Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
CISOs' Salaries Expected to Edge Above $240,000 in 2018
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/22/2017 | 11:31:20 PM
Re: Acronym truth
@cybersavior: Clever! And apt. CISOs are often hired to be scapegoats more than anything else -- as an insurance policy in the form of a sacrificial lamb with which to appease the regulators.
cybersavior
50%
50%
cybersavior,
User Rank: Strategist
9/8/2017 | 2:53:39 PM
Acronym truth
As it's said, "Career Is Soon Over".
graciemilligan
50%
50%
graciemilligan,
User Rank: Apprentice
9/8/2017 | 1:09:51 AM
Re: On Robert Half
Inspiring article, this one gives a good expectation on salary; we need more money to sustain in this world. Work hard to get good result and t provide better service. 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/6/2017 | 7:09:59 PM
Re: On Robert Half
I once sat in the waiting room of a Robert Half many years ago waiting for a meeting with someone. I witnessed a man storm out of an office and have a yelling match with an employee. The disagreement had something to do with how he was being directed to fill out forms that he had already filled out repeatedly.

He stormed out, shouting that he would never work with them again, and to not contact him again.

I was baffled. I could understand being upset at bureaucracy, but I couldn't understand how a person hard up for a job could so cavalierly toss away an opportunity -- particularly as the Great Recession had freshly begun.

Now, being older and wiser, and knowing many people who have had working relationships with Robert Half (all of whom dearly regret it) and having heard their tales of woe, I completely understand that man's frustration that day.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/6/2017 | 3:46:27 PM
Re: On Robert Half
This series has gone off subject but your experience is indeed horrible.   
JRBuckley
50%
50%
JRBuckley,
User Rank: Apprentice
9/6/2017 | 3:37:42 PM
Re: On Robert Half
My experience with TekSystems was nice and clean for many years until my last experience.  They called me up, said they had reviewed my information, and wanted to meet with me to discuss a new role with a local client.  It's their policy to meet with each candidate in person, the recruiter said via phone.  I pointed out the fact that I've met with them in-person many times over the years and even worked with them but they wouldn't take no for an answer.  So I met with them.  Turns out, the whole thing was fakeThere was no job.  None.  It was a sales mining exercise.  They wanted my references and any work I've done through other recruiting firms so they could mine them for business.  When I made it clear that I wasn't going to provide them people for their sales pitch, the recruiter got defensive.  "Well, you should know that our branch manager has a special talent and knows within seconds if the person is the right person for the job or not."   Turns out, I wasn't the "right fit" for the fake job they didn't really have in the first place.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/6/2017 | 1:56:25 PM
On Robert Half
I have found them to be the most difficult people to get in touch with, contact or align one for a contract job in the world.  It is as if they DO NOT WANT to do business with you.  I have met some good reps in their offices and they always LEAVE for another job somewhere else.  I  have found TEKSYSTEMS to be fair and honest.  Their reps are fantastic and go the extra mile. 
JRBuckley
50%
50%
JRBuckley,
User Rank: Apprentice
9/4/2017 | 7:35:07 PM
Re: Seems quite high
There is a rule about working for Robert Half as a consultant.  Robert Half takes HALF.  It sounds like a joke, but it's actually not.  No one is laughing, especially the person that is doing all the work.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/2/2017 | 1:36:06 PM
Seems quite high
I'd be interested to know more about the methodology and sourcing of this study, because I find this highly dubious. In my experience (which, I grant, is anecdotal#, CISO and CISO-like roles are being undervalued.

#Plus, FWIW, and ad hominem as the point may be, as somebody who knows TONS of people who have worked with Robert Half, I don't know anybody who has the slightest good thing to say about that company except people who work at Robert Half.)
JRBuckley
100%
0%
JRBuckley,
User Rank: Apprentice
9/1/2017 | 1:57:55 PM
CISO Salaries Expected to... meanwhile...
Executive teams in multiple industries struggle to comprehend what a CISO does and equates the job itself as an "IT Problem", thus are setup for reporting into the IT Department, straining the IT budget, with very limited resources, tools, and ability to do their job.  What sounds like a ridiculous idea actually becomes reality when the IT Manager or even the person on the helpdesk is gloriously promoted to "Pseudo CISO" with none of the governance, real responsibilities of such a role, very limited visibility with regards to the business, and of course ALL the blame when things go terribly wrong due to a decision by the CCBDO "Chief Catastrophically Bad Decisions Officer".  The Board of Directors and Executive Leadership team shy completely away from calling the role a true CISO role by giving the position pet names like, "ISO" or "IT Security Manager" to lessen its overall influence.  Never mind the conflict of interests that present when the department you're auditing is the same department that controls your workload, priorities, and budget.  Meanwhile, the "Pseudo CISO" then is tasked with tackling a field he knows little about, told to check the boxes of compliance, and then held fully accountable when they are compromised aka fired.  In my line of work, I see this VERY often and there is no surprise at the amount of breaches we're seeing because of this mentality.  Many eTeams wish to spend as little money on security as possible and avoid a real CISO at all costs.
Page 1 / 2   >   >>


The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14248
PUBLISHED: 2019-07-24
In libnasm.a in Netwide Assembler (NASM) 2.14.xx, asm/pragma.c allows a NULL pointer dereference in process_pragma, search_pragma_list, and nasm_set_limit when "%pragma limit" is mishandled.
CVE-2019-14249
PUBLISHED: 2019-07-24
dwarf_elf_load_headers.c in libdwarf before 2019-07-05 allows attackers to cause a denial of service (division by zero) via an ELF file with a zero-size section group (SHT_GROUP), as demonstrated by dwarfdump.
CVE-2019-14250
PUBLISHED: 2019-07-24
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
CVE-2019-14247
PUBLISHED: 2019-07-24
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.
CVE-2019-2873
PUBLISHED: 2019-07-23
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...