IISPA Logo

Insights

Articles, guides, and updates from IISPA and the cybersecurity community.

More Articles

AI Supply Chain Security: How to Trust Models, Datasets, and DependenciesGovernance

AI Supply Chain Security: How to Trust Models, Datasets, and Dependencies

Models, datasets, checkpoints, and ML tooling form a software supply chain with unique integrity risks. Here is how security, engineering, and procurement align on provenance, verification, and continuous assurance.

aisupplychain
Emerging Threats in 2026: What Security Operations Teams Should PrioritizeInsights

Emerging Threats in 2026: What Security Operations Teams Should Prioritize

A SOC-focused view of AI-era attack patterns—how indirect injection, supply-chain compromise, and identity abuse show up in alerts, and how to prioritize detection engineering and playbooks without boiling the ocean.

emergingthreatssoc
Building an Enterprise AI Security Program: Governance, Technical Controls, and CultureInsights

Building an Enterprise AI Security Program: Governance, Technical Controls, and Culture

A workable AI security program spans policy, architecture, operations, and supply chain—not a single ‘AI policy’ PDF. Here is a maturity-aware blueprint security leaders can adapt, with links to certification-aligned learning for your team.

governanceenterprisesecurity
Emerging Threats in 2026: LLM Abuse, AI Supply Chains, and What SOC Teams Should WatchInsights

Emerging Threats in 2026: LLM Abuse, AI Supply Chains, and What SOC Teams Should Watch

From indirect prompt injection via enterprise RAG to poisoned datasets and compromised model artifacts, AI-specific threats are showing up in real incidents. This guide synthesizes patterns detection teams and architects should prioritize.

emergingthreatsllm
AI Security Fundamentals: What Certified Security Professionals Need NextCPE

AI Security Fundamentals: What Certified Security Professionals Need Next

Traditional certifications cover networks, identity, and incident response—but AI systems introduce new attack surfaces. Here is how to extend your credential-backed skills into ML pipelines, LLMs, and adversarial threats without starting from zero.

aisecuritycertification
Understanding the ICSP Certification PathwayCertification

Understanding the ICSP Certification Pathway

A practical guide to earning your ICSP credential: prerequisites, study resources, and exam preparation tips from IISPA.

certificationicspexam-prep
5 Tips for CPE Tracking and RecertificationCPE & Recertification

5 Tips for CPE Tracking and Recertification

Stay on top of your continuing professional education with these practical strategies for tracking CPE credits and meeting recertification requirements.

cperecertificationmembership
Governance, Risk, and Compliance: A Primer for Security LeadersGovernance

Governance, Risk, and Compliance: A Primer for Security Leaders

An introduction to GRC frameworks and how they support enterprise security programs. Essential reading for ICCSA candidates.

GRCgovernanceICCSA
Why Join a Cybersecurity Community?Community

Why Join a Cybersecurity Community?

Professional communities offer mentorship, job leads, and ongoing learning. Here's how IISPA's community supports your career growth.

communitymentorshipnetworking
Exam Day: What to Expect and How to PrepareExam Prep

Exam Day: What to Expect and How to Prepare

Reduce exam anxiety with this practical guide: what to bring, how the test works, and last-minute preparation strategies.

exam-prepcertificationtips