ITSPmagazine co-founder Sean Martin interviews Howard Miller, co-author of “Developing a Framework and Methodology for Assessing Cyber Risk for Business Leaders“ (Journal of Applied Business and Economics, volume 20 (3), 2018), about the background of and vision related to this research article, how it applies to companies, boards and CEOs, risk management systems, and the ongoing development with Pepperdine CyRP.
With an alarming talent gap in the industry, cybersecurity can no longer be thought of as a technical problem with a technical solution; it must be treated as a critical business concern. Charles Eaton of CompTIA discusses how apprenticeships can supply companies with a more predictable, sustainable pipeline of applicants, while providing new cybersecurity workers with necessary experience, education and mentorship.
Although information security analysts will be the fastest growing overall job category, the supply of analytics talent isn’t rising fast enough to meet this demand. Charles Eaton believes that good technologists can make great information security analysts, and that tweens and teens should become a focal point in this area.
In October 2017, Bloc, one of the nation’s only fully online coding bootcamps, reached a new milestone. For the first time, a majority of Bloc’s newly enrolled students were women. Given recent events in the Silicon Valley and across the tech sector, the team at Bloc is proud to have tipped the gender balance in enrollment.
One of the toughest challenges facing military veterans is making the transition to civilian life. It’s difficult for many of them to see how their military training translates into a civilian career, and the process of job hunting can be daunting. There's hope though; and this program is one example of good things happening in the industry.
My last article for ITSPmagazine defined the term “technologist,” a label that applies to people working in companies of all shapes and sizes across the country along a broad spectrum of industries—not just those that write software and make hardware. in this new piece, we will take a look at the mentorship process for the next generation of technologists.
People go to work to do their job. They have meetings to attend, calls to make, tasks to complete, quotas to reach, and much more. So they can’t be bothered with worrying about information security. However, their habits – good and bad, innocent or malicious – are putting their employer’s business at risk. All it takes is one poorly made decision, or maybe even the lack of a decision in many cases, to damage or even destroy a business.
When it comes to attending cybersecurity conferences, security professionals understandably focus on the big players like RSA – and for good reason. However, there is so much more out there to explore. In this new Experts Corner, David Juniper, Event Director with the Cyber Security Event Series, gives us 8 niche events to consider.
The 9th annual ISSA-LA conference, the “premier cybersecurity event in Southern California,” came to a close after two successful days of opening and closing keynotes, panels, forums and training sessions. ITSPmagazine's Selena Templeton heard many great speakers, interviewed a handful of people, and networked with colleagues and conference attendees. This is her recap of the conference.
Hak4Kidz: starting in America’s heartland, planting seeds for a responsible and innovative digital future. Roaming illustrator for ITSPmagazine, Lisa Chu, explores the world of cyber education across America.
Mr. Shrobe recently published an article stating that formal education is the only way out of our cybersecurity hellhole. In response, Keirsten Brager wrote some alternative viewpoints from the perspective of a practitioner and a student of the discipline.
If we want to escape from “cyber hell” – then professionals will need additional training, not only to learn the latest technology, but also to understand public policy and organizational management. Howard Shrobe is looking to change this through professional education initiatives at MIT.
What good are superior cybersecurity tools if there aren’t enough experts in the field to use them? Scott Edwards of Fortinet reveals how tech companies are taking the cybersecurity skills gap into their own hands.
Thinking about adding an acronym to the end of your name to get your foot in the InfoSec door? Rick McElroy, security strategist for Carbon Black, offers direction for those navigating the ever-changing certification game.
Who will take the lead in turning talk about InfoSec education into action? Look to AdvancedU, RSAC 2017’s new academic enterprise focused on encouraging careers in cybersecurity and equipping parents to safeguard their children from cyber-based threats.
For the past year or more, one of the hottest discussions in the IT industry is how to get more diversity into the tech workforce. To dismantle the status quo, the industry needs to dive deep and form partnerships with academia, government, and nonprofits to get more people interested in IT careers and diversify the workforce for the long term.
In honor of Veterans Day, ITSPmagazine’s The Academy has put together a list of Twitter Profiles for 10 Groups Supporting Veterans in Education and Cybersecurity as a resource for the quarter-million members of the U.S. Armed Services who transition to civilian life every year.
Many veterans have the soft skills to become effective cybersecurity professionals, but navigating the educational requirements and hard skill development can be daunting. CISO and former naval officer Gary Hayslip offers advice and resources for vets looking to transition into infosec.
How does defending America with the weapons of war relate to preventing cyberattacks? Security Strategist for Carbon Black and former Marine, Rick McElroy, explains why military veterans make formidable cybersecurity warriors.
Many are lured by the fascinating and lucrative field of cybersecurity, but the prerequisites for entry-level positions are often daunting. Learn from expert Mikhael Felker how to gain experience that will position you for a successful career in InfoSec.
How can education be used to produce the next generation of cybersecurity experts? The National Initiative for Cybersecurity Education (NICE) is bringing solutions and networking opportunities to Kansas City in its annual NICE Conference and Expo.