Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
CISOs' Salaries Expected to Edge Above $240,000 in 2018
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/22/2017 | 11:31:20 PM
Re: Acronym truth
@cybersavior: Clever! And apt. CISOs are often hired to be scapegoats more than anything else -- as an insurance policy in the form of a sacrificial lamb with which to appease the regulators.
cybersavior
50%
50%
cybersavior,
User Rank: Strategist
9/8/2017 | 2:53:39 PM
Acronym truth
As it's said, "Career Is Soon Over".
graciemilligan
50%
50%
graciemilligan,
User Rank: Apprentice
9/8/2017 | 1:09:51 AM
Re: On Robert Half
Inspiring article, this one gives a good expectation on salary; we need more money to sustain in this world. Work hard to get good result and t provide better service. 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/6/2017 | 7:09:59 PM
Re: On Robert Half
I once sat in the waiting room of a Robert Half many years ago waiting for a meeting with someone. I witnessed a man storm out of an office and have a yelling match with an employee. The disagreement had something to do with how he was being directed to fill out forms that he had already filled out repeatedly.

He stormed out, shouting that he would never work with them again, and to not contact him again.

I was baffled. I could understand being upset at bureaucracy, but I couldn't understand how a person hard up for a job could so cavalierly toss away an opportunity -- particularly as the Great Recession had freshly begun.

Now, being older and wiser, and knowing many people who have had working relationships with Robert Half (all of whom dearly regret it) and having heard their tales of woe, I completely understand that man's frustration that day.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/6/2017 | 3:46:27 PM
Re: On Robert Half
This series has gone off subject but your experience is indeed horrible.   
JRBuckley
50%
50%
JRBuckley,
User Rank: Apprentice
9/6/2017 | 3:37:42 PM
Re: On Robert Half
My experience with TekSystems was nice and clean for many years until my last experience.  They called me up, said they had reviewed my information, and wanted to meet with me to discuss a new role with a local client.  It's their policy to meet with each candidate in person, the recruiter said via phone.  I pointed out the fact that I've met with them in-person many times over the years and even worked with them but they wouldn't take no for an answer.  So I met with them.  Turns out, the whole thing was fakeThere was no job.  None.  It was a sales mining exercise.  They wanted my references and any work I've done through other recruiting firms so they could mine them for business.  When I made it clear that I wasn't going to provide them people for their sales pitch, the recruiter got defensive.  "Well, you should know that our branch manager has a special talent and knows within seconds if the person is the right person for the job or not."   Turns out, I wasn't the "right fit" for the fake job they didn't really have in the first place.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/6/2017 | 1:56:25 PM
On Robert Half
I have found them to be the most difficult people to get in touch with, contact or align one for a contract job in the world.  It is as if they DO NOT WANT to do business with you.  I have met some good reps in their offices and they always LEAVE for another job somewhere else.  I  have found TEKSYSTEMS to be fair and honest.  Their reps are fantastic and go the extra mile. 
JRBuckley
50%
50%
JRBuckley,
User Rank: Apprentice
9/4/2017 | 7:35:07 PM
Re: Seems quite high
There is a rule about working for Robert Half as a consultant.  Robert Half takes HALF.  It sounds like a joke, but it's actually not.  No one is laughing, especially the person that is doing all the work.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/2/2017 | 1:36:06 PM
Seems quite high
I'd be interested to know more about the methodology and sourcing of this study, because I find this highly dubious. In my experience (which, I grant, is anecdotal#, CISO and CISO-like roles are being undervalued.

#Plus, FWIW, and ad hominem as the point may be, as somebody who knows TONS of people who have worked with Robert Half, I don't know anybody who has the slightest good thing to say about that company except people who work at Robert Half.)
JRBuckley
100%
0%
JRBuckley,
User Rank: Apprentice
9/1/2017 | 1:57:55 PM
CISO Salaries Expected to... meanwhile...
Executive teams in multiple industries struggle to comprehend what a CISO does and equates the job itself as an "IT Problem", thus are setup for reporting into the IT Department, straining the IT budget, with very limited resources, tools, and ability to do their job.  What sounds like a ridiculous idea actually becomes reality when the IT Manager or even the person on the helpdesk is gloriously promoted to "Pseudo CISO" with none of the governance, real responsibilities of such a role, very limited visibility with regards to the business, and of course ALL the blame when things go terribly wrong due to a decision by the CCBDO "Chief Catastrophically Bad Decisions Officer".  The Board of Directors and Executive Leadership team shy completely away from calling the role a true CISO role by giving the position pet names like, "ISO" or "IT Security Manager" to lessen its overall influence.  Never mind the conflict of interests that present when the department you're auditing is the same department that controls your workload, priorities, and budget.  Meanwhile, the "Pseudo CISO" then is tasked with tackling a field he knows little about, told to check the boxes of compliance, and then held fully accountable when they are compromised aka fired.  In my line of work, I see this VERY often and there is no surprise at the amount of breaches we're seeing because of this mentality.  Many eTeams wish to spend as little money on security as possible and avoid a real CISO at all costs.
Page 1 / 2   >   >>


Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27254
PUBLISHED: 2021-03-05
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7800. Authentication is not required to exploit this vulnerability. The specific flaw exists within the apply_save.cgi endpoint. This issue results from the use of hard-coded encrypti...
CVE-2021-27255
PUBLISHED: 2021-03-05
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability. The specific flaw exists within the refresh_status.aspx endpoint. The issue results from a lack of...
CVE-2021-27256
PUBLISHED: 2021-03-05
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists wit...
CVE-2021-27257
PUBLISHED: 2021-03-05
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via...
CVE-2021-26705
PUBLISHED: 2021-03-05
An issue was discovered in SquareBox CatDV Server through 9.2. An attacker can invoke sensitive RMI methods such as getConnections without authentication, the results of which can be used to generate valid authentication tokens. These tokens can then be used to invoke administrative tasks within the...