Why You Should Work in Information Security

Archive for November, 2015

Why You Should Work in Information Security

Posted by

Rasmussen College reached out for advice on why information security is a great field to be in. My response is below. Click through to read more thoughts.

 

Expert Advice on Why You Should Work in Information Security … NOW
http://www.rasmussen.edu/degrees/technology/blog/expert-advice-why-work-in-information-security/

 

1. Working in information security is exciting, challenging and never-ending

“Information security is new unexplored territory … and this creates exciting and challenging work,” says J. Wolfgang Goerlich, vice president of consulting at VioPoint.

Information security professionals work on teams to develop tactics that will help find and solve unauthorized access as well as potential data breaches. A crucial part of the job in information security is keeping companies from having to deal with unwanted exposure.

The best information security teams, Goerlich says, are those that provide “consistent mentoring and cross-training.” He says professionals in this field must be constantly learning and sharing what they know.

“As the technology is shifting and the attacks are morphing, the career effectively is one of life-long learning,” Goerlich says.

Encode/Decode Episode 1

Posted by

I have launched new podcast: Encode/Decode — Hacker Defense Against the Dark Arts. We are going to highlight the defense with stories from the trenches. Kicking us off is Christian Kopacsi, Michigan’s CISO, who will discuss the Cyber Civilian Corp and the state’s incident response programs.

Drowning in a sea of cybersecurity tools

Posted by

Posted on TechTarget SearchSecurity: Drowning in a sea of cybersecurity tools?

How can CISOs get the information and benchmarks they need to evaluate the enterprise effectiveness of promising technology and find the best security tools beyond point solutions?

“There is too much for any one leader to take in; therefore, the first step is in focusing on key areas,” says J. Wolfgang Goerlich, a cybersecurity strategist at Creative Breakthrough Inc. (CBI) in Ferndale, Mich. A former information systems and security manager at Munder Capital Management, Goerlich recommends networking with CISOs in other organizations to gain insight into the best security tools and industry-specific trends. “Building a strong peer network within the organizations gives visibility into the line-of-business technologies,” he explains.

Enterprises should leverage the resources and interactions available through clearinghouses like the Information Sharing and Analysis Centers (ISACs) for financial services, healthcare and other industries to focus on emerging threats. “Taking into account these areas, a CISO can then pare down the list to essential technologies and get deep in the areas that directly affect their organization,” Goerlich says.

Read the full article at: http://searchsecurity.techtarget.com/feature/Drowning-in-a-sea-of-cybersecurity-tools