article thumbnail

Top Certifications in Cybersecurity and How they Can Advance Your Career

SecureWorld News

As organizations across industries grapple with escalating cyber risks, the demand for skilled information security professionals has skyrocketed. RELATED: (ISC)2 Study: Cybersecurity Industry Facing 3.4 Certification programs often require you to stay knowledgeable on the latest trends, technologies, and practices in the field.

Study 62
article thumbnail

Middle East cybersecurity industry explores how to engage more women

CIO Business Intelligence

Despite much discussion about how to icrease the percentage of women in cybersecurity roles over the last decade, women make up only 25% of the global cybersecurity workforce, according to the latest (ISC)² Cybersecurity Workforce Study. Nowadays, only 25% of women are studying computer science. In 1985 that percentage was 37%.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 key roles for driving digital success

CIO Business Intelligence

Another study of 4,000 global organizations found that only 44% had a high digital maturity. Product and delivery leaders: Agents of change While there are many ways to charter a program and define leadership responsibilities, I recommend leading transformation initiatives with these two key roles.

Agile 98
article thumbnail

Good People at @SecureNinja Provide Cyber Kung Fu Certified Ethical Hacker Course Free

CTOvision

From the video description: The Cyber Kung Fu program is designed for anyone who wants to learn about the EC-Council's Certified Ethical Hacker version 8 curriculum. Giving both context and additional content, Tom Updegrove's Cyber Kung Fu for CEH with Larry Greenblatt program has received worldwide accolades.

Course 150
article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

National Security Council Staff. Coordinator, Strategy & Intelligence Studies. School of Information. Managing Director Security. Chief Information Security Officer. Deputy Chief Information Officer. Deputy Director for Intelligence for Strategic Programs. Deputy Program Manager.

article thumbnail

Spotlight on Cybersecurity Leaders: Gene Kingsley

SecureWorld News

Gene Kingsley has worked as a dedicated resource in the Information Security space for more than 25 years, among industries such as Higher Ed, Healthcare, Finance, Federal Government agencies, and others. After that, I became a help desk manager for a local college and worked my way up to Director of Information Security.

article thumbnail

What makes a CIO truly great?

CIO Business Intelligence

46 AD) studied the lives of famous Greek and Roman leaders and concluded, “All who wished to become civic leaders first had to gain the confidence of their constituents.” (See Quite a list, just to start. And that’s not surprising given that people have been writing about leadership and performance for a long time. Today, it’s all about data.