Access "Editor's Desk"
This article is part of the July 2006 issue of Exclusive: Security salary and careers guide
In compiling our first Careers Guide, we give you the information you need to climb that corporate ladder and get the recognition you deserve. I was 13. It was the summer, I was bored, and I needed money. My first job was dishing out ice cream in the sweltering heat. From there my career took a circuitous route: I worked at a bakery (to this day I hate the smell of sweet stuff) and on an assembly line writing down and stapling the sizes onto the soles of shoes (and one to my thumb in the process). Like most college students looking for an employee discount, I also worked at a department store, where I floated from department to department: one day weighing in on fine china and another day tracking down lipstick. While these jobs didn't necessarily train me for my current position, I did learn at an early age that communication is very important, and that customer satisfaction is critical. To this day, these skills are still crucial, as illustrated in our Careers Guide, starting on page 19. We spoke to dozens of senior security professionals--CSOs, CIOs, ... Access >>>
Premium Content for Free.
- What's a Hot Pick?
Calculate You IT Security Salary
Learn how to calculate your IT information security salary based on certifications, job and years of experience, company size and industry.
Document Detective 2.0
- All In A Day's Work
The Right Stuff
SAVVY No two CISOs have the same background, but successful ones have similar skills.
- The XX Factor
What Are You Worth?
SALARY Six-figure security jobs have become common. Maybe you should slip this article into your boss's mailbox.
- 9 Habits of Highly Successful CISOs
Information security resume do's and don'ts
Get advice, and learn do's and don'ts for creating an information security technology or network security resume.
Hot Pick: Tenable offers solid vulnerability management
by Brent Huston, Contributing Writer
Product review: Tenable Network Security's Security Center 3.0 helps organizations throughout the vulnerability management lifecycle, from asset discovery to remediation.
Mobile Device Security
Mobile Guardian Enterprise Edition 5.1
Authentication: RSA SecurID Appliance 2.0
RSA SecurID Appliance 2.0
- Buy the Book
Moving On Up
SKILLS How do you rise in the security ranks? Don't speak geek; use the language of business.
Face-Off: Schneier and Ranum debate security certifications
Are security certifications valuable?
Perspectives: Security success sometimes hinges on politics and personalities
The best infosecurity professionals are situationally aware and attuned to what is happening to them and their environment.
Ping: Robert Garigue
- Editor's Desk
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...