Access "Career advantages of security professional certifications and advanced degrees"
This article is part of the December 2010 issue of Inside the Data Accountability and Trust Act and what it means for security
Information security professionals have been conditioned to invest in their careers. Whether through traditional methods such as security certification courses or advanced degrees, you have expectations that by achieving these credentials, you will accelerate your career. By investing in yourself, you're on the right track; any investment that helps develop skills, expand knowledge and provide additional education is a good one. However, the expectation that a single common career investment will provide you a competitive advantage over others is unrealistic. The CISSP certification is a prime example of this. When the information security industry was in its formative years, Certified Information Systems Security Professionals (CISSPs), were rare. Holding the CISSP certification provided a much greater advantage over peers who did not. Employers placed a higher value on this designation, and rewarded professionals with advanced compensation and accelerated career paths. Today, the CISSP is much more commonplace and does not serve as the talent ... Access >>>
Premium Content for Free.
Disaster recovery and contingency planning security considerations
Security must be included in disaster recovery planning to ensure sensitive data is protected.
Customized malware programs require new response, experts say
Cybercriminals are taking advantage of poorly deployed security software with customized malware designed to infiltrate systems and steal data without being detected.
- Disaster recovery and contingency planning security considerations
Understanding the Data Accountability and Trust Act
by Richard E. Mackey, Jr., Contributor
The Data Accountability and Trust Act, if passed into law, would create a national standard for privacy and data protection.
Vendor risk management and the CISO
by Eric Holmquist
The CISO has a key role in reducing the risk of sharing sensitive corporate data with third parties.
- Understanding the Data Accountability and Trust Act by Richard E. Mackey, Jr., Contributor
Cloud computing technology: Don't get left behind
Cloud computing presents a lot of security issues but security professionals need to accept the challenge.
Career advantages of security professional certifications and advanced degrees
by Lee Kushner and Mike Murray
Choose wisely when pursuing industry certifications and advanced degrees to gain the best competitive advantage.
Internet privacy laws will get attention in the next Congress
by Judith Harris, Christopher Cwalina, and Amy Mushahwar
In the 112th Congress, enterprises can expect a heavy focus on Internet privacy issues on Capitol Hill.
- Cloud computing technology: Don't get left behind
More Premium Content Accessible For Free
For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...