Access "Security staffing: Why information security positions go unfilled"
This article is part of the May 2012 issue of New security strategies for the bring-your-own-device era
While the national unemployment rate has been steadying between eight and nine percent, information security professionals have been enjoying newfound prosperity. Until recently, the information security function primarily held importance to industries whose success and market perception were tied directly to their customers’ trust, like financial services, and the federal government. Today, though, a unique combination of technological innovation, increased regulatory scrutiny, external threats, and social activism is forcing a shift. Corporations in industries that have traditionally ignored information security, are realizing that the development of a competent information security function is a worthwhile and necessary investment. When companies recognize they are going to make this type of organizational commitment, their first order of business is to find competent information security talent to bridge their talent gap. However, finding and attracting competent information security professionals to a new position is a lot more difficult than it appears... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Mobile device management systems help mitigate BYOD risks
by Lisa Phifer, Contributor
Understand the benefits and limitations of multi-platform MDM technology.
-
Deploying DP systems: Four DLP best practices for success
by Crystal Bedell, Contributor
Plan your data loss prevention project carefully to avoid missteps.
-
Mobile device management systems help mitigate BYOD risks
by Lisa Phifer, Contributor
-
-
VMware strategy for security partners undergoes overhaul
by Marcia Savage, Editor
Virtualization giant revamps its security partner program after hitting some bumps in the road.
-
Thwarting BYOD risks starts with a mobile security policy, experts say
by Robert Westervelt, News Director
Organizations need to establish formal mobile policies before buying a mobile device management system.
-
VMware strategy for security partners undergoes overhaul
by Marcia Savage, Editor
-
Columns
-
Verizon DBIR: Organizations are forgetting computer security basics
by Marcia Savage, Editor
Verizon data breach report illustrates need to get back to basics.
-
Cybersecurity education vs. cybersecurity training
by Ron Woerner, Contributor
Security professionals need to understand the difference and plan accordingly.
-
Security staffing: Why information security positions go unfilled
by Lee Kushner, Contributor
Be aware of potential roadblocks and adjust your recruiting accordingly.
-
Verizon DBIR: Organizations are forgetting computer security basics
by Marcia Savage, Editor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO