As more IoT devices (sensors) are introduced, new services emerge that integrate them. Clients will see new approaches to optimizing their people, processes and technology architecture.
Cybersecurity experts generally agree that about 20 percent of travelers are subject to cyber targeting when abroad. All agree that travel puts you at additional information security risk.
Cybersecurity talent investment has gone through the roof in recent years: Universities are announcing cybersecurity degrees programs, Facebook is open sourcing its Capture the Flag competition platform that teaches developers about cybersecurity, Cisco has launched a $10 million scholarship to tackle the cybersecurity talent shortage and more. Yet, it’s still not enough.
Security organizations both in the private and public sectors have made considerable progress in gaining stature. More and more senior security executives truly have a seat at the table today as a respected member of the C-suite. Many security executives regularly interface with the Board of Directors and maintain excellent relationships with board members. Security organizations still have a lot of room for improvement.
Without question a realistic and self-aware approach is of tremendous value in everything from resume and personal brand development to interviews and successful onboarding in a new role.
Complexity is not our friend. It is the enemy of execution. However, where there is complexity there is also opportunity for technology and service providers who understand the complexity, embrace it and reduce its impact on their client’s organization.
Introducing the Bill Zalud Memorial Award for Professional Excellence by International Foundation for Protection Officers (IFPO) that will be awarded each year to an individual or organization for professional excellence and/or outstanding service/acts in the security profession.
Acquiring a higher-level education is time consuming and expensive, and fraudsters have long been marketing fast-track ways to obtain what appears to be an impressive diploma, at least on the surface. These programs and methods have been around for many years; therefore, it is not always easy to identify what is real and what is a wasted investment of your money and time.
The bottom line: Culture is another way of saying “This is how we do things around here.” In most cases, what is written down or hung on the wall does not align with “how we do things around here.” People will perform their roles, work within their processes and utilize technology to get things done; but the values that undergird their behavior and the ability to understand them and leverage them is one of the keys to unlocking the value of security.
It’s not working, but it can. Despite government and private sector efforts to retain more women in the global cybersecurity profession, women are sorely underrepresented in the industry.