​ISACA’s Cybersecurity Nexus Launches Tools to Help Cyber Pros Identify Controls and Navigate Their Careers



Global IT and cybersecurity association ISACA has launched two free digital tools through its Cybersecurity Nexus (CSX):

  • Cybersecurity Career Road Map
  • Threats and Controls

Navigating a Cybersecurity Career

The new CSX Career Road Map enables job seekers to personalise the tool with their name, title, experience, certifications and skills to identify job roles that closely match their qualifications. It also highlights areas for future growth and development.

“It’s an employee’s job market right now, with many more open cybersecurity positions than there are skilled candidates to fill them,” said Christos Dimitriadis, Ph.D., CISA, CISM, CRISC, international president of ISACA. “ISACA’s CSX career tool helps individuals identify several cybersecurity roles that may be a good fit based on their current skill sets, experience and credentials, and also highlights potential areas of focus to help them advance in their careers.”

Candidates can save and share their personalised road maps, and can update them for new job role suggestions as their skills and experience grow and evolve.

Identifying Controls for Top Cyber Threats

According to ISACA’s January 2016 Cybersecurity Snapshot, the top three cyber threats in 2016 are:

1.Social engineering

2.Insider threats

3.Advanced persistent threats

The new CSX Threats & Controls tool provides cybersecurity professionals with robust content about those three threats and their associated key controls, as well seven more:

  • Cybercrime
  • DDoS
  • Malware
  • Mobile malware
  • Ransomware
  • Unpatched systems
  • Watering hole

In total, the complimentary tool features 72 controls.

Access the Cybersecurity Career Road Map, or view the Threats & Controls tool,

These tools are the latest resources from ISACA’s Cybersecurity Nexus (CSX), which provides knowledge, tools, training and credentials for cybersecurity professionals at every level of their careers. Recently, ISACA launched the CSX Practitioner certification, the first vendor-neutral, performance-based cybersecurity credential. Additional information on CSX is available at https://cybersecurity.isaca.org.


ISACA helps global professionals lead, adapt and assure trust in an evolving digital world by offering innovative and world-class knowledge, standards, networking, credentialing and career development. Established in 1969, ISACA is a global nonprofit association of 140,000 professionals in 180 countries. ISACA also offers the Cybersecurity Nexus (CSX), a holistic cybersecurity resource, and COBIT, a business framework to govern enterprise technology.

Follow ISACA on Twitter Join ISACA on LinkedIn Like ISACA on Facebook

Join the CSO newsletter!

Error: Please check your email address.

Tags cybersecurityISACACSX Career Road mapsocial engineering

More about AdvancedCSXFacebookGlobal ITISACATwitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by CSO staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts