Professional movement gathers pace

Some of the UK's leading IT security professionals will use the Infosecurity show to drive forward their plans to create a...

Some of the UK's leading IT security professionals will use the Infosecurity show to drive forward their plans to create a professional body for IT security.

The proposed Institute for Information Security Professionals aims to give IT security the same professionalism as disciplines such as engineering and medicine.

The plans, devised last year by a working group of 15 prominent security professionals, have won backing from the Department of Trade & Industry and some of the UK's largest firms, including BP, BT and Royal Bank of Scotland.

"We would like to get the wider community aware of what we are doing and get their participation," said Nick Coleman, chairman of IT suppliers group Saint, one of the participants in the project.

The institute aims to professionalise IT security by setting recognised minimum standards for training and experience, and creating a continuous professional development programme and a code of ethics for IT security professionals.

The group is seeking feedback from IT security professionals on issues such as security training, the need for continuous professional development, and how to assess the experience of IT security staff.

Four working groups of IT security professionals from industry and government aim to create detailed blueprints for the institute by the end of June.

"If you were flying, you would want to make sure the pilot was certified as competent. The people behind the plane's IT systems should also be certified competent," said Coleman.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...