Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
September 2008

Security Certifications' Ethics Programs Merely Window-Dressing

A little more than a year ago, I wrote a Perspectives column about the role of ethics in information security certifications offered by ISACA, GIAC, (ISC)2 and ASIS. My main point was that the ethics requirements in these certification programs were in place purely as a mechanism for protecting the certification's reputation and not out of any actual concerns about the daily behavior of its constituency. The essence of this argument was that none of the certification organizations train their members about ethical issues or even bother to have certification holders review a code of ethics and reaffirm their adherence to the code. Additionally, I took issue with the fact that the various organizations have different systems for handing ethics violations with different levels of transparency. My column last summer prompted several interesting responses that taught me two things. First, I learned that SANS--which provides training for GIAC certifications--does in fact have a class that specifically covers ethics (MGMT 418). It's ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Product Review: Workshare Protect Premium 6.0

    Workshare Protect Premium 6.0 seeks to eliminate the malicious or accidental leakage of sensitive corporate data.

  • Security Services: Symantec Online Fraud Protection

    Symantec's Online Fraud Protection service includes an initial on-site assessment, phishing and transaction monitoring, incident response, monitoring of malware targeting the company's brand and analysis of new malware behavior.

  • Product review: AirDefense Enterprise 7.3

    AirDefense's AirDefense Enterprise 7.3, a wireless intrusion detection and intrusion prevention tool, has new features including support for Power over Ethernet (PoE) for its sensors, a new user interface, overhauled reporting and new features such as WEP cloaking, advanced forensics, spectrum analysis and a centralized console to manage appliances.

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close