Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
As part of its cybersecurity workforce development initiative, Lockheed Martin implements a cyber university to offer training and certification to its employees.
With Howard Schmidt's appointment as national cybersecurity coordinator, his role as president of the Information Systems Security Association (ISSA) has been filled by Kevin Richards, a risk management advisor with Crowe Horwath.
In an exclusive interview, Richards discusses:
Top agenda items for ISSA in...
Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
Information security is the hot career option for professionals in 2010 and beyond.
This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses:
the security careers "bubble" and how it began;
the...
The University of Dayton (UD) and the Advanced Technical Intelligence Center (ATIC) have partnered to address the shortage of skilled information security professionals within government and businesses.
Starting now, students in the masters in business administration program (MBA) at UD will have the option of...
Risk management and effective security controls are on every organization's agenda, and responding to this market demand is ISACA (formerly known as the International Information Systems Auditing and Control Standards), which introduces a new risk-related certification for IT risk professionals.
The most critical and often weakest link in ANY security program is the human element. This is true in data security, and as the events of Christmas day showed us, national security as well.
There's hope on the horizon. Four straight months of growth in IT services firms' payrolls could be a harbinger that tech employment is set to rise again as the economic recovery takes hold.
With the global recession barely in the rearview mirror, you hear a lot of people saying one of two things: "I'm lucky to even have a job" or "This is a lousy time to be looking for work."
Philip Foley, a former marine, is a senior security analyst for governance, risk and compliance at Verizon Cybertrust Security. He works a minimum of 40 hours per week with extensive travel - and then dedicates another 10-12 hours to pursuing an online graduate degree in Information Assurance from Norwich University.
Information security is the hot career option for professionals in 2010 and beyond.
This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses:
the security careers "bubble" and how it began;
the...
What's ahead for information security professionals in 2010?
Barbara Massa, VP of Global Talent Acquisition at McAfee, Inc. speaks to the results of the new Information Security Today Career Trends Survey, discussing:
How the results speak to the maturity of the information security profession;
The survey's...
What will be the hot information security jobs in 2010?
How will professionals grow their skills - and will their employers foot the bill?
What are the minimum academic and professional requirements for information security professionals and leaders today?
These are among the key questions answered in the...
What will be the hottest skills and competencies within information security in 2010?
Application security and biometrics are among the in-demand skills, according to the latest quarterly published list of the 2009 IT Skills Pay and Demand Trends Report by Foote Partners, LLC.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.