Featured Insights
![](/-/jssmedia/Project/ISC2/Main/Media/insights/Features/2024/03/2024-03-03---Open-Source-and-Supply-Chain-Attacks-square.jpg?h=701&iar=0&w=700&rev=8fc7252252ba4cf0bf59084d34cbbedd&hash=14037799B12D57BB79D986F926966CC0&mw=3840)
June 27, 2024
Information Sharing in Cyber Supply Chain Risk Management – A New Model
![](/-/jssmedia/Project/ISC2/Main/Media/insights/Features/2024/06/2024-06---Insight---GRC---Square.jpg?h=1183&iar=0&w=1182&rev=991a77ef1dfa405bb2ba9b3d37a7c03f&hash=C65EEEFA48ABEED470EC14E06D1F1A5F&mw=3840)
June 24, 2024
The Critical Role of GRC in Security and Mitigation
![Justine Guyau](/-/jssmedia/Project/ISC2/Main/Media/insights/Features/2024/04/Justine-Thumbnail.jpg?h=801&iar=0&w=800&rev=1a9d8b071304486d8e893eb3ef7f20c4&hash=02C52F2639C4EEDAD03A3DBC37EC63D0&mw=3840)
June 19, 2024
Safeguarding Elections from Cyber Threats
Are you interested in pursuing cybersecurity certification for you or your team?
![A man and a woman sitting at desk while staring and smiling at a phone](https://media.isc2.org/-/jssmedia/Project/ISC2/Main/Components/Hero-Carousel/WEBREBRANDCCMCbusinessmanwomanofficephonetabletgestureGettyImages137002126534Desktop800h.jpg?h=800&iar=0&w=600&rev=9e4b8da859fa457b99b1e2acb188d51e&hash=875965AA13EF1FAC8D6E52F3A26115B3&mw=3840)