Access "Four steps toward a plan for a career in information security"
This article is part of the May 2010 issue of How to watch over your data with effective database activity monitoring
Formulating your career plan is the cornerstone of successful career. In our 2008-2009 survey of information security professionals, the research revealed those who have a career plan are more likely to hold senior titles, earn more money, and have increased job satisfaction. These findings demonstrate that effective information security career planning has a measurable impact on your success. Like any successful information security engagement, career planning should be based on a solid methodology that will provide you with the best chance of achieving success. The four key components to career planning include: the development of a baseline; understanding your ultimate career goal; determining intermediate milestones; and planning in reverse. DEVELOP A CAREER PLANNING BASELINE Before starting on the career planning process, you need an idea of what your current situation is. Former General Electric CEO and management guru Jack Welch is often quoted that the first step in management of anything is to get a solid understanding of the reality of your ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Database activity monitoring keeps watch over your data
by Adrian Lane, Contributor
Database activity monitoring can help with security and compliance by tracking everything going on in the database.
-
OWASP Top 10 vulnerabilities list adds risk to equation
OWASP Top 10 vulnerabilities list adds risk to methodology used to categorize coding errors.
-
Database activity monitoring keeps watch over your data
by Adrian Lane, Contributor
-
-
Microsoft Windows 7 security features
by Beth Quinlan
Microsoft Windows 7 security aims to improve security without the headaches of Vista.
-
The banking malware scourge
Criminals are using the Zeus banking Trojan and other malware to hijack online business banking accounts.
-
Microsoft Windows 7 security features
by Beth Quinlan
-
Columns
-
Four steps toward a plan for a career in information security
by Lee Kushner and Mike Murray
Having a long-term goal for a career in information security isn't enough. Here are four key steps for planning for a career in information security.
-
The real information security risk equation
by Ron Woerner
A simplified information security risk equation helps translate information security risk to users.
-
Cybersecurity bill lacks details
The Rockefeller-Snowe cybersecurity bill has potential but raises a lot of questions.
-
Four steps toward a plan for a career in information security
by Lee Kushner and Mike Murray
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO