Risk management is a common theme across and within businesses, and at North Carolina State University the Enterprise Risk Management (ERM) program is attracting notice from prospective employers and students alike. Mark Beasley, head of the school's ERM initiative, discusses:
What makes the program unique;
The...
Information assurance is what everyone is talking about these days, and the term is strongly associated with "excellence" at the University of Dallas. Listen to Dr. Brett J.L. Landry, Director of the school's Center for Academic Excellence, Information Assurance, discuss:
What make's the school's program unique;...
Want to work in information security within the Defense Department (DoD)? Then you either have the appropriate professional certification when you start the job, or you attain one within six months.
"Prospective candidates for DoD jobs cannot be denied a job if they don't hold the certification," says George Bieber...
Risk management is a common theme across and within businesses, and at North Carolina State University the Enterprise Risk Management (ERM) program is attracting notice from prospective employers and students alike. Mark Beasley, head of the school's ERM initiative, discusses:
What makes the program unique;
The...
To be filed under the category of "One small step, one giant leap ..."
It's just come to my attention that when President Obama revealed his administration's cybersecurity policy at the end of May, the document's introduction featured a prominent reference to an article published on our sites in February of this year.
You've spent years in information security, toiling your way to the top - to the CISO role. What's next? What are your career options, and how should you prepare for exploring them?
Jennifer Bayuk is the former CISO at Bear Stearns & Co. She became an independent consultant after the company was acquired by...
So, the Obama administration has presented its cybersecurity plan establishing the practice as a major, new national priority.
What does this mean for information security careers?
Security experts that work closely with the government offer insights on the direction the new administration has taken regarding...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
Vendor Management: Banking/security leaders all know they need to get a better handle on it - but how?
Charlie Miller, former director of vendor governance at Merrill Lynch, offers his insight on improving vendor management, including:
The biggest challenges facing banking institutions;
Where to start the...
The International Information Systems Security Certification Consortium (ISC2) has recently launched an online information security course, the Live Online Official ISC2 Certified Information Systems Security Professional Common Body of Knowledge Review Seminar.
Facebook, Linkedin, Twitter.com. These are just a few of the most popular social networking websites that are used extensively to find, meet and greet new people through a vast array of advanced web tools.
Social networking sites allow individuals and organizations to build communities. But just as social...
With the Obama administration's focus on cybersecurity, this is a good time to start or move into an information security career. And Regis University in Colorado is one institution offering state-of-the-art education for undergraduates and graduates alike.
In an exclusive interview, Daniel Likarish, faculty of the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.