Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

12/15/2014
02:00 PM
Sara Peters
Sara Peters
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv

Dark Reading Radio: How To Become A CISO

Find out what employers are really looking for in a chief information security officer.



Neither Heartbleed nor Shellshock, neither Backoff nor Regin, and neither Sony nor Home Depot scared you off. After a madcap year of vulnerabilities, malware, and breaches, you still want to become a chief information security officer... but you don't know how.

In that case, you'd better not miss the next episode of Dark Reading Radio, "How To Become A CISO," this Wednesday, Dec. 17, at 1:00 p.m. ET (10:00 a.m. PT). You'll have the opportunity to pick the brains of someone who's been in your shoes before and someone who has been helping information security pros land CISO jobs for years.

Our guests will be Lee Kushner, president of LJ Kushner & Associates LLC, who recruits information security pros, and Mark Potter, whom you may recognize as one of the CISOs we profiled in Dark Reading's recent How To Become A CISO series.

Find out what employers are really looking for in a CISO. Do you need to have an MBA, a computer science degree, and a list of certifications a mile long? Do you need a dozen years of experience writing code, another dozen practicing privacy compliance law, another dozen as an international spy, and another dozen managing a giant IT staff in the right industry? And if it's not what you know, but who you know, then who do you need to know, and how do you meet them?

In this episode, you'll learn what experience and skills employers want; how to obtain those skills and experience; how best to demonstrate your value; where the new job openings will be; how to meet the people who may introduce you to your next employer; and how to do it all without eating up so much time and money that you lose your current job and miss your mortgage payment.

Register now and join us Wednesday, Dec. 17. at 1:00 p.m. ET (10:00 a.m. PT). Have questions for the guests? Let us know in the comments below or bring them with you Wednesday and ask the guests yourself.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gudguy1
50%
50%
gudguy1,
User Rank: Strategist
1/2/2015 | 1:25:45 PM
Re: Security Expert Needed: Find Out How ....
Yes, ditto on Technocrati's comments – I would've attended but it's now 1/2/15... 
Sara Peters
50%
50%
Sara Peters,
User Rank: Author
12/17/2014 | 12:09:52 PM
Re: Security Expert Needed: Find Out How ....
@Technocrati  THANKS! I hope you can make it today. You're always a fun, energetic presence in the chat.
Technocrati
100%
0%
Technocrati,
User Rank: Ninja
12/15/2014 | 7:06:34 PM
Security Expert Needed: Find Out How ....

This is a really cool Radio Show which I am going to do my best to attend.  It is nice to see Dark Reading/Information Week tackle relevant topics that we techies need and enjoy !   

Nice job IW, DR and of course Sara !    Hope to see many from the community there - whether you aspire to become a security expert or not - there should be lot's of good information for thought.

COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25660
PUBLISHED: 2020-11-23
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph...
CVE-2020-25688
PUBLISHED: 2020-11-23
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a...
CVE-2020-25696
PUBLISHED: 2020-11-23
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating sy...
CVE-2020-26229
PUBLISHED: 2020-11-23
TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability...
CVE-2020-28984
PUBLISHED: 2020-11-23
prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters.