Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

3/17/2020
08:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

(ISC) Announces CEO Succession Plan

David Shearer will step down at the end of 2020.

Clearwater, FL, March 16, 2020 – (ISC)² – the world’s largest nonprofit membership association of certified cybersecurity professionals – today announced that David Shearer, CISSP, the association’s current CEO, will step down at the end of 2020 after serving in the role since 2015. The (ISC)² Board of Directors has initiated a CEO recruitment search to identify an experienced leader to succeed Shearer and guide the organization on a path of continued growth as demand for certified cybersecurity professionals continues to grow exponentially worldwide. 

“After leading us through a period of sustained growth and incredible change, David has notified the board of his intention to step down at the end of this year after six years as our CEO and two years prior as our COO,” said Dr. Kevin Charest, CISSP, (ISC)² Board of Directors Chairperson. “In parallel with the goals and objectives we have for David’s last year with us, we must begin our recruiting efforts for his successor to ensure a smooth transition, and we’re thankful that David will be a part of that search process.” 

The search will be led by the Board of Directors, who have engaged organizational consulting firm Korn Ferry to assist in the recruitment effort. 

“My tenure as CEO of (ISC)² has been abundantly fulfilling and one of the greatest honors of my professional life. Over the course of my career I’ve been fortunate enough to have opportunities to lead great teams through times of change and growth. I relished the task of strengthening our value promise to members, delivering new certifications and professional development opportunities for cybersecurity professionals, modernizing (ISC)²’s infrastructure, and developing new ways to help our members and the organizations they protect better defend critical assets around the world,” remarked Shearer. “I deeply believe in the association’s mission to inspire a safe and secure cyber world, and I’m looking forward to helping the board select the right successor to keep us moving along the same trajectory.”

Under Shearer’s direction, the association grew to 153,000 certified members and associates in 175 countries. His leadership also led to an association-wide digital transformation that replaced legacy systems and improved efficiencies, the introduction of the Certified Cloud Security Professional (CCSP®) certification, and the growth of the annual (ISC)² Security Congress conference to more than 2,500 attendees and 200 expert speakers. In 2019, Shearer oversaw the creation of the Professional Development Institute (PDI), a portfolio of cybersecurity education courses that are included for free as a benefit of membership. To date, more than 30 courses have been launched as part of PDI, at a value of more than $10,000, and learners have completed nearly 14,000 courses in total.

To learn more about this executive search, please contact [email protected].   

About (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, pragmatic approach to security. Our membership, more than 150,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education™. For more information on (ISC)², visit www.isc2.org, follow us on Twitter or connect with us on Facebook and LinkedIn.

© 2020, (ISC)² Inc., (ISC)², CISSP, SSCP, CCSP, CAP, CSSLP, HCISPP, CCFP, CISSP-ISSAP, CISSP-ISSEP, CISSP-ISSMP and CBK are registered marks, of (ISC)², Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Can you smell me now?
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11844
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
CVE-2020-6937
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
CVE-2020-7648
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
CVE-2020-7650
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
CVE-2020-7654
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.