Getting wise to continuing education

Share this article:
Illena Armstrong, VP, editorial, SC Magazine
Illena Armstrong, VP, editorial, SC Magazine
Will Durant, a Pulitzer Prize-winning writer, historian and philosopher dwelled in this world to the seasoned age of 96 when he died in 1981. Though this thoughtful author had absolutely nothing to do with our industry, many a clever quip has been attributed to him, one of which has some applicability to the evolution of this marketplace: “Education is a progressive discovery of our ignorance.”

No words strung together with such astute concision about the common desire to pursue learning and knowledge could link so keenly to how information security and the deep understanding sustaining it has developed. Indeed, this field is still quite young and, while it was begun and is currently bolstered by a slew of great minds, the fact is we all keep discovering new things about IT security and risk management that often highlight our collective ignorance.

Embracing this fact, though, is a good thing because it leads to an acknowledgment by most folks that one can never stop learning. Education, whether through a university, a professional industry body or a long-standing private organization is essential. That's why we decided to devote a special section to how information security executives in various stages of their careers can choose to continue educating themselves. Such an endeavor, if undertaken for the right reasons (not just to maintain a professional certificate or, say, get a raise), can facilitate the discovery of not only what one may not have known, but, more importantly, what one will and can know.

Becoming evermore skilled and grasping new concepts can be difficult given professional obligations, family responsibilities, the need for personal down-time and more. Yet, in order to stay relevant and advance alongside this fast-paced industry, it's a necessary and often rewarding enterprise. Plus, it makes day-to-day duties easier and more fruitful. For instance, we're hearing a lot from industry contacts that many companies continue to try tackling information security needs by deploying more technologies. Maybe if a few CEOs got some high-level training about the benefits of proper risk management planning they'd focus less on quick fixes and more on supporting the pros and systems they already have in place. After all, how many times do we hear security executives say that if they had more trained staff and resources they'd be able to plug vulnerabilities readily or take care of misconfigured systems more quickly – both of which are areas that give rise to today's major attacks and breaches.

Continuing education is no cure-all for the ills that plague information security initiatives. But, entities like the Departments of Defense and Homeland Security see the benefits so clearly that they require every full- and part-time employee with access to their systems to have and maintain at least one of a long list of approved professional certifications. And some IT security leaders, like our friend Rich Marshall, are working together on the Hill to advocate for more funding to support both private and public security education. Our special section this month, too, calls out the need to continue learning and cites just some of the ways you can do this. We trust you'll find it useful.

And on that note, always helpful to us here has been Dan Kaplan, who deservedly was promoted to deputy editor. Congrats to him!


Illena Armstrong is editor-in-chief of SC Magazine.

Share this article:
close

Next Article in Opinions

Sign up to our newsletters

More in Opinions

Successful strategies for continuous response

Successful strategies for continuous response

While it isn't realistic for organizations to expect that it will never happen to them, a rapid, professional and continuous response can limit their scope and reputational impact.

When it comes to cyber attacks, predictions are pointless but preparation is key

When it comes to cyber attacks, predictions are ...

Rather than predicting the next lightning strike it is far better to pay attention to the areas we already know are vulnerable.

Protecting what matters

Protecting what matters

Whether it is a database of customer information or valuable intellectual property, an organization's "crown jewels" need to be protected with the most robust security possible.