Details

Navigating the Cybersecurity Career Path


Navigating the Cybersecurity Career Path


1. Aufl.

von: Helen E. Patton

19,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 29.10.2021
ISBN/EAN: 9781119833437
Sprache: englisch
Anzahl Seiten: 336

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Land the perfect cybersecurity role—and move up the ladder—with this insightful resource</b></p> <p>Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult.</p> <p>In <i>Navigating the Cybersecurity Career Path,</i> decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams. In this book, readers will find:</p> <ul> <li>Explanations of why and how the cybersecurity industry is unique and how to use this knowledge to succeed</li> <li>Discussions of how to progress from an entry-level position in the industry to a position leading security teams and programs</li> <li>Advice for every stage of the cybersecurity career arc</li> <li>Instructions on how to move from single contributor to team leader, and how to build a security program from scratch</li> <li>Guidance on how to apply the insights included in this book to the reader's own situation and where to look for personalized help</li> <li>A unique perspective based on the personal experiences of a cybersecurity leader with an extensive security background</li> </ul> <p>Perfect for aspiring and practicing cybersecurity professionals at any level of their career, <i>Navigating the Cybersecurity Career Path</i> is an essential, one-stop resource that includes everything readers need to know about thriving in the cybersecurity industry.</p>
<p>Foreword: Navigating the Cybersecurity Career Path xv</p> <p>Introduction xvii</p> <p><b>Part I Arriving in Security 1</b></p> <p><b>Chapter 1 How Do You Become a Security Professional? 3</b></p> <p>Create Your Story 8</p> <p>So, You Want to Work in Security 13</p> <p>What’s Next? 16</p> <p><b>Chapter 2 Why Security? 19</b></p> <p>What Kind of People Do Security? 21</p> <p>What Is Your Why? 24</p> <p>What’s Next? 28</p> <p><b>Chapter 3 Where Can I Begin? 29</b></p> <p>What Does It Mean to Be a Security Professional? 32</p> <p>How Can You Make Sense of It All? 35</p> <p>What’s Next? 39</p> <p><b>Chapter 4 What Training Should I Take? 41</b></p> <p>For the Traditional Student 43</p> <p>For the Nontraditional Student 44</p> <p>For the Full-Time</p> <p>Nonsecurity Worker 45</p> <p>Other Things to Consider 46</p> <p>What’s Next? 51</p> <p><b>Chapter 5 What Skills Should I Have? 53</b></p> <p>The Entry Point —Technology 55</p> <p>Professional Skills 59</p> <p>What’s Next? 66</p> <p><b>Chapter 6 Is My Résumé Okay? 67</b></p> <p>Linking the Résumé to the Job Posting 70</p> <p>Elements of a Résumé 71</p> <p>Digital Presence 77</p> <p>References 78</p> <p>Cover Letters 79</p> <p>What’s Next? 80</p> <p><b>Chapter 7 Trying with Little Success? 81</b></p> <p>Physical Location 85</p> <p>Your Company 85</p> <p>Get Specific 86</p> <p>Know Your Market 88</p> <p>Assess Your Efforts So Far 89</p> <p>But I’m Doing All Those Things! 91</p> <p>What’s Next? 92</p> <p><b>Part II Thriving in Security 93</b></p> <p><b>Chapter 8 How Do I Keep Up? 97</b></p> <p>Fitting It Into Your Schedule 99</p> <p>Ad Hoc and Planned Learning 102</p> <p>Take a Mini-Sabbatical 103</p> <p>Where Do I Find the Information? 103</p> <p>What’s Next? 105</p> <p><b>Chapter 9 </b>How Can I Manage Security Stress? 107</p> <p>The Stress of Working in Security 109</p> <p>Managing Security Stress 113</p> <p>What’s Next? 118</p> <p><b>Chapter 10 How Can I Succeed as a Minority? 119</b></p> <p>Making Security Work for You 124</p> <p>What’s Next? 128</p> <p><b>Chapter 11 How Can I Progress? 129</b></p> <p>The Security Journey 131</p> <p>The Opportunist 132</p> <p>The Intentional Career Seeker 136</p> <p>How to Get Promoted 139</p> <p>What’s Next? 141</p> <p><b>Chapter 12 Should I Manage People? 143</b></p> <p>Leadership and Management 145</p> <p>Preparing for Your Next Role 150</p> <p>What’s Next? 152</p> <p><b>Chapter 13 How Can I Deal with Impostor Syndrome? 153</b></p> <p>Fact-Check Your Inner Monologue 157</p> <p>Know Competence and Incompetence 158</p> <p>Know When to Ask for Help 159</p> <p>Keep Learning and Know When Enough Is Enough 160</p> <p>Keep Track of Your Successes 161</p> <p>What’s Next? 162</p> <p><b>Chapter 14 How Can I Know If It’s Time to Move On? 163</b></p> <p>Are You Happy Where You Are? 165</p> <p>Have You Done All You Wanted to Do? 166</p> <p>Have You Learned All You Wanted? 167</p> <p>What Are Your Long-Term Goals? 168</p> <p>Are You Being Pigeonholed? 169</p> <p>Do You Fit Into the Culture? 170</p> <p>Job Hopping 171</p> <p>Are the Other Options Better than Your Current Job? 172</p> <p>What’s Next? 173</p> <p><b>Part III Leading Security 175</b></p> <p><b>Chapter 15 Where Do I Start? 179</b></p> <p>What’s on Fire? 180</p> <p>What Is Your Timeline to Act? 181</p> <p>Who Are Your Partners? 182</p> <p>Find the Strengths and Note the Weaknesses 183</p> <p>Draw the Business Risk Picture 184</p> <p>Do You Have a Mandate? 185</p> <p>What’s Next? 186</p> <p><b>Chapter 16 How Do I Manage Security Strategically? 187</b></p> <p>Consider Your Industry 190</p> <p>Know Your Business Priorities 191</p> <p>Be Pragmatic 193</p> <p>Address Stakeholder Pain Points 194</p> <p>Threats and Vulnerabilities 195</p> <p>Rinse and Repeat 197</p> <p>Putting It Together 198</p> <p>What’s Next? 200</p> <p><b>Chapter 17 How Do I Build a Team? 201</b></p> <p>It Is About the How 203</p> <p>Things to Consider 207</p> <p>Identify Important Things 209</p> <p>Identify Areas of Weakness 211</p> <p>Discontinuing a Function 212</p> <p>Building New Functions 213</p> <p>What’s Next? 215</p> <p><b>Chapter 18 How Do I Write a Job Posting? 217</b></p> <p>The Challenge of Job Postings 220</p> <p>What’s Next? 225</p> <p><b>Chapter 19 How Do I Encourage Diversity? 227</b></p> <p>Start with Numbers 229</p> <p>Understand Your Cultural Issues 230</p> <p>Attracting Diverse Talent 232</p> <p>Writing the Job Description and Posting 234</p> <p>The Interviewing Process 235</p> <p>Retaining Diverse Talent 236</p> <p>Promotions and Career Development 237</p> <p>Leaving the Team 239</p> <p>What’s Next? 239</p> <p><b>Chapter 20 How Do I Manage Up? 241</b></p> <p>Who Are Senior Stakeholders? 242</p> <p>Help Them Understand Security 246</p> <p>When Things Go Wrong 250</p> <p>What’s Next? 251</p> <p><b>Chapter 21 How Do I Fund My Program? 253</b></p> <p>Funding a Team 255</p> <p>Funding a Program 256</p> <p>The Big Ask 260</p> <p>What’s Next? 261</p> <p>Chapter 22 How Do I Talk About My Security Program? 263</p> <p>What Story Should I Tell? 264</p> <p>Telling Stories 271</p> <p>What’s Next? 273</p> <p><b>Chapter 23 What Is My Legacy? 275</b></p> <p>Making an Impact on the Industry 277</p> <p>Making an Impact on Your Company 281</p> <p>What’s Next? 283</p> <p>Epilogue 285</p> <p>Appendix: Resources 287</p> <p>About the Author 291</p> <p>Acknowledgments 293</p> <p>Index 295</p>
<p><b>HELEN E. PATTON</b> has held several senior technical leadership positions in cybersecurity, including Advisory Chief Information Security Officer at Cisco, AVP and Chief Information Security Officer at the Ohio State University and Executive Director of IT Risk and Resiliency at JP Morgan Chase.</p>
<p><b>A detailed blueprint to beginning and advancing your cybersecurity career</b></p> <p>Finding the perfect position in the field of cybersecurity can be extremely challenging. Several obstacles lie in the way of those seeking to enter—or to advance in—this coveted area of work. And while many possess the technical skills to contribute effectively to a cybersecurity team, many also lack the career-management knowledge necessary to begin or further a career in this area. <p>In<i> Navigating the Cybersecurity Career Path,</i> seasoned cybersecurity executive and leader Helen Patton delivers a practical and insightful roadmap for aspiring and practicing cybersecurity professionals hoping to advance their careers. The book offers readers succinct explanations of how and why the cybersecurity industry’s approach to hiring and promotion is unique and how to use this knowledge to succeed in the field. It also discusses how to progress from an entry-level position in the industry to a more senior position leading security teams and programs. <p>Perfect for anyone with an interest in joining the cybersecurity profession, <i>Navigating the Cybersecurity Career Path</i> also belongs on the bookshelves of practicing cybersecurity professionals seeking to advance their careers or lead cyber teams. The book also includes: <ul><li> Advice for every stage of the cybersecurity career arc</li> <li>Guidance on how to apply the book’s insights to your own particular circumstances</li> <li>Information regarding where to look for personalized cybersecurity career help</li> <li>A unique perspective based on the personal experiences of a non-traditional cybersecurity leader</li> <li>Instructions on how to move from single contributor to team leader, and how to build a security program from scratch</li></ul>

Diese Produkte könnten Sie auch interessieren:

MDX Solutions
MDX Solutions
von: George Spofford, Sivakumar Harinath, Christopher Webb, Dylan Hai Huang, Francesco Civardi
PDF ebook
53,99 €
Concept Data Analysis
Concept Data Analysis
von: Claudio Carpineto, Giovanni Romano
PDF ebook
107,99 €
Handbook of Virtual Humans
Handbook of Virtual Humans
von: Nadia Magnenat-Thalmann, Daniel Thalmann
PDF ebook
150,99 €