Access "Develop an effective information security career plan"
This article is part of the March 2010 issue of Winning strategies for integrating security information management and identity access management
Editor's note: Information Security magazine's mission is to provide security professionals with the strategic and technical vision around products and industry trends to help you do your job better. Starting this month, we're also going to help you nurture your career development. We've asked experts Lee Kushner and Mike Murray, co-founders of InfoSecLeaders.com, to contribute a bi-monthly column focused on helping you shape your skills to meet your career objectives, all within context of what's happening within the security industry. Their column starts this month with a detailed look at the importance of developing a formal career plan, to serve as your personal road map to follow as you strive to achieve your long term career objectives and professional goals. We're anxious for your feedback, please send any comments to feedback@infosecuritymag.com. We spend a great portion of our lives dedicating ourselves to our information security careers. Few can argue that as a group, information security professionals are knowledgeable, passionate and dedicated ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
HITECH Act increases HIPAA security requirements
HIPAA security compliance has been a mixed bag but HITECH ups the ante
-
Creating meaningful information security metrics
by Andrew Jaquith, Forrester Research, Inc.
Learn how to develop an effective information security metrics program and pitfalls to avoid.
-
HITECH Act increases HIPAA security requirements
-
-
Joining security information management systems with identity management systems boosts security
by Randall Gamby, Contributor
Integrating security information management systems with identity management systems ties policy violations and vulnerabilities to user activity
-
Knowledge-based authentication poses privacy issues
Knowledge-based authentication helps catch fraud, but the authentication technology poses customer privacy issues.
-
Joining security information management systems with identity management systems boosts security
by Randall Gamby, Contributor
-
Columns
-
Is HITECH Act a game changer?
The HITECH Act increases penalties for a lack of HIPAA security compliance but will it really improve health care security?
-
Develop an effective information security career plan
by Lee Kushner and Mike Murray
A successful career in information security requires an effective information security career plan
-
Relying on basic network intrusion detection systems isn't enough
Organizations must enhance network intrusion detection systems with supporting processes to uncover genuine threats
-
Is HITECH Act a game changer?
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO