Access "Determining the value of infosec certifications"
This article is part of the October 2011 issue of Spotlight on top security trends of 2011 and Security 7 award winners
Certifications and certification bodies have played a prominent and controversial role in the development of the information security profession. Attaining certifications has been viewed as a common method to create a personal brand of credibility and knowledge. For many, the effective leveraging of this brand has led to the establishment and the advancement of their information security career. This impact has not gone unnoticed, and the certification industry has become a lucrative business. Certification and educational bodies that offer training have been able to capitalize by developing a large number of programs that appeal to every segment of the profession. If you include all of the encompassing information security certification programs (i.e. CISSP, CISM, etc), the 24 SANS GIAC certifications programs, and vendor-based certifications (i.e. RSA, Symantec, etc), there are more than 50 options. It can be argued no organization has been more effective in marketing certifications than ISC(2), and its CISSP; as of August, ISC(2) confirmed there are ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Winners of the 2011 Security 7 Award have their say
by Inforamtion Security Staff
Hear from the winners of this year's Information Security magazine Security 7 Award.
-
Breaches prompt call for certificate authority architecture alternatives
by Robert Westervelt, News Director
The breaches of certificate authorities fuel renewed debate for Internet security alternatives.
-
Winners of the 2011 Security 7 Award have their say
by Inforamtion Security Staff
-
-
Antimalware product suites: Understanding capabilities and limitations
by Lenny Zeltser
Traditional antivirus tools have matured into multi-featured antimalware suites. Here’s what you should know when shopping for endpoint protection.
-
Antimalware product suites: Understanding capabilities and limitations
by Lenny Zeltser
-
Columns
-
Security 7 Award: Seven security standouts
by Marcia Savage, Editor
This year’s Security 7 Award winners represent a bright spot in an industry beset by bad news.
-
Determining the value of infosec certifications
by Lee Kushner
An InfoSec Leaders survey examines the impact of different certs on the security profession.
-
Medical device security: Does IEC 80001 go far enough?
by Joseph Granneman
Networked medical devices introduce new risks but does a new standard go far enough in addressing the problem?
-
Security 7 Award: Seven security standouts
by Marcia Savage, Editor
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO