Preview

Empowering Cyber Security Leaders and Info Security Job Stability

Powerful Essays
Open Document
Open Document
9773 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Empowering Cyber Security Leaders and Info Security Job Stability
ISSUE NUMBER 21 An (ISC)2 Digital Publication www.isc2.org

THE GLOBAL WORKFORCE STUDY 2013:

JOB SECURITY = SECURITY JOBS

The biannual (ISC) 2 Global Information Security Workforce Study reveals infosec as a hot career choice.

SECURITY CONGRESS

Empowering CyberSecurity Leaders
The (ISC)2 Security Congress event offers invaluable education to all levels of cyber security professionals.This event empowers professionals with the latest trends, emerging issues and tools to strengthen their security without restricting their business while providing networking opportunities with industry leaders. Colocated with the ASIS 2013 59th Annual Seminar and Exhibits, (ISC)2 and ASIS International have teamed up to bring you the largest security conference in the world.

colocated with

www.isc2.org/congress2013

issue 21
2013
VOLUME 1

12
8
COVER ILLUSTRATION BY JOHN HERSEY; ABOVE ILLUSTRATION BY PATRICK GEORGE

[ features ]
Global Workforce Study: Job Security=Security Jobs
The biannual (ISC)2 Global Information Security Workforce Study reveals infosec as a hot career choice.
BY PETER FRETTY

3 4 6 18 20 22

[ also inside ]
Executive Letter From the desk of (ISC)2’s executive director Hord Tipton.

How Much is Crappy Software Really Costing Us?

Views and Reviews Highlights from (ISC)2’s event moderator, Brandon Dunlap. Member News Read up on the latest happenings with (ISC)2 and its worldwide members. Q&A Javvad Malik, CISSP, senior analyst at 451 Enterprise Security.

Moderator’s Corner

12

The Ramifications of Counterhacking
Fighting back in cyberspace opens doors to legal interpretations and more.
BY CRYSTAL BEDELL

FYI

Security Awareness with a Human Touch

16

How to get Executive Buy-in
Key strategies for obtaining support from the top down.
BY COLLEEN FRYE

Chapter Passport Highlighting London Chapter.

Advancing InfoSecurity Among Women A 3-D Infosec View

Global Insight A new-age model for

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Good Essays

    The data science jobs are growing rapidly. Below figure shows that how much these jobs are in…

    • 496 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    Learning Objective  Explain the procedures of a vendor bidder’s conference Key Concepts  Bidder’s conference purpose  Using the opportunity to request more information  Evaluating applicability  Evaluating the competition IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved.…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Select one security specialization in which you are interested in working. The specialization may be as detailed as a particular organization, if you wish.…

    • 431 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 7 Week 7

    • 594 Words
    • 3 Pages

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations(New Horizon,2016)…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    NT2580 Introduction to Information Security Unit 1 Information Systems Security Fundamentals © ITT Educational Services, Inc. All rights reserved. Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. NT2580…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    By obtaining a Master degree I wish to obtain a job in the field. I dream to be part of Intel, IBM, Hewlett Packard in which I can demonstrate my knowledge and skills in application of software and business system analysis. Speaking to Ms. Anna Carlin an alumni from Cal Poly Pomona who graduated in 1984 with a Bachelor of Science in Business Administration, Computer Information’s System and a Master’s of Science in Business Administration, Information Systems Audit in 1992. She currently is a professor at California State Polytechnic University, Pomona previously she was a Consultant at Vanguard Enterprise Security, Business Readiness Manager at Digital Graphics Advantage, Consultant at American Savings Bank (now Washington Mutual), Northern Regional Ad Support Manager at Los Angeles Times, and Western Regional IS Audit Manager at Times Mirror. Ms. Anna Carlin teaches CIS 100 Personal Cyber Wellness, CIS 310 Management Information Systems, CIS 433 Information Systems Auditing, CIS 471 Internet Security, CIS 481 Computer Forensics, GBA577 Advanced IS Audit, GBA578 Security and Privacy of Information Systems. Professor Carlin said she decided to take a career path that would lead her to cyber security and forensics. Professor Carlin has research Interests: IT Audit, Cyber Security, Information Assurance. I look up to Ms. Anna Carlin because she is a perfect role model of…

    • 738 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Get and deform IT skills including how to manage with cryptography, IT assessments and IT audits.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    ISSA2014

    • 13545 Words
    • 40 Pages

    By 2018, the need for qualified information security professionals is expected to grow by nearly 30%, much…

    • 13545 Words
    • 40 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Education is the most important part of our lives and choosing our career is an even more important job. Choosing the right career is the most difficult task in the world. Career exploration research paper was all discovering my passion for a particular field. This project not only helped me find out my strengths and weaknesses but also help me choose the best career for me. I want to become a software developer .I am very interested in pursuing a career in this field because it is the field of study I am most fascinated by.Computer Science/Software Engineering is one of the most popular and fastest growing careers today. Today, softwares are used in…

    • 941 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Bpo – Bane or Boon?

    • 1551 Words
    • 7 Pages

    Take infosys, its 250 engineers develop IT applications for BO/FA (Bank of America). Elsewhere, infosys staffers process home loans for green point mortgage of Novato, California. At Wipro, five radiologists interpret 30 CT scans a day for Massachusetts General Hospital.…

    • 1551 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    I myself would like to get both the Certified Information Systems Security Professional Certification and the Certified Information Systems Auditor Certification and by having the security + certification I have a good foundation for getting those certifications. My ultimate goal is to work for a private security company who does contract work for the government. My brother is one of their top cryptologist linguist specialists and he is always telling me that they are in constant need for security professionals so getting the security + certification is a big step for me towards getting my dream job.…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    United States. Dept of Labor. Bureau of Labor Statistics. “Computer Science.” Occupational Outlook Handbook, 2012-2013 Edition. US Bureau of Labor Statistics of Occupational Statistics and Employment Projections, (2012) Web. 8 Nov.2013.…

    • 1656 Words
    • 7 Pages
    Better Essays