Access "Information security job titles: Irrelevant to your career"
This article is part of the May 2011 issue of Comprehensive information security programs vital for PCI compliance
Whatever the profession, people are obsessed with job titles. A job title serves as a signal to colleagues, industry peers, friends or your mother-in-law -- and provides a sense of status, accomplishment and respect. However, in the information security industry, your job title is probably the most insignificant component in the development and advancement of your career. Now, we can hear the objections already. Here’s what you’re thinking: You worked hard for your title. Your title may signify a promotion or recognition of your information security contributions. Your title helps you get things done internally in your current work environment. You believe people listen to and respect your opinions based on your title. You have more than likely changed jobs once in your career in order to get a more prominent title. You may have even turned down an otherwise perfect career opportunity because you did not think the title was not reflective of your perspective of your skill. We also know that in the world of information security career progression, the people ... Access >>>
Premium Content for Free.
Navigating international data privacy laws
by Cynthia O’Donoghue, Katharina A. Weimer and Amy Mushahwar
Companies should revisit streamlined global data operations with an eye toward revamping compliance.
Robust information security program key to PCI compliance requirements
by Eric Holmquist
A strong information security program that goes beyond minimum standards will ease compliance.
- Navigating international data privacy laws by Cynthia O’Donoghue, Katharina A. Weimer and Amy Mushahwar
Gaining awareness to prevent social engineering techniques, attacks
by Marcia Savage
Cybercriminals are using social engineering fueled by social media to attack users and break into companies.
Smartphone encryption, authentication ease mobile management
by Robert Westervelt
New security tools allow companies to extend encryption and authentication to mobile devices.
- Gaining awareness to prevent social engineering techniques, attacks by Marcia Savage
Information security professionals and the resource gap
by (ISC)2 Advisory Board of the Americas Executive Writers Bureau
There’s growing demand for information security professionals, but where will these skilled people come from?
Information security job titles: Irrelevant to your career
by Lee Kushner and Mike Murray
Remember, potential new security roles are doled out based on experience and accomplishments, not some fancy title.
Breaches highlight need for better employee security awareness training
by Marcia Savage
Companies need to improve their employee security awareness training to fight today’s threats.
- Information security professionals and the resource gap by (ISC)2 Advisory Board of the Americas Executive Writers Bureau
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...