Blog Posts Tagged with "Careers"

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

86d8831c7ce6fcda920aac867a984d98

Interview with Mark Aiello- CEO of The Revolution Group

January 11, 2013 Added by:InfoSec Institute

What’s interesting in infosec still is that there are all kinds of titles that different companies use, and you have to really get to the nuts and bolts of what they need people to do. There may be five or six generally accepted and used titles that all do the same thing… Security architects – that’s a huge demand right now. But it means different things to different people because, from a...

Comments  (1)

8e6e3972318ff74b194801340248199e

Security Job Titles

December 04, 2012 Added by:Scott Thomas

You may be listed as the 'Security Guru' in a large company but if all you're doing is making sure everyone is swiping their ID badge as they walk in, it may not be the job for you...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Advice to New InfoSec Folks

November 07, 2012 Added by:Brent Huston

Question: “I really want to know what advice the Experts would give to someone looking to get into the information security business. What should they do to get up to speed and what should they do to participate in the infosec community?”...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Impressive Speaker Lineup Announced for TECHEXPO Cyber Security Event

October 23, 2012 Added by:Infosec Island Admin

"Our team is extremely pleased with the high caliber, diversity and expertise of the confirmed speakers we have secured for this event. Having such a dynamic lineup of highly respected industry professionals to share their knowledge and inspire those seeking employment..."

Comments  (0)

86d8831c7ce6fcda920aac867a984d98

Infosec Recruiters Examine Security Career Trends

August 30, 2012 Added by:InfoSec Institute

"Penetration testers, the guys that come onto the sites—they’re highly in demand... In terms of technology, I think these guys see security in a different light than other people. They sort of can see it as a whole picture. Penetration testers are looking at it in a completely different light...."

Comments  (3)

1b061b1cec6b5898e5326992d9461610

Your CISSP is Worthless - So Now What?

August 23, 2012 Added by:Dave Shackleford

OK, so it’s not really worthless. So what do I propose? I say scrap the whole thing. Start over. Build a cert and program that tests fundamental skills and means something to employers who really need things done. Offer existing cert holders one year and a free test to get the new one. Otherwise, they’re out...

Comments  (22)

1de705dde1cf97450678321cd77853d9

Breaking Into Security: Planet Earth Edition

August 14, 2012 Added by:Ian Tibble

As a pentest guru wannabe, you may possess extremely high levels of fuzzing, exploit coding, and reversing skills, but you will never get to use them and you will intimidate most interviewers. There are easier ways to break into systems. Security is insufficiently mature in most organizations to warrant pentesting...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Don't Miss the TECHEXPO Cloud Computing Hiring Event

August 08, 2012 Added by:Infosec Island Admin

As a result of the shift to the cloud, there's been an explosion of career opportunities. TECHEXPO Cloud East will host its inaugural hiring event for cloud computing professionals. Over 20 industry leaders will be on-site conducting face-to-face interviews for immediate career opportunities in the cloud...

Comments  (0)

86d8831c7ce6fcda920aac867a984d98

How to Become a Network Security Engineer

July 18, 2012 Added by:InfoSec Institute

While no two jobs are alike, there are some specific skills that will help network security engineers face the various challenges they will face day to day. What follows are just a handful of specific skills and duties required of network security engineers...

Comments  (2)

8e6e3972318ff74b194801340248199e

Is Privacy Worth the Loss of Opportunity?

July 05, 2012 Added by:Scott Thomas

Privacy is a huge issue to most of us in the infosec community. Where this hits home though is when you're contemplating making a career move. You want the industry to know that you're considering your choices, but you don't want "the wrong people" to know (read: your current employer)...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Messaging Misjudgments Kill Careers

June 25, 2012 Added by:Rebecca Herold

Personal and explicit messages sent through business systems could very well become widely known to the public in a very damaging and humiliating way. There are many e-discovery and open records laws that provide access to business email systems. You can ruin your business, and possibly personal life...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

Infosec Isn't for You If...

June 14, 2012 Added by:Ali-Reza Anghaie

Ali-Reza Anghaie - aka Packetknife - lays out a comprehensive and slightly humorous examination of why a career in information security may not be your cup of tea... How many describe you?

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Security Field Entry Advice

June 08, 2012 Added by:Jayson Wylie

Government reports show that there is up to a fifty percent gap for information security needs to those able to fill them. This means that more and more people will attempt to enter into the information technology security field as the compensation for those who have security talent rises...

Comments  (2)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance Hosts White House Cyber Jobs Event

June 06, 2012 Added by:Marjorie Morgan

"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »
Most Liked