cart

Members

Join Login

Membership and collaboration facilitated by Member 365.

Members

Join Login

Membership and collaboration facilitated by Member 365.

Award Recipients

(ISC)²

2015 Business Leadership of the Year

Headquartered in the United States and with offices in London, Hong Kong, Tokyo, Mumbai, and an authorized China agency in Beijing, the International Information System Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 160 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network that has over 100,000 certified industry professionals worldwide.

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.

As a 501(c)(3), CISSE relies on member support. If you value our mission of service, please consider making a donation.

Donate Today

Recent Posts

  • 17 April 2021 Cyberspace Solarium Commission - Full 2020 Report The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus on a strategic approach to defending…
  • 03 March 2021 HAFNIUM targeting Exchange Servers with 0-day exploits Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these…