« HealthCare Security & Privacy Professionals Defined | Main | FREE Ways to Earn Continuing Professional Education (CPE) Credits for Your InfoSec Certification »

20 December 2013

Comments

Jan Buitron, MSIA, CISSP, Doctoral Candidate

First, the cybersecurity professional must at least understand the technical side of cybersecurity and be armed with a security stream-of-consciousness at all times. Next, these skills must be sharpened on a daily basis. Last but not least, we as security professionals need to educate our colleagues and corporate management, then educate, explain, and educate some more. Once a large breach, aka Target in 2013 has happened, corporate leadership cannot put the incident into a bottle and close it. Our job is to lead management skillfully. Technical tools are a significant portion of information security, but they are not the be-all and end-all. A trained work force must support the technical portion, and an overarching corporate security policy must back the security program.

And, once in place, the security program must be continually evaluated and reporting must be in place for performance analysis and improvement.

thanks

The comments to this entry are closed.

About the (ISC)² Blog

As the certifying body for more than 100,000 information security professionals worldwide, (ISC)² believes in the importance of open dialogue and collaboration. (ISC)² established this blog to provide a voice to certified members, who have significant knowledge and valuable insights that can benefit other information security professionals and the public at large.

The (ISC)2 blog gives members a forum to exchange ideas and inspires a safe and secure cyber world by supporting the advancement of the information security workforce via a public exchange with a broad range of information security topics.

Whether an (ISC)² member chooses to participate in the (ISC)² blog is his or her own decision. The postings on this site are the author's own and don't necessarily represent (ISC)²'s positions, strategies or opinions. (ISC)² monitors the blog in accordance with the (ISC)² Blog Guidelines, but the bloggers are responsible for their own content – common sense and intelligence should prevail.

Other than links to the (ISC)2 website, (ISC)² does not control or endorse any links to products or services provided in this blog and makes no warranty regarding the content on any other linked website.

Those who post comments to (ISC)² blogs should ensure their comments are focused on relevant topics that relate to the specific blog being discussed. (ISC)² reserves the right to remove any post or comment from this site. Should you find objectionable content in this blog, please notify us as soon as possible at blog@isc2.org

Please click here for FAQs.

Please click here for the Blog Guidelines.