Access "Career advantages of security professional certifications and advanced degrees"
This article is part of the December 2010 issue of Inside the Data Accountability and Trust Act and what it means for security
Information security professionals have been conditioned to invest in their careers. Whether through traditional methods such as security certification courses or advanced degrees, you have expectations that by achieving these credentials, you will accelerate your career. By investing in yourself, you're on the right track; any investment that helps develop skills, expand knowledge and provide additional education is a good one. However, the expectation that a single common career investment will provide you a competitive advantage over others is unrealistic. The CISSP certification is a prime example of this. When the information security industry was in its formative years, Certified Information Systems Security Professionals (CISSPs), were rare. Holding the CISSP certification provided a much greater advantage over peers who did not. Employers placed a higher value on this designation, and rewarded professionals with advanced compensation and accelerated career paths. Today, the CISSP is much more commonplace and does not serve as the talent ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Disaster recovery and contingency planning security considerations
Security must be included in disaster recovery planning to ensure sensitive data is protected.
-
Customized malware programs require new response, experts say
Cybercriminals are taking advantage of poorly deployed security software with customized malware designed to infiltrate systems and steal data without being detected.
-
Disaster recovery and contingency planning security considerations
-
-
Understanding the Data Accountability and Trust Act
by Richard E. Mackey, Jr., Contributor
The Data Accountability and Trust Act, if passed into law, would create a national standard for privacy and data protection.
-
Vendor risk management and the CISO
by Eric Holmquist
The CISO has a key role in reducing the risk of sharing sensitive corporate data with third parties.
-
Understanding the Data Accountability and Trust Act
by Richard E. Mackey, Jr., Contributor
-
Columns
-
Cloud computing technology: Don't get left behind
Cloud computing presents a lot of security issues but security professionals need to accept the challenge.
-
Career advantages of security professional certifications and advanced degrees
by Lee Kushner and Mike Murray
Choose wisely when pursuing industry certifications and advanced degrees to gain the best competitive advantage.
-
Internet privacy laws will get attention in the next Congress
by Judith Harris, Christopher Cwalina, and Amy Mushahwar
In the 112th Congress, enterprises can expect a heavy focus on Internet privacy issues on Capitol Hill.
-
Cloud computing technology: Don't get left behind
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO