The Big Update

These last couple of weeks have been tough for me. I realized that my internal struggles with anxiety will have to be met head on if I am to have a chance at passing this CISSP exam. I know that I’m a couple of weeks late but I think I’m at a point that it is time to *expletive* or get off the pot. I choose to get off the pot.

It is official, I have scheduled my exam and will take it in the middle of August 2020. That means I have five weeks to get my stuff in order and mentally prepare to block all the negative energy that is thrusting my way. I’m slowly realizing that in life (again), that the only person you can truly count on is yourself. Wish I could say more but I digress.

I had a friendly chat with someone yesterday, who had passed the test 7 years ago. Although he was under an NDA (non-disclosure agreement), which I found out has to be signed prior to taking the test, he did part with some wisdom I took to heart. He recommended that I should take a break every 30-45 minutes to clear my head and get something to snack on.

Although I don’t anticipate this test taking me the full 3 hours to complete, I think taking breaks is a good idea to refresh and prevent fatigue. This test has a lot of information within it and you can easily be worn down if you feel like you are not doing a great job to begin with.

So what will I be doing for the next 5 weeks leading up to the exam? Practice testing the entire time and streaming live on YouTube answering technical questions. The more exposure and pressure I give myself leading up to the big day, the less fear and anxiety I believe I will have.

Once this thing is done and in the books, I can finally take one step forward in my development as a Digital Forensics Specialist.

More to come…


To support this blog, this post may contain affiliate links. Please read our Privacy Policy for more information.
Drawing on over two decades of experience in the Information Technology industry, I have acquired a diverse range of roles that have shaped my distinctive outlook. Through this journey, I have developed into an accomplished authority in risk management, catering to Fortune 500 companies and small businesses on a global scale. Over the past 12 years, my primary focus has centered on empowering small business owners and insurance professionals to comprehend the ramifications of cyber incidents and effectively mitigate the risks associated with potential data breaches. My passion for cybersecurity has inspired me to create the Sage Knows IT blog. Through this platform, I aim to help small business owners and aspiring IT professionals understand the roadmap of the IT industry based on my experiences. Information Technology and Information Security are crucial for our future, and I hope my blog will motivate those who are interested in joining this ever-evolving field.

Related Posts

Delete Me Not: How One API Call Could Wipe Accounts Clean

Bug bounty programs continue to prove their value by helping organizations uncover security flaws that would otherwise slip through the cracks. For those of us in cybersecurity,…

Title Image: AI Security Realities: Rethinking PII as the Sole Indicator

AI Security Realities: Rethinking PII as the Sole Risk Indicator

During a client meeting, I addressed misconceptions about cybersecurity, especially the notion that absence of PII equates to no risk. I discussed how cyber threats extend beyond data theft to include system vulnerabilities that could disrupt operations and impact users, citing the SolarWinds and New York Times attacks as examples. I explained that comprehensive assessments are crucial for understanding broader cybersecurity risks, not just those involving PII. Additionally, I highlighted the importance of protecting AI models from poisoning, underscoring the need for robust security measures in AI development.

10 Ways to Improve Your Math Skills for Cybersecurity

10 Ways to Improve Your Math Skills for Cybersecurity

As highlighted in our earlier discussion, The Intersection of Math and Cybersecurity, a solid grasp of mathematics is indispensable within the realm of cybersecurity. The specific demands…

The Intersection of Math and Cybersecurity - Does Cybersecurity Require Math?

The Intersection of Math and Cybersecurity

During my weekend exploration of a renowned Q&A platform, I unexpectedly encountered a question that left me intrigued. I couldn’t help but wonder if the original poster (OP) was playfully jesting or sincerely seeking knowledge. This curious moment brought forth a reminiscent smile as I recalled the age-old adage we all encountered during our early school years: “Math is fundamental to all endeavors.” However, an interesting twist emerged: Does this axiom extend its influence into the intricate realm of Cybersecurity?

Client Confidence Crisis: How Neglecting Security Practices Can Drive Customers Away

In today’s digital landscape, establishing an Information Systems Security Program (ISSP) is no longer optional but a crucial necessity for organizations. This blog post explores the vital importance of implementing an ISSP early on and understanding the factors that influence its establishment and modification. Senior management’s role in championing ISSPs is emphasized, as their buy-in and recognition of its significance set the tone for organizational security practices.

However, misconceptions and flawed reasoning often hinder the adoption of robust security measures. From the belief that “it will never happen to us” to relying solely on insurance coverage, these notions can prove detrimental to an organization’s security posture. Furthermore, assumptions that clients don’t care about security or that the cloud provides ultimate protection are debunked, shedding light on the evolving expectations and regulations surrounding data protection.

The ugly truth emerges as we delve into the constant threat of internet vulnerability scans and the risks organizations face when vulnerabilities are discovered. This post aims to dismantle these flawed mindsets, highlighting the need for a comprehensive security approach beyond insurance coverage and the importance of addressing vulnerabilities proactively.

Stay tuned for the upcoming parts of this conversation, where we will explore additional influential factors and provide insights into developing effective ISSPs. Together, let’s navigate the complex world of system security and ensure the protection of your organization’s invaluable assets.

This Post Has One Comment

  1. Thank you Vikas for the kind words and I hope you found it helpful. I’ll pass on the opportunity at this time but wish you the best success for your platform. Take care!

Comments are closed.

RSS302
Twitter638
YouTube1.66k
YouTube
Pinterest0
fb-share-icon
LinkedIn
Share
20