Operations

12/15/2014
02:00 PM
Sara Peters
Sara Peters
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

Dark Reading Radio: How To Become A CISO

Find out what employers are really looking for in a chief information security officer.

Neither Heartbleed nor Shellshock, neither Backoff nor Regin, and neither Sony nor Home Depot scared you off. After a madcap year of vulnerabilities, malware, and breaches, you still want to become a chief information security officer... but you don't know how.

In that case, you'd better not miss the next episode of Dark Reading Radio, "How To Become A CISO," this Wednesday, Dec. 17, at 1:00 p.m. ET (10:00 a.m. PT). You'll have the opportunity to pick the brains of someone who's been in your shoes before and someone who has been helping information security pros land CISO jobs for years.

Our guests will be Lee Kushner, president of LJ Kushner & Associates LLC, who recruits information security pros, and Mark Potter, whom you may recognize as one of the CISOs we profiled in Dark Reading's recent How To Become A CISO series.

Find out what employers are really looking for in a CISO. Do you need to have an MBA, a computer science degree, and a list of certifications a mile long? Do you need a dozen years of experience writing code, another dozen practicing privacy compliance law, another dozen as an international spy, and another dozen managing a giant IT staff in the right industry? And if it's not what you know, but who you know, then who do you need to know, and how do you meet them?

In this episode, you'll learn what experience and skills employers want; how to obtain those skills and experience; how best to demonstrate your value; where the new job openings will be; how to meet the people who may introduce you to your next employer; and how to do it all without eating up so much time and money that you lose your current job and miss your mortgage payment.

Register now and join us Wednesday, Dec. 17. at 1:00 p.m. ET (10:00 a.m. PT). Have questions for the guests? Let us know in the comments below or bring them with you Wednesday and ask the guests yourself.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gudguy1
50%
50%
gudguy1,
User Rank: Strategist
1/2/2015 | 1:25:45 PM
Re: Security Expert Needed: Find Out How ....
Yes, ditto on Technocrati's comments – I would've attended but it's now 1/2/15... 
Sara Peters
50%
50%
Sara Peters,
User Rank: Author
12/17/2014 | 12:09:52 PM
Re: Security Expert Needed: Find Out How ....
@Technocrati  THANKS! I hope you can make it today. You're always a fun, energetic presence in the chat.
Technocrati
100%
0%
Technocrati,
User Rank: Ninja
12/15/2014 | 7:06:34 PM
Security Expert Needed: Find Out How ....

This is a really cool Radio Show which I am going to do my best to attend.  It is nice to see Dark Reading/Information Week tackle relevant topics that we techies need and enjoy !   

Nice job IW, DR and of course Sara !    Hope to see many from the community there - whether you aspire to become a security expert or not - there should be lot's of good information for thought.

12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/11/2018
New Domains: A Wide-Open Playing Field for Cybercrime
Ben April, CTO, Farsight Security,  10/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18315
PUBLISHED: 2018-10-15
com/mossle/cdn/CdnController.java in lemon 1.9.0 allows attackers to upload arbitrary files because the copyMultipartFileToFile method in CdnUtils only checks for a ../ substring, and does not validate the file type and spaceName parameter.
CVE-2018-18316
PUBLISHED: 2018-10-15
emlog v6.0.0 has CSRF via the admin/user.php?action=new URI.
CVE-2018-18317
PUBLISHED: 2018-10-15
DESHANG DSCMS 1.1 has CSRF via the public/index.php/admin/admin/add.html URI.
CVE-2018-18296
PUBLISHED: 2018-10-15
MetInfo 6.1.2 has XSS via the /admin/index.php bigclass parameter in an n=column&a=doadd action.
CVE-2018-18309
PUBLISHED: 2018-10-15
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service,...