article thumbnail

My CISM Journey - The True Value of Certifications

CIO Musings

I have toiled in the trenches, built authentication systems, lived through breaches, sold infosec investments to budget-minded leaders, built cyber security teams, and most importantly led in the cybersecurity area. I scheduled the exam, studied up on that one area and took a practice test. Hell yes, I want credit for all that.

Study 195
article thumbnail

The 15 best job markets for IT security specialists

Network World

Security jobs Image by Thinkstock Information technology budgets are not expected to grow substantially in the New Year, but one area where organizations continue to invest is in information security. To read this article in full or to leave a comment, please click here (Insider Story)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.

Policies 268
article thumbnail

How CIOs Are Addressing The “Unsustainable” Security Challenge

CIO Business Intelligence

Over 80 per cent of businesses have had their security budgets increase in the past year, according to research by Accenture , and IT security budgets are now as much as 15 per cent of all IT spending. Data and Information Security

article thumbnail

How Can CIOs Get Everyone To Create Strong Passwords?

The Accidental Successful CIO

I mean we all know what it takes to create a secure password – make it long, don’t use common words and change it often. Studies that are done about the passwords that people choose show that “12345678” is always the most popular one. However, nobody seems to do the right thing.

Research 130
article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

National Security Council Staff. Coordinator, Strategy & Intelligence Studies. School of Information. Office of Management and Budget. Managing Director Security. Chief Information Security Officer. Deputy Chief Information Officer. Chief Information Security Officer.

article thumbnail

Health check on Tech: CK Birla Hospitals CIO Mitali Biswas on moving the needle towards innovation

CIO Business Intelligence

Despite having studied optical electronics, I joined the bandwagon and entered the industry. Nearly 50% of my budget is spent on cybersecurity. Data and Information Security, Digital Transformation, Healthcare Industry Can you tell me about your career path so far? The late nineties were the IT era.