Blog Posts Tagged with "Professional"
May 17, 2012 Added by:Jayson Wylie
If I said "hacker", everyone knows what goes along with that, and the audience may be impressed or annoyed depending on their fanfare or if they have been victimized. People still think hacker when they hear "pentester" and do not believe the in the existence of pure "white hats"...
May 16, 2012 Added by:Marc Quibell
The point is that hiring managers will look you up online, and your 'Internet Presence' will be scrutinized, and even more so because these are most likely technical people and know where to look. It's time to grow up and stop being that anonymous troll...
May 14, 2012 Added by:Infosec Island Admin
Infosec is not a religion. There are no Cardinals, there are no Bishops, there are only a bunch of people who want their opinion to be heard and listened to ad nauseum. It’s as simple as that, and if you start clothing it in the robes of ecclesiastical rhetoric, you FAIL...
May 08, 2012 Added by:Andrew Weidenhamer
I often wonder is Evangelist the right title for some individuals. Considering that the main audience for a “Security Evangelist” is the security community, I’m not entirely sure how much conversion is actually happening as we all understand the importance of security...
May 02, 2012 Added by:Infosec Island Admin
Gesticulating and making odd sounds, the hackers milled and jerked around like some strange species of black raptors. Babbling incoherently about arcane knowledge in the hopes of one upping the other hapless technoweens in the room....
April 26, 2012 Added by:Infosec Island Admin
The PSG will be composed of 30 leading experts in network and information security, and should represent the information and communications industry, consumer and user organizations, as well as academic and research institutions. Submit applications by April 30, 2012...
April 25, 2012 Added by:Rafal Los
The only way that information security can be a group of outliers is if we're considering ourselves within the entirety of the IT realm. While this would be great for my ego to think that myself and all my peers are just smarter than everyone else in IT, I know this to be false...
April 19, 2012 Added by:Rafal Los
What's interesting is the question of business value. Management sends employees to 'security conferences' to learn something and bring it back to the organization. But what value do the ever-increasing number of security conferences provide as stand-alone events?
April 12, 2012 Added by:T.H. Enders
Breaking News: In uncanny synchronicity, CISOs, CSOs, auditors, and security consultants up and walked off their jobs today. It's hard to say what the repercussions will be. Pundits, analysts, and DHS are still trying to get a clear picture of the breadth of the problem...
April 10, 2012 Added by:Rafal Los
Everything you do as an infosec leader needs to be aligned to your organization's mission statement and goals. Everything you do, every security-related decision you make, and every purchase and project you sign off on must first and foremost be aligned to the organization...
April 09, 2012 Added by:Javvad Malik
This domain has a good title and there is probably a lot one can talk about. There are not enough competent security architects on the market. Sure you can get a lot of penetration testers of or risk and compliance type people. But good architects are hard to come by...
April 06, 2012 Added by:Steven Fox, CISSP, QSA
The essential approach to enhancing the role of security professionals is to enhance their organizational influence. This article kicks off a series exploring basic influence styles, the associated pitfalls, and guidance for their proper application...
April 02, 2012 Added by:Dave Shackleford
We are coming to the realization that we will be breached. This is a huge, fundamental shift in mindset that’s actually healthy, not redolent of defeatism. We have too much surface area to cover, not enough people and technology, and dammit, defense is hard...
March 16, 2012 Added by:Security BSides
A combination of students, professionals, geeks and tinkerers gathering to discuss Information Security, hear awesome talks and bring security into our everyday lives. Our mission is to provide an inclusive, inspiring and motivational environment to discuss and collaborate...
March 12, 2012 Added by:J. Oquendo
When "experts" start believing their own hodge-podge of "truths", it spreads like a cancer and ends up in the ears of decision makers. When will security pros stop focusing on marketing in hopes of selling shares of the Brooklyn Bridge and focus on actually securing something?
March 08, 2012 Added by:Security BSides
We all know how hard it can be to find your voice, or translate data into talking points that won't lose your audience, so we're looking to pair first time conference speakers with a mentor who has a solid track record in public speaking to work with them from CFP to the podium...
Cybersecurity vs. Cyber Security: When, Why ... asad ali on 01-25-2015
Who's Responsible for the Saudi Aramco Netwo... clash12121 clans on 01-24-2015
Why You Shouldn’t Use the OWASP Top 10 as ... abdul bari Chanessra on 01-24-2015