Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

12/15/2014
02:00 PM
Sara Peters
Sara Peters
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

Dark Reading Radio: How To Become A CISO

Find out what employers are really looking for in a chief information security officer.

Neither Heartbleed nor Shellshock, neither Backoff nor Regin, and neither Sony nor Home Depot scared you off. After a madcap year of vulnerabilities, malware, and breaches, you still want to become a chief information security officer... but you don't know how.

In that case, you'd better not miss the next episode of Dark Reading Radio, "How To Become A CISO," this Wednesday, Dec. 17, at 1:00 p.m. ET (10:00 a.m. PT). You'll have the opportunity to pick the brains of someone who's been in your shoes before and someone who has been helping information security pros land CISO jobs for years.

Our guests will be Lee Kushner, president of LJ Kushner & Associates LLC, who recruits information security pros, and Mark Potter, whom you may recognize as one of the CISOs we profiled in Dark Reading's recent How To Become A CISO series.

Find out what employers are really looking for in a CISO. Do you need to have an MBA, a computer science degree, and a list of certifications a mile long? Do you need a dozen years of experience writing code, another dozen practicing privacy compliance law, another dozen as an international spy, and another dozen managing a giant IT staff in the right industry? And if it's not what you know, but who you know, then who do you need to know, and how do you meet them?

In this episode, you'll learn what experience and skills employers want; how to obtain those skills and experience; how best to demonstrate your value; where the new job openings will be; how to meet the people who may introduce you to your next employer; and how to do it all without eating up so much time and money that you lose your current job and miss your mortgage payment.

Register now and join us Wednesday, Dec. 17. at 1:00 p.m. ET (10:00 a.m. PT). Have questions for the guests? Let us know in the comments below or bring them with you Wednesday and ask the guests yourself.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gudguy1
50%
50%
gudguy1,
User Rank: Strategist
1/2/2015 | 1:25:45 PM
Re: Security Expert Needed: Find Out How ....
Yes, ditto on Technocrati's comments – I would've attended but it's now 1/2/15... 
Sara Peters
50%
50%
Sara Peters,
User Rank: Author
12/17/2014 | 12:09:52 PM
Re: Security Expert Needed: Find Out How ....
@Technocrati  THANKS! I hope you can make it today. You're always a fun, energetic presence in the chat.
Technocrati
100%
0%
Technocrati,
User Rank: Ninja
12/15/2014 | 7:06:34 PM
Security Expert Needed: Find Out How ....

This is a really cool Radio Show which I am going to do my best to attend.  It is nice to see Dark Reading/Information Week tackle relevant topics that we techies need and enjoy !   

Nice job IW, DR and of course Sara !    Hope to see many from the community there - whether you aspire to become a security expert or not - there should be lot's of good information for thought.

COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/1/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Threat from the Internet--and What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15478
PUBLISHED: 2020-07-01
The Journal theme before 3.1.0 for OpenCart allows exposure of sensitive data via SQL errors.
CVE-2020-6261
PUBLISHED: 2020-07-01
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
CVE-2020-15471
PUBLISHED: 2020-07-01
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
CVE-2020-15472
PUBLISHED: 2020-07-01
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
CVE-2020-15473
PUBLISHED: 2020-07-01
In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c.