ITSPmagazine co-founder Sean Martin interviews Howard Miller, co-author of “Developing a Framework and Methodology for Assessing Cyber Risk for Business Leaders“ (Journal of Applied Business and Economics, volume 20 (3), 2018), about the background of and vision related to this research article, how it applies to companies, boards and CEOs, risk management systems, and the ongoing development with Pepperdine CyRP.
With an alarming talent gap in the industry, cybersecurity can no longer be thought of as a technical problem with a technical solution; it must be treated as a critical business concern. Charles Eaton of CompTIA discusses how apprenticeships can supply companies with a more predictable, sustainable pipeline of applicants, while providing new cybersecurity workers with necessary experience, education and mentorship.
Although information security analysts will be the fastest growing overall job category, the supply of analytics talent isn’t rising fast enough to meet this demand. Charles Eaton believes that good technologists can make great information security analysts, and that tweens and teens should become a focal point in this area.
In October 2017, Bloc, one of the nation’s only fully online coding
One of the toughest challenges facing military veterans is making the transition to civilian life. It’s difficult for many of them to see how their military training translates into a civilian career, and the process of job hunting can be daunting. There's hope though; and this program is one example of good things happening in the industry.
My last article for ITSPmagazine defined the term “technologist,” a label that applies to people working in companies of all shapes and sizes across the country along a broad spectrum of industries—not just those that write software and make hardware. in this new piece, we will take a look at the mentorship process for the next generation of technologists.
People go to work to do their job. They have meetings to attend, calls to make, tasks to complete, quotas to reach, and much more. So they can’t be bothered with worrying about information security. However, their habits – good and bad, innocent or malicious – are putting their employer’s business at risk. All it takes is one poorly made decision, or maybe even the lack of a decision in many cases, to damage or even destroy a business.
When it comes to attending cybersecurity conferences, security professionals understandably focus on the big players like RSA – and for good reason. However, there is so much more out there to explore. In this new Experts Corner, David Juniper, Event Director with the Cyber Security Event Series, gives us 8 niche events to consider.
In today's breach-a-day environment, should companies issue penalties to insecure employees? Preempt’s Heather Howland thinks so. But just how severe should these penalties be? Let's find out.
The 9th annual ISSA-LA conference, the “premier cybersecurity event in Southern California,” came to a close after two successful days of opening and closing keynotes, panels, forums and training sessions. ITSPmagazine's Selena Templeton heard many great speakers, interviewed a handful of people, and networked with colleagues and conference attendees. This is her recap of the conference.
Hak4Kidz: starting in America’s heartland, planting seeds for a responsible and innovative digital future. Roaming illustrator for ITSPmagazine, Lisa Chu, explores the world of cyber education across America.
Mr. Shrobe recently published an article stating that formal education is the only way out of our cybersecurity hellhole. In response, Keirsten Brager wrote some alternative viewpoints from the perspective of a practitioner and a student of the discipline.
Your nature makes you a perfect candidate for a career in InfoSec, but it’s the nurturing found in community that will make you a success.
If we want to escape from “cyber hell” – then professionals will need additional training, not only to learn the latest technology, but also to understand public policy and organizational management. Howard Shrobe is looking to change this through professional education initiatives at MIT.
What good are superior cybersecurity tools if there aren’t enough experts in the field to use them? Scott Edwards of Fortinet reveals how tech companies are taking the cybersecurity skills gap into their own hands.
Thinking about adding an acronym to the end of your name to get your foot in the InfoSec door? Rick McElroy, security strategist for Carbon Black, offers direction for those navigating the ever-changing certification game.
Bridging the talent gap means more than producing a diverse cybersecurity workforce today – it will require looking into the future of the criminal mind.
In the fragmented world of cybersecurity, equipping small businesses for cyber threats and preparing the next generation of infosec professionals will require community-based workforce development.
Who will take the lead in turning talk about InfoSec education into action? Look to AdvancedU, RSAC 2017’s new academic enterprise focused on encouraging careers in cybersecurity and equipping parents to safeguard their children from cyber-based threats.
How can businesses pour millions into cybersecurity and still miss the mark? CISSP and CISM Candy Alexander explores the blind spot leaving many businesses open to costly attack.