The U.S. Cyber Challenge will hold an online contest to identify talented high school students with the skills to pursue advanced education and job opportunities in the cybersecurity field.
Professor Eugene Spafford of Purdue University on the forces shaping information assurance education
Could it be that schools, businesses and government are finally coming together to create a dynamic new impact on information assurance education?
Gene Spafford is optimistic. Having shared his reservations about the...
"The impact of executive training on IT security is about owning the responsibilities, sharing accountability and balancing the risks," says Lee Congdon, CIO at Red Hat.
A rise in unemployment could be a harbinger of an improving economy, as discouraged individuals reentered the job market. Indeed, the IT workforce topped 4.12 million in the fourth quarter, a record high.
"We need to be cyber savvy if we are going to participate in cybersecurity," says Ed Kanerva, vice president at Booz Allen Hamilton. "We cannot hire folks if they are not out there, so instead we train them to be cyber experts."
While IT employment numbers may be lagging, there is strong hope within information security, which is emerging as the hot sector for career prospects in 2011.
Northrop Grumman Corporation has invited three of the nation's leading research institutions to join a Cybersecurity Research Consortium to advance research in this field.
Cybersecurity, forensics, risk management -- what will be the core security skills needed in organizations in 2010?
In an exclusive interview, Kent Anderson, founder and managing director of Encurve LLC, as well as a member of ISACA's Security Management Committee, discusses:
The core security skills now needed...
Best-Practices for Getting Across the Right Messages
The board members at a financial institution are responsible for oversight and implementation of a sound security program, including the overall guidance and direction of setting a cultural value related to risk awareness, driving policy and strategy, defining a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.