Connect with us

Hi, what are you looking for?


Cloud Security

(ISC)² and CSA Partner On New Cloud Security Certification

(ISC)², the non-profit information security professional body responsible for overseeing CISSP, has teamed up with the Cloud Security Alliance (CSA) to offer a new professional certification for information security.

(ISC)², the non-profit information security professional body responsible for overseeing CISSP, has teamed up with the Cloud Security Alliance (CSA) to offer a new professional certification for information security.

According to the announcement, the initiative will “establish a common global understanding of professional knowledge and best practices in the design, implementation and management of cloud computing systems.”

The new credential will build on existing certifications offered by both organizations and examine the depth of technical knowledge required in architecting business systems, based on cloud computing.

“As organizations continue to adopt cloud computing at a rapid pace, there is a strong need to provide a body of knowledge that encompasses the evolving technology and risk landscape and that validates the skills of the professionals tasked with protecting those businesses,” says W. Hord Tipton, CISSP-ISSEP, CAP, CISA, executive director for (ISC)².

“(ISC)² and CSA have each recognized that the global economy’s reliance on cloud services has advanced extremely quickly. Businesses are moving vast amounts of data into the cloud, and consumers are gobbling up new, usually mobile services that emerge on a daily basis. It is incumbent upon us to make our collective experience as accessible as possible, and the further development of professional–level recognition is key to achieving this,” said Jim Reavis, co-founder and executive director of the Cloud Security Alliance in a statement.

The new credential and first examinations are scheduled to be available in 2014.

In addition to announcing the certification partnership with (ISC)², the CSA announced a new membership level and working group designed to benefit the rapidly growing needs of cloud computing among small and medium businesses (SMB).

Advertisement. Scroll to continue reading.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Training & Awareness

Google has announced a new training program for cybersecurity analysts and those who graduate will get a professional certificate from Google.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.