Dark Reading Radio: How To Become A CISODark Reading Radio: How To Become A CISO
Find out what employers are really looking for in a chief information security officer.
December 15, 2014
Neither Heartbleed nor Shellshock, neither Backoff nor Regin, and neither Sony nor Home Depot scared you off. After a madcap year of vulnerabilities, malware, and breaches, you still want to become a chief information security officer... but you don't know how.
In that case, you'd better not miss the next episode of Dark Reading Radio, "How To Become A CISO," this Wednesday, Dec. 17, at 1:00 p.m. ET (10:00 a.m. PT). You'll have the opportunity to pick the brains of someone who's been in your shoes before and someone who has been helping information security pros land CISO jobs for years.
Our guests will be Lee Kushner, president of LJ Kushner & Associates LLC, who recruits information security pros, and Mark Potter, whom you may recognize as one of the CISOs we profiled in Dark Reading's recent How To Become A CISO series.
Find out what employers are really looking for in a CISO. Do you need to have an MBA, a computer science degree, and a list of certifications a mile long? Do you need a dozen years of experience writing code, another dozen practicing privacy compliance law, another dozen as an international spy, and another dozen managing a giant IT staff in the right industry? And if it's not what you know, but who you know, then who do you need to know, and how do you meet them?
In this episode, you'll learn what experience and skills employers want; how to obtain those skills and experience; how best to demonstrate your value; where the new job openings will be; how to meet the people who may introduce you to your next employer; and how to do it all without eating up so much time and money that you lose your current job and miss your mortgage payment.
Register now and join us Wednesday, Dec. 17. at 1:00 p.m. ET (10:00 a.m. PT). Have questions for the guests? Let us know in the comments below or bring them with you Wednesday and ask the guests yourself.
About the Author(s)
You May Also Like
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023