Monthly Archives: February 2008

Cincinnati ISACA Feb 12th Meeting

I am going to be giving a lunch-time presentation on Enterprise Cryptography for my local ISACA chapter this Tuesday. My presentation is part of an Enterprise Cryptography workshop that Dan Houser and I have organized on short notice. (The previously planned workshop was canceled 10 days ago due to an unforeseen crisis…) My understanding is that walk-ins are welcome, but that advance registration is appreciated.

Here is the link to Cincinnati ISACA Feb. 12 meeting and workshop information page.

Thanks, Erik

Erik T. Heidt, CISA, CISSP

Google Trends: CISSP vs CISA

What is the gold standard certification for Information Security professionals? Is it the CISSP, the CISA, or something else?

Well, I recentry learned about Google Trends, which is an analysis tool from Google that allows you to see how often specific search terms are being entered into the Google search engine. So, just for fun I thouigt I would try comparing CISSP and CISA:

Google Trend Data CISSP vs CISA

The Google trend data would seem to indicate the overall interest in Information Security certiications has been declining, and that there is little to no difference in interest levels between the CISSP and the CISA.