Access your Pro+ Content below.
Develop an effective information security career plan
This article is part of the March 2010 issue of Information Security magazine
Editor's note: Information Security magazine's mission is to provide security professionals with the strategic and technical vision around products and industry trends to help you do your job better. Starting this month, we're also going to help you nurture your career development. We've asked experts Lee Kushner and Mike Murray, co-founders of InfoSecLeaders.com, to contribute a bi-monthly column focused on helping you shape your skills to meet your career objectives, all within context of what's happening within the security industry. Their column starts this month with a detailed look at the importance of developing a formal career plan, to serve as your personal road map to follow as you strive to achieve your long term career objectives and professional goals. We're anxious for your feedback, please send any comments to firstname.lastname@example.org. We spend a great portion of our lives dedicating ourselves to our information security careers. Few can argue that as a group, information security professionals are ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
HIPAA security compliance has been a mixed bag but HITECH ups the ante
Integrating security information management systems with identity management systems ties policy violations and vulnerabilities to user activity
Learn how to develop an effective information security metrics program and pitfalls to avoid.
Knowledge-based authentication helps catch fraud, but the authentication technology poses customer privacy issues.
Columns in this issue
The HITECH Act increases penalties for a lack of HIPAA security compliance but will it really improve health care security?
A successful career in information security requires an effective information security career plan
Organizations must enhance network intrusion detection systems with supporting processes to uncover genuine threats