A survey of American households - the same one used to determine the national unemployment rate - shows that 37,000 individuals in the United States consider themselves as information security analysts.
From Facebook to Twitter, the new era of business communication and collaboration requires involvement of senior leaders to guide an organization's social media strategy and engagement. It's a big role, and it comes with significant responsibilities.
Patrick Gorman, a former associate director of the Office of the Director of National Intelligence, is the new chief information security officer and senior vice president at Bank of America, the nation's largest bank company.
"We really need to speak the language of business and focus less on the language of IT, and that involves risk management" Iowa CISO Jeff Franklin says. "You really need to target those resources to your most critical systems."
After the revelation of Operation Aurora, the term began to take on a different meaning. "In essence," IBM's X-Force report says, "APT became associated with any targeted, sophisticated or complex attack regardless of the attacker, motive, origin or method of operation."
Former New York State CISO Will Pelgrin is expanding his influence over information security nationwide as chief executive officer of the newly revised Center for Internet Security that encompasses MS-ISAC and the U.S. Cyber Challenge.
"We are looking to build a cybersecurity workforce from the ground up, rather than hire those already trained," says Nicole Dean, Deputy Director of the National Cyber Security Division at DHS. "We are looking to hire the best and the brightest."
The good news is that Indian banking institutions are leaders in information security training. The bad news is that the banks are among the few industries to embrace training and education, says Anil Dhawan of Aditya Infotech Limited.
Emerging technologies, application vulnerabilities and regulatory compliance force organizations to bridge the development and security silos and find avenues for interdisciplinary cooperation to produce secure software.