So, the Obama administration has presented its cybersecurity plan establishing the practice as a major, new national priority.
What does this mean for information security careers?
Security experts that work closely with the government offer insights on the direction the new administration has taken regarding...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
The head of the information security certification group says certification is not a silver bullet, but serves as a critical metric in determining a federal government cybersecurity pro's qualifications.
The International Information Systems Security Certification Consortium (ISC2) has recently launched an online information security course, the Live Online Official ISC2 Certified Information Systems Security Professional Common Body of Knowledge Review Seminar.
Facebook, Linkedin, Twitter.com. These are just a few of the most popular social networking websites that are used extensively to find, meet and greet new people through a vast array of advanced web tools.
Social networking sites allow individuals and organizations to build communities. But just as social...
With the Obama administration's focus on cybersecurity, this is a good time to start or move into an information security career. And Regis University in Colorado is one institution offering state-of-the-art education for undergraduates and graduates alike.
In an exclusive interview, Daniel Likarish, faculty of the...
On Capitol Hill, expert witnesses testify about the need to beef up graduate-level education, not only to train needed cybersecurity professionals, but prepare the PhDs and others needed to educate IT security specialists. But just outside the Beltway that encircles Washington, community colleges - hoping to tap...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
What are some of the key audit and risk trends to track? David Melnick of Deloitte answers that...
From his perch as executive director of (ISC)2, the not-for-profit certifier of IT security professionals, and as the former CIO at the Interior Department, Hord Tipton has a close-up view on what works and doesn't work in regards of training government employees on information security awareness.
In an interview...
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;v
Potential career paths in cybersecurity.
With the Obama administration's focus on cybersecurity, this is a good time to start or move into an information security career. And Regis University in Colorado is one institution offering state-of-the-art education for undergraduates and graduates alike.
In an exclusive interview, Daniel Likarish, faculty of the...
Current cybersecurity education falls far short of adequately preparing people who take actions that make the nation's computing infrastructure more or less secure, says Anita D'Amico, director of secure decisions at Applied Vision, a provider of cyber situational awareness products to safeguard IT systems.
Fearful of man-made, natural and pandemic disasters, organizations everywhere are adopting or improving business continuity/disaster recovery programs.
And at Norwich University, there now is a Master's of Science in Business Continuity program for mid-career professionals to hone their skills in this in-demand...
It's become a cliché: Information security professionals need to get closer to the business.
Now it's also a Master's degree program in which instructors base their whole curriculum on helping security professionals get closer to - and rise higher in the ranks of - their companies and agencies.
In an exclusive...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.