Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
My interest in information security began when my dad gave me The Cuckoos Egg, a book by Cliff Stoll written in 1989.
For those who haven't read it, in short, Cliff was responsible for managing computers at Lawrence Berkeley National Laboratory in California. He was asked to resolve a 75-cent accounting error in the computer usage accounts.He discovered an unauthorized user who used the system for a short period of time, incurring the 75-cent fee. Over the next few years, he traced the hacker to Hanover, Germany, had him arrested and eventually testified at the trial.
It is a fascinating story that left a strong impression on me.
My career in information security began in earnest in mid-2007. I had recently joined a small retail bank headquartered in New York as a network administrator.
I was the 18th hire, and the IT department was two people. As we opened additional branches in New York and our employee ranks grew, the complexity of our annual audits with the New York State Banking Department and Federal Deposit Insurance Corporation increased.
We needed to answer questions related to information security. Do you have an incident response plan? What about a disaster recovery/business continuity plan? Management had no idea how to respond to these questions.
Where do you begin learning about these topics?
I began attending the annual RSA Conference in California, joined the local ISSA chapter and read books related to information security. I began building my network and connected with information security professionals in the area. Eventually, I earned a few industry certifications and began an information security-related master's degree.
Here is my advice, in no particular order, for those starting out.
I had a difficult time getting my first security-related job.
Employers were always looking for folks with either IT, networking or security-related experience. How can you get the experience if no one is willing to take a chance on you?
I found that by methodically achieving each milestone - joining a local chapter, finding a mentor, attending conferences, reading books and earning certifications - opportunities will present themselves.
I believe information security is a noble profession. Where else do you have the opportunity to protect your firm's infrastructure, reputation and confidential information from nefarious individuals?
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.