Access "The XX Factor"
This article is part of the July 2006 issue of Exclusive: Security salary and careers guide
What 'glass ceiling'? Women are landing top-notch security positions. At a major security conference a couple of years ago, three of the nation's top information security leaders convened to meet the press. All of them were women. "We looked at each other and said, 'Well, that's odd.' Then we all smiled because, really, not that long ago we would have been the only ones in a sea of men," recalls Lisa "LJ" Johnson, the CISO for Nike, who was one of that notable trio. As the role of the security executive has grown from that of a pure technologist to a risk strategist, so have the ranks of women in companies' infosecurity programs. Now, strong communication, program and project management skills are highly valued. An Executive Decision At the first Executive Women's Forum on Information Security, Privacy and Risk Management in 2003, women executives raised a glass, so to speak, to shattering glass ceilings. The brainchild of Joyce Brocaglia, who is the CEO of information security recruiter Alta Associates, the EWF has since expanded its ranks and its influence... Access >>>
Premium Content for Free.
- What's a Hot Pick?
Calculate You IT Security Salary
Learn how to calculate your IT information security salary based on certifications, job and years of experience, company size and industry.
Document Detective 2.0
- All In A Day's Work
The Right Stuff
SAVVY No two CISOs have the same background, but successful ones have similar skills.
- The XX Factor
What Are You Worth?
SALARY Six-figure security jobs have become common. Maybe you should slip this article into your boss's mailbox.
- 9 Habits of Highly Successful CISOs
Information security resume do's and don'ts
Get advice, and learn do's and don'ts for creating an information security technology or network security resume.
Hot Pick: Tenable offers solid vulnerability management
by Brent Huston, Contributing Writer
Product review: Tenable Network Security's Security Center 3.0 helps organizations throughout the vulnerability management lifecycle, from asset discovery to remediation.
Mobile Device Security
Mobile Guardian Enterprise Edition 5.1
Authentication: RSA SecurID Appliance 2.0
RSA SecurID Appliance 2.0
- Buy the Book
Moving On Up
SKILLS How do you rise in the security ranks? Don't speak geek; use the language of business.
Face-Off: Schneier and Ranum debate security certifications
Are security certifications valuable?
Perspectives: Security success sometimes hinges on politics and personalities
The best infosecurity professionals are situationally aware and attuned to what is happening to them and their environment.
Ping: Robert Garigue
- Editor's Desk
More Premium Content Accessible For Free
In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which ...
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...