Premium Content

Access "Building an information security skills matrix"

Published: 19 Oct 2012

Traditionally, when a company begins to search for an information security leader such as a CISO, they generally create a job description. Most standard job descriptions contain a detailed list of skills, experiences and certifications needed to be considered for a specific role. The more advanced the position, the more detailed the list. At face value, the resumes of many senior information security professionals are able to match job requirements that are outlined in standard CISO or information security leader positions. However, while it may be easy for many experienced information security professionals to believe they have the credentials to qualify for senior roles, many fall short. The primary reason is not due to experience or certifications, but due to a blend of tangible and intangible skills that cannot exclusively be found on resumes. As we look into the future and enterprises ingrain security into the corporate culture, competition for these positions will be increasingly difficult. Information security professionals are going to have to spend ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Continuous monitoring program demystified
    ism_1014.png
    E-Zine

    For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...

  • Does Windows 8.1 meet the demands of the BYOD age?
    windows_shopping_8-1.png
    E-Handbook

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...