Thursday, March 31, 2016

Security Sessions: How to transition from tech professional to a business leader

Survey: With all eyes on security, talent shortage sends salaries sky high

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Mar 31, 2016
Featured Image
Video

Security Sessions: How to transition from tech professional to a business leader

Many security pros came up through the career ranks with a solid tech background. But security leadership demands more business acumen and expertise today. Lorna Koppel, Direction of Information Security for Tufts University, has been through this process in her career and shares her tips for making the transition smoothly and effectively. Watch Now

Twitter Facebook LinkedIn

Your Must-Read Stories

Survey: With all eyes on security, talent shortage sends salaries sky high
5 dev tools for better code security
5 things you should know about two-factor authentication
Comprehensive software security for cars will take years

White Paper: Juniper Networks

2016 Predictions: Security Solutions

The security market will continue to evolve alongside new requirements arising from the Internet of Things, cloud computing and sophisticated targeted attacks. Read More

Thumbnail Image
INSIDER

Survey: With all eyes on security, talent shortage sends salaries sky high

Annual IT Salary Survey shines a light on security hiring and compensation trends. Find out what your peers said about their career outlook and how your salary compares. Read More

Thumbnail Image

5 dev tools for better code security

Static and dynamic analysis can catch vulnerabilities in the development process -- before the bad guys can even access your code Read More

Thumbnail Image

5 things you should know about two-factor authentication

One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online. Read More

Thumbnail Image

Comprehensive software security for cars will take years

Software security for automobiles is improving but it will take another three or four years until car manufacturers can put overarching security architecture in place, says Stefan Savage, the winner of the 2015 ACM-Infosys Foundation Award in the Computing Sciences. Read More

White Paper: Juniper Networks

3 Major Challenges to Securing Your Data

Is your enterprise planning to leverage cloud computing and mobile computing in order to improve business agility, increase employee productivity, and lower capital expenses? Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 2:01 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive