- So there are really three different ways…you can move in your career in security.…If you go down the technical route,…there are many sub-disciplines…of information security that you can explore.…Forensics analysts can get involved…in all sort of investigations,…either on the law enforcement side…working for the government,…or an internal group within an organization…that's just looking at internal investigations…and incident response, and those sorts of things.…You can also get involved in becoming…a security architect, figuring out…whenever you're designing new systems,…networks, whatever it might be,…how to make sure that security is…a key design element from the very beginning…of that project and make sure…that it permeates the rest of the project.…
It works much better when security…is designed as an architectural consideration…instead of trying to be bolted on afterwards,…it just doesn't work well that way.…So those are some of the more technical things…you can do.…On the consulting side, there's a lot of roles…
- How does one break into the cybersecurity field?
- What are the various career tracks?
- How do organizations prevent a security breach?
- What are the compliance issues?
- Who is responsible for security in the cloud?
- How does IT security impact other business divisions?
These are the kinds of insights that can help you explore a new career, focus on a course of study, or even prepare for an interview.
- Recognize the priority levels of the different types of cybersecurity risks.
- Recall three common responsibilities for cybersecurity professionals.
- Identify strategies for minimizing the impact of a security incident.
- Name three cornerstones of the information security profession.
- Explain the primary objective of cybersecurity professionals.
- Determine when it is appropriate to utilize encryption to protect information.