New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 1020
Comments: 21
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image ntwrk: Feature Opinion: Staffing for security: Mission-critical positions image
Networks

Opinion: Staffing for security - Mission-critical positions







by Marcia J. Wilson, CCSP Staff Writer
March 16, 2004


"Reprinted from March 25, 2K3"

Staffing for security positions is a dilemma. Organizations are searching for the right mix of technologists and managers to meet the demands of securing networked computing environments.

Many of us who work in the profession are realizing that security clearances are becoming more of a requirement for the job. What are the mission-critical positions? Do you hire an MBA to run the program? Do you need a Ph.D. in computer science at the helm of security initiatives? Can you find someone who has the management and in-depth technology skills to move initiatives forward? What do you do? Who do you hire? Budgets are tight, yet security hires are a must. Here are some of the jobs that companies have posted on Internet job boards in recent months:
  • Information security officer
  • Senior director of risk management
  • Technology risk management/chief information officer
  • Vice president, information security operations
  • Director, data security
  • Security manager
  • Network engineer security specialist
  • Network security consultant
  • Senior network architect
  • Senior information systems auditor
  • Senior security analyst
  • IT security consultant
  • Senior information security engineer
  • Data security engineer
If you look at the job descriptions for each position, you quickly realize that there are not many well-defined positions. It appears that some companies are staffing from the top down and some companies are staffing from the bottom up, depending upon how far along the security path they are or how urgent the need is.

To staff for mission-critical positions defined to support a secure computing environment, it is critical to first design an organization or department that is wholly focused on security. You've got the chiefs: CIO (chief information officer), CTO (chief technology officer), CEO (chief executive officer), CFO (chief financial officer), COO (chief operating officer) and the newly defined CSO (chief security officer). And you've got the Indians, whose talents may include specific firewall configuration expertise, security awareness training, policy development, vulnerability management, intrusion-detection systems management, business continuity planning, disaster recovery, you name it.

In some companies, the CEO is the top dog with the other CXOs reporting in. Let's take that as a baseline and move down the chain. Information systems and technology has bounced around for years and has fallen under the responsibility of every chiefdom in existence. In some organizations, the CFO controls the money and if not in form, certainly in substance, owns the IT function. In other companies, the CIO reports directly to the CEO and owns all things related to "information."

Depending on the type of company you have, say manufacturing, the COO may own security, including data and physical security, but not the IT function.

There are many ways to organize and structure the responsibility. The key idea here is that security needs to be elevated to the same level of importance as accounting or production. There is also this idea of checks and balances. The responsibility and function of security needs to be a separate entity from IT and report to the highest possible organizational office.

IT, among others, has a little saying: "What they don't know won't hurt 'em." However, global internetworking has changed everything. What they don't know will hurt them. The IT department needs to be audited just like the finance department does.

I am a proponent of aligning business goals with security initiatives, so that would imply that I am also a proponent of designing a security organization from the top down, not from the bottom up.

I've noticed a trend among organizations that are beginning to hire security people. They hire a network architect or a firewall administrator and call it a day. The powers-that-be have no idea what needs to happen in what order to safeguard the organization's information assets. The mission-critical positions can be identified when an organization identifies a person, an office, a department or a division whose sole responsibility is to safeguard the organization's information assets. Once security owners are identified, an assessment can be made as to what additional staff is necessary based on current skill sets of employees and budgeting constraints. At minimum, an organization should conduct a business risk analysis and hire an outside firm to conduct an information security audit as two primary steps toward understanding the current security posture. Once you understand what you've got, you can move forward.

Recent legislation has brought security into the forefront of corporate consciousness. Recent world events and cyberterror threats are keeping security on the front burner. We can no longer plead ignorance. Organizations must understand what they've got and understand what they need to do and then hire the right people for the job.


*Note: Some links to stories may no longer function or now require you to register to view.





by Marcia J. Wilson ComputerCops Staff Writer

Marcia J. Wilson holds the CISSP designation and is the founder and CEO of Wilson Secure LLC , a company focused on providing independent network security auditing and risk analysis. She can be reached at .

Posted on Tuesday, 16 March 2004 @ 10:00:00 EST by cj
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· PHP HomePage
· HotScripts
· W3 Consortium
· More about Networks
· News by cj


Most read story about Networks:
D-Link DSL-300G/DSL-300G+ Default Password Vulnerability

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register