{"id":2110,"date":"2006-01-03T00:00:00","date_gmt":"2006-01-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/03\/more-it-security-pros-filling-executive\/"},"modified":"2021-12-30T11:40:41","modified_gmt":"2021-12-30T11:40:41","slug":"more-it-security-pros-filling-executive","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/03\/more-it-security-pros-filling-executive\/","title":{"rendered":"More IT Security Pros Filling Executive"},"content":{"rendered":"<p>Information security professionals, already experiencing a surge in demand for their badly needed technical skills, may also get a chance this year to flex their business acumen.  IT security professionals are being invited into corporate board rooms around the globe, wielding more influence and finding increased opportunities.    &#8220;This year, professionals worldwide indicated that information security is now being perceived as a business enabler rather than a business expense, and as a result, they are increasingly being included in strategic discussions with the most senior levels of management,&#8221; Rolf Moulton, president and CEO of ISC said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Schmidt, on the Board of Directors of the International Information Systems Security Certification, said he gets calls three or four times a month from companies that recently created executive positions in security.  &#8220;There&#8217;s more attention and focus on IT security as a profession, as opposed to just a job,&#8221; Schmidt said.<\/p>\n<p>The factors giving information security professionals greater visibility are: the maturation of the certification process; the increasing mobility of the world&#8217;s workforce and subsequent vulnerabilities; growing sophistication among hackers; more stringent regulations regarding data.  &#8220;A lot of companies are finding themselves being in better financial positions, freeing up funds for investments in staffing and security,&#8221; Bohne said.  <\/p>\n<p>The IDC study, which culminated from the responses of 4,305 full-time information security professionals in more than 80 countries, showed that information security is most mature in the Americas.<\/p>\n<p>Experience counts for something, but accreditation is helping build credibility in the information security field as well.<\/p>\n<p>http:\/\/www.securitypipeline.com\/news\/175800733<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2110","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2110"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2110\/revisions"}],"predecessor-version":[{"id":4597,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2110\/revisions\/4597"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}