SBN

HCISPP or CISSP? What’s the Difference and Which Is Best for You?

The healthcare industry is struggling to keep up with cybersecurity threats, which by now have become commonplace. According to the HIPAA Journal, over the last decade, the number of breaches has risen every year except one, and 2018 saw a 158 percent year-over-year increase in the number of exposed healthcare records. In Healthcare Information and Management Systems Society’s 2019 cybersecurity survey, 76 percent of 166 infosec leaders surveyed said their organization had a breach in the past year.

The growing number breaches underscores the need for more skilled cybersecurity professionals. Like all the other sectors, however, the industry can’t fill many cybersecurity jobs. The most-recent number from the (ISC)2 annual workforce study estimates the shortage of cybersecurity professionals at 2.93 million globally. In the United States, there were 313,735 cybersecurity job openings between September 2017 and August 2018, according to CyberSeek, a NIST-supported cybersecurity-job-market initiative.

This demand — created by the growing risk on one hand and the talent gap on the other — is great news if you’re trying to grow your career in healthcare cybersecurity. However, it doesn’t guarantee a job. Employers want to ensure they’re hiring candidates with the right skills, and they typically look for validation like industry certifications.

Every career path in cybersecurity offers a variety of certification choices, but if you’re planning to be in the healthcare niche, you may be trying to decide between Healthcare Information Security and Privacy Practitioner (HCISPP) and Certified Information Systems Security Personnel (CISSP). (ISC)2, which is considered one of the leaders in professional cybersecurity certifications, offers both of these credentials. They’re both solid choices but cover different focus areas and skill sets.

Benefits of CISSP

Considered by many as the gold standard for infosec professionals, CISSP is one of the certifications that are in (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Rodika Tollefson. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/8_WYyFvd5D0/