Showing Blog Posts: 1–10 of 38 tagged Professional Development

  • Book review: The Official (ISC)² Guide to the CISSP CBK Reference

    by Ben Rothke on June 18, 2019

    This is not my first review of a Certified Information Systems Security Professional (CISSP) test preparation guide, and it certainly won’t be the last. With the growing demand for information security professionals, and the often hiring requirement for certification, the CISSP is considered the gold-standard of certification in the information security space. As test takers desperately need…

  • The Cybersecurity Workforce Shortage Is a Big Problem. You Can Help Girl Scouts Solve It.

    by Sylvia Acevedo on April 5, 2019

    As CEO of Girl Scouts of the USA, I know the importance of having a cybersecurity workforce that protects our personal information, the systems that we depend on, and our national defense. This workforce must have the technical skills and a spirit of civic responsibility to be the STEM visionaries our society needs. The stats on the cybersecurity workforce shortage are well known. By 2021, there…

  • The Cyber Skills Shortage Continues to Balloon -- and Think Tanks Aren’t Helping

    by Robert Ackerman Jr. on March 29, 2019

    Late last year, underscoring the current U.S. cyber employee shortage of more than 300,000 workers, the prestigious Aspen Institute Cyber and Technology Strategy Group asked its sizeable cast of blue-chip cybersecurity experts to study solutions to this years-long – and ever-worsening – problem. The group, which is co-chaired by IBM Chairman and CEO Ginni Rometty and whose other members include…

  • The Skills Needed to Combat Today’s Cybersecurity Threats

    by James Stanger on March 15, 2019

    CompTIA recently polled about 600 companies worldwide to identify major cybersecurity trends. According to the respondents, we’re facing a three-fold set of challenges: Enlarging attack surface Increasinglywell-armed adversaries Lack of trained individuals The increased attack surface involves two major elements: First, we’re seeing a proliferation of powerful devices and applications. Many of…

  • Intel’s “Three Ways of Being” That Led To Inclusion Success, Part 2 of 2

    by Karen Worstell on December 27, 2018

    To view Part 1 of this series, click here: Barbara Whye, Chief Diversity and Inclusion Officer and VP HR for Intel. says that tech companies who are behind in implementing their diversity and inclusion statistics may be unwilling to discuss that situation publicly and that they shouldn’t feel that way. …

  • Intel’s “Three Ways of Being” That Led To Inclusion Success, Part 1 of 2

    by Karen Worstell on December 21, 2018

    An inclusive workplace is the future of tech. “If you don’t reflect your customer in your workplace in terms of demographics, you can’t understand your customer, says Jim Gordon, Intel’s GM Security Ecosystem Strategy & Development . Tech industry giant Intel took “doing the right thing” and made it a business imperative to show how impactful true inclusion can be. Their results were impressive and…

  • Cybersecurity Burnout: What It Is, Why It Matters, and What to Do About It

    by Karen Worstell on November 20, 2018

    Burnout is a critical issue for company productivity, innovation, and talent retention. This month is devoted to burnout: causes, identification, prevention, and what to do if you are already there. I recently gave a keynote address about the problem of burnout in the cybersecurity space. What astonished me was what happened after. Audience members approached me, many with tears in their eyes, to…

  • Cybersecurity Talent: Will Your Company Ride the Wave, or Drown in the Tsunami?

    by Karen Worstell on November 1, 2018

    The state of cybersecurity worldwide is in grave peril. We are facing a massive deficit of talent, and it’s about to get much worse. An estimated 3.5 million jobs won’t have a qualified person to fill them by 2020. It goes without saying that a cyber talent gap translates to an ever-growing security gap between the rapid pace of technology change and security innovation. Without premium security…

  • Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

    by Ben Rothke on September 28, 2018

    For those in the New York City area, they know the tagline from radio station 1010 WINS “you give us 22 minutes, we'll give you the world”. It’s no exaggeration to claim that one could create a significantly size cloud-based IT infrastructure in AWS in 22 minutes. It’s also no exaggeration to claim that such an infrastructure would be seriously lacking in security and privacy controls. In …

  • The Top Skills of Fortune 100 CISOs

    by RSAC Editorial Team on September 28, 2018

    Link to original post: The role of CISO is constantly expanding and evolving with the growing awareness of cyber attacks. As cyber attacks increase in density and sophistication, organizations are beginning to look at security as a business priority and the role of CISO has become more critical. Companies need to look beyond basic technical expertise and the…

View All


Are you interested in contributing to the RSA Conference blog? Download our 2019 Editorial Calendar for more info. 

This document was retrieved from on Sun, 18 Aug 2019 21:35:37 -0400.