Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

12/15/2014
02:00 PM
Sara Peters
Sara Peters
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

Dark Reading Radio: How To Become A CISO

Find out what employers are really looking for in a chief information security officer.

Neither Heartbleed nor Shellshock, neither Backoff nor Regin, and neither Sony nor Home Depot scared you off. After a madcap year of vulnerabilities, malware, and breaches, you still want to become a chief information security officer... but you don't know how.

In that case, you'd better not miss the next episode of Dark Reading Radio, "How To Become A CISO," this Wednesday, Dec. 17, at 1:00 p.m. ET (10:00 a.m. PT). You'll have the opportunity to pick the brains of someone who's been in your shoes before and someone who has been helping information security pros land CISO jobs for years.

Our guests will be Lee Kushner, president of LJ Kushner & Associates LLC, who recruits information security pros, and Mark Potter, whom you may recognize as one of the CISOs we profiled in Dark Reading's recent How To Become A CISO series.

Find out what employers are really looking for in a CISO. Do you need to have an MBA, a computer science degree, and a list of certifications a mile long? Do you need a dozen years of experience writing code, another dozen practicing privacy compliance law, another dozen as an international spy, and another dozen managing a giant IT staff in the right industry? And if it's not what you know, but who you know, then who do you need to know, and how do you meet them?

In this episode, you'll learn what experience and skills employers want; how to obtain those skills and experience; how best to demonstrate your value; where the new job openings will be; how to meet the people who may introduce you to your next employer; and how to do it all without eating up so much time and money that you lose your current job and miss your mortgage payment.

Register now and join us Wednesday, Dec. 17. at 1:00 p.m. ET (10:00 a.m. PT). Have questions for the guests? Let us know in the comments below or bring them with you Wednesday and ask the guests yourself.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Technocrati
100%
0%
Technocrati,
User Rank: Ninja
12/15/2014 | 7:06:34 PM
Security Expert Needed: Find Out How ....

This is a really cool Radio Show which I am going to do my best to attend.  It is nice to see Dark Reading/Information Week tackle relevant topics that we techies need and enjoy !   

Nice job IW, DR and of course Sara !    Hope to see many from the community there - whether you aspire to become a security expert or not - there should be lot's of good information for thought.

Sara Peters
50%
50%
Sara Peters,
User Rank: Author
12/17/2014 | 12:09:52 PM
Re: Security Expert Needed: Find Out How ....
@Technocrati  THANKS! I hope you can make it today. You're always a fun, energetic presence in the chat.
gudguy1
50%
50%
gudguy1,
User Rank: Strategist
1/2/2015 | 1:25:45 PM
Re: Security Expert Needed: Find Out How ....
Yes, ditto on Technocrati's comments – I would've attended but it's now 1/2/15... 
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3331
PUBLISHED: 2021-01-27
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).