Everything you need to know about the CYBERWISER.eu Cybersecurity Professional Register. If you don't find the answer you're looking for, please contact us here and we'll be in touch.
- What is the CyPR?
The CyPR is the brand-new European Cybersecurity Professional Register, where professionals of any age can promote their specific skill sets and experiences in cybersecurity, courses taken and qualifications.
- Who should register on the CyPR?
Cybersecurity Professionals of any age are eligible to register on the CyPR.
- Why should you register on the CyPR?
Register to the CyPR to promote your specific cybersecurity skill sets, experiences, courses taken and qualifications and to gain international visibility.
But it doesn’t stop here! Organisations of any size or sector can use the registry to find and contact the right skills and experiences they need to improve their IT security posture.
- How can I register on the CyPR?
To register to the CyPR, you need a CYBERWISER.eu account.
Once you are logged in, simply fill in the CyPR Registration form.
- What is the difference between "Cybersecurity Professional" and "Pending Final Assessment"?
The eligible submissions that respect our specific "Cybersecurity requirements" are registered on the CyPR as Cybersecurity Professionals.
The eligible submissions that do not respect our specific "Cybersecurity requirements" are registered on the CyPR as Pending Final Assessment.
A "Pending Final Assessment" submission can be edited to allow us to review whether it respects our "Cybersecurity Requirements".
- What are the "Cybersecurity Requirements" needed to be registered on the CyPR as "Cybersecurity Professional"?
The "Cybersecurity Requirements" needed to be registered on the CyPR as "Cybersecurity Professional" are two.
At least one of the following statements has to be true for your submission:
- You have at least five years of work experience in the cybersecurity field;
- You have obtained an Official Cybersecurity Certification;
- You have successfully completed a CYBERWISER.eu Cybersecurity Training Course (Basic, Intermediate or Advanced).
You have attached to your submission a digital copy of your:
- Higher Education Degree;
- Curriculum Vitae.
- At least one of the following statements has to be true for your submission:
- Do you have a list of Official Cybersecurity Certifications?
The list of Official Cybersecurity Certifications is the following:
- CCNA, Cisco Certified Network Associate Security - CISCO
- CCNP, Cisco Certified Network Professional Security – CISCO
- CCSP, Certified Cloud Security Professional - (ISC)²
- CEH, Certified Ethical Hacker - EC-Council
- CISA, Certified Information Systems Auditor - ISACA
- CISM, Certified Information Security Manager - ISACA
- CISSP, Certified Information Systems Security Professional - (ISC)²
- CompTIA Security+ - CompTIA
More certifications might be added to this list in the future.
- Will my profile be added automatically in the register?
Once you have submitted your application, the CYBERWISER.eu team will review it and will contact you to communicate whether your submission has been published or not in our Cybersecurity Professional Register.
- Will I be able to edit my profile?
Yes. You can submit the edits that you would like to apply to your profile and the CYBERWISER.eu team will implement them.
- What are the Areas of Expertise?
The Areas of Expertise are based on the NIST Cybersecurity Framework Core Functions, which provides a set of high level activities to achieve specific cybersecurity Outcomes. These Core Functions are:
Identify: Develop an organizational understanding to manage cybersecurity risk to
systems, people, assets, data, and capabilities.
- Protect: Develop and implement appropriate safeguards to ensure delivery of critical service.
- Detect: Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.
- Respond: Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.
Recover: Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.
- Identify: Develop an organizational understanding to manage cybersecurity risk to