More from SearchSecurity -- July 2006

Highlights from the July 2006 issue of Information Security magazine.

 

Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
Identity and Access Management Security School
Regardless of a company's size, identity and access management can be a huge undertaking that requires efficient oversight of many moving parts. Join us July 17 for Identity and Access Management Security School. This six-lesson program will explore critical topics related to helping information security practitioners establish and maintain an effective identity and access management plan.
>> GO TO IDENTITY AND ACCESS MANAGEMENT SECURITY SCHOOL


Cha-Ching! 52 Ways to Boost Your Career and Your Paycheck
This month's issue of Information Security magazine provided you with an in-depth Careers Guide to help you get your career on the right track and climb the corporate ladder. Now visit our online resource centers where you'll find the latest news, expert advice and learning tools on information security jobs, training and certifications.
>> INFORMATION SECURITY JOBS
>> INFORMATION SECURITY CERTIFICATIONS
>> INFORMATION SECURITY TRAINING


Career management 101
Is your career on the right track? Here is a list of eight questions that information security professionals should ask themselves and answer honestly to insure that their career is progressing on the path they desire.
>> TAKE THE CAREER ASSESSMENT FOR INFORMATION SECURITY PROS


CV dos and don'ts
In this month's issue, you read 10 surefire tips for writing a resume that stands out in the stack. Now check out a sample of a well-crafted CISO resume.
>> READ THE SAMPLE CHIEF INFORMATION SECURITY OFFICER RESUME


PING with Don Ulsch
In this Q&A with Information Security magazine, Don Ulsch, technology risk management director for Jefferson Wells, explains why physical and IT security can no longer be treated separately and why security officers must pay attention to employees who visit blogs and carry around Web-enabled camera phones.
>> READ THE INTERVIEW WITH DON ULSCH



HIGHLIGHTS ARCHIVES
June 2006 May 2006 April 2006 March 2006 February 2006 January 2006
December 2005 November 2005 October 2005 September 2005 August 2005 July 2005
June 2005 May 2005 April 2005

Read more on Hackers and cybercrime prevention