ScaleHfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to ScaleHfS Research
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015John Budriss
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009edcervantes
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 

Similaire à The Value Of HISP Certification [Compatibility Mode] (20)

Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Information Security Survey in Czech Republic 2007
Information Security Survey in Czech Republic 2007Information Security Survey in Czech Republic 2007
Information Security Survey in Czech Republic 2007
 
Transforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamTransforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended Team
 
Developing A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care OganizationsDeveloping A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care Oganizations
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
infosec-it
infosec-itinfosec-it
infosec-it
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consulting
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
 
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to ScaleHfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 

The Value Of HISP Certification [Compatibility Mode]

  • 1. The Value of HISP Certification John A. DiMaria;Six Sigma BB, HISP President, HISPI ©2010 HISPI
  • 2. On-Going Challenges Raise the Bar A study released by Gartner predicted that: "Security certification will be required of 40 percent of personnel having d t d t f l h i day-to-day technical operations responsibility". ©2010 HISPI
  • 3. Demand for qualified practitioners on the i th rise Recent trends show that the demand and funding for qualified information security p practitioners with industry credentials and y certifications continues to rise. ©2010 HISPI
  • 4. Demand for qualified practitioners on the i th rise More specifically, companies are looking for information security professionals trained in the specific disciplines necessary to build and maintain a f i t i formal I f l Information Security ti S it Management System (ISMS). Survey released by Ernest & Young titled: “Outpacing change Ernst & Young’s 12th annual global information security survey” survey ©2010 HISPI
  • 5. Governance, risk and compliance spending to grow in 2010 The bulk of the spending -- nearly 70% -- is pegged for people and processes, rather than technology. Risk mitigation, and cost reduction were cited as top motivators for GRC spending. ©2010 HISPI
  • 6. K considerations th t are d i i Key id ti that driving the need for certification Ability to verify skills and/or competencies in the information security profession. Validation for companies seeking to hire. Ensuring information security staffs maintain up-to-date knowledge and skill-sets. Providing employers ‘ROI’. Assurance that information security practitioners maintain a high degree of confidence. fid ©2010 HISPI
  • 7. Why Consider the Holistic Information Security Practitioner (HISP) Certification? y ( ) The HISP certification has a unique body of knowledge. knowledge The HISP certification focuses on widely accepted frameworks for developing an Information Security program or Information Security Management System. These frameworks include: M tS t Th f k i l d ISO/IEC 27001 and 27002; CobIT (ISACA s framework for IT Governance); (ISACA’s COSO ITIL ©2010 HISPI
  • 8. Why Consider the Holistic Information Security Practitioner (HISP) Certification? The HISP enhances other certifications such as the CISSP, CISM, CISA, CFA. The HISP bridges the gap between existing professional certification programs. The HISP promotes cost-effective training and certification to information security, audit and compliance professionals. The HISP provides a vendor neutral forum that will facilitate the sharing of knowledge. HISP fosters collaborative efforts across various sectors internationally. HISP certification fosters a positive code of ethics amongst information security, audit and compliance professionals. y, p p Finally, a HISP certified individual can help their organization reduce the cost of meeting legal, regulatory and contractual requirements. ©2010 HISPI
  • 9. Some just “say what they can do”……….HISP’s can “do what they say”. Take the challenge……………….. ©2010 HISPI
  • 10. 8075 Mall Parkway Suite S it 101367 Lithonia, GA 30038 PH: 888-247-4858 Fax: 720-293-2118 www.hispi.org questions@hispi.org questions@hispi org Governance Board John DiMaria; President – jdimaria@hispi org jdimaria@hispi.org Gary Sheehan; Vice President - gsheehan@hispi.org Taiye Lambo; Treasurer- tlambo@hispi.org Joesph Watts; Director of Higher Ed. & Member Services – jwatts@hispi.org p g j @ p g Ralph Johnson; Secretary – rjohnson@hispi.org Tom Stamulis; Accreditation Officer – tstamulis@hispi.org ©2010 HISPI