Access "Ping: Jane Scott Norris"
This article is part of the April 2006 issue of Security survivor all stars explain their worst data breaches
Future CISOs owe a debt of gratitude to people like Jane Scott Norris. Not only is this government veteran a trailblazer as the Department of State's first CISO, but longer than most, she's been outspoken on the need for security managers to learn the businesses they serve. While a technology background is vital, it's not surprising that Norris also thinks more diplomatic skills, such as marketing, speaking, writing and project management, are important for CISOs. Should future CISOs be business people? IT people? Both? I think you need a mix of skills. You definitely need to understand the business you're in. I've been in IT in the state department for almost 20 years, but, having served overseas a lot, I think I understand our business fairly well. That is imperative. Do CISOs really need to learn to speak the language of business? Is that the must-have skill? You need to speak in plain English and not be wed to all those techie acronyms. You need marketing skills; you talk to a lot of people and you've got some good ideas, but if you don't have the ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Secure Reads: The Database Hacker's Handbook
Read a review of The Database Hacker's Handbook.
-
Recent Releases: Security product briefs, April 2006
Read about security products released in April 2006.
-
Transit Safety
BITS & BOLTS SSL-encrypted tunnels protect sensitive data traveling the Information Superhighway.
-
Security Survivor All-Stars
COVER STORY Five security survivors tell you how to outwit, outplay and outlast the bad guys.
-
Antispyware / Patch Management
Shavlik Technologies' NetChk Protect 5.5
-
Secure Reads: The Database Hacker's Handbook
-
-
Security Device Testing
Karalon's Traffic IQ Pro 1.0
-
Get a Grip!
MOBILE SECURITY Enterprises need to take control of PDAs, smart phones and other mobile devices to ensure corporate security.
-
E-mail Security
Tumbleweed's MailGate 5500
-
Hot Pick: F5 Network's FirePass 4100 Controller
F5 Network's FirePass 4100 Controller
-
Access Security
KoolSpan's SecurEdge
-
Security Device Testing
-
Columns
-
Ping: Jane Scott Norris
Jane Scott Norris
-
Face-Off: Schneier, Ranum debate security awareness training
Is User Education Working?
-
Editor's Desk: The power of one
Tribal Council
-
Perspectives: Putting out a call for self-defending clients
by M. W. Meyer & Eric Sager, Contributors
Network perimeter defenses have crumbled. What we need now are self-defending clients.
-
Ping: Jane Scott Norris
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO