Slide background

Why? ISSA Colorado Springs?

Connecting Cyber Security Professionals and
Developing & Enhancing Cybersecurity Skills
Join ISSA! (Click here)

Slide background

Why? ISSA Colorado Springs?

Connecting Cyber Security Professionals and
Developing & Enhancing Cybersecurity Skills
Join ISSA! (Click here)

Slide background

Why? ISSA Colorado Springs?

Connecting Cyber Security Professionals and
Developing & Enhancing Cybersecurity Skills
Join ISSA! (Click here)

Slide background

Why? ISSA Colorado Springs?

Connecting Cyber Security Professionals and
Developing & Enhancing Cybersecurity Skills
Join ISSA! (Click here)

Slide background

Why? ISSA Colorado Springs?

Connecting Cyber Security Professionals and
Developing & Enhancing Cybersecurity Skills
Join ISSA! (Click here)

Slide background

Why? ISSA Colorado Springs?

Connecting Cyber Security Professionals and
Developing & Enhancing Cybersecurity Skills
Join ISSA! (Click here)

TRAINING

Sharpen Your Skills

Whether pursuing Security+, CISSP, or other cybersecurity certifications, ISSA-COS offers low-cost classes and study groups to help you achieve an initial or higher-level certification, as well as continuing education credits to maintain them.

Continuing Education
Classes
On-Line Training

CYBER SECURITY CAREER LIFECYCLE- ISSA

Professional Development Program

CSCL is comprehensive professional development framework to guide professionals in their individual career paths by providing guidance and resources needed to achieve long-term career goals. See details at:

CSCL

ETHICS

The Critical Importance of Ethics

The study of ethics does not give us a clear-cut black and white answer to our problems as computer and security professionals. This makes it important that as members of our professional community we adopt a common code of ethics that applies to our professional behavior.

Code of Ethics

President's Corner

Summertime is arriving quickly and many of us are busy with planning family vacation or going on vacation. Review the security settings on your home network, phones and devices. Our children are also out of school and will be surfing the network. Review where they have been surfing too. Talk to them about security and privacy on the internet but more importantly listen to what they have to say. Remind them that there is no "easy" button on the internet and anything that they post will always be there.

Thanks,

Cindy

ISSA-COS RECENT SPONSORS

Oct, Mar & Aug 2015

Federal Business Council, Inc.

FBC is a full-service sponsor and management provider for specialty conferences connecting industry and government personnel providing face-to-face interaction and relationship building. With an average of 175 events annually across the country, we cover everything from Information Technology to Warfighter Technology, small business to primes, and everything in between.
fb logofbcinc.com
September 2015

Critical Start

Critical Start is a dedicated security company with the goal to cost effectively improve the security capabilities of our customers.
At Critical Start we believe a Defendable Network starts with a security capability roadmap. Security capability involves much more than products – it is a holistic viewpoint that considers people, process, and configuration of the infrastructure.

fb logocriticalstart.com
February 2015

CA Technologies

Creating software for companies worldwide and enabling them to seize the opportunities of the application economy. Everything is driven by a connected, mobile application-based world that sits in the palm of our hand. For companies everywhere, this is the opportunity.
caca.com