{"id":1633,"date":"2016-02-01T15:41:00","date_gmt":"2016-02-01T14:41:00","guid":{"rendered":"https:\/\/www.spsearch.fr\/?p=1633"},"modified":"2020-02-25T17:05:35","modified_gmt":"2020-02-25T16:05:35","slug":"what-is-an-expert-in-cyber-security","status":"publish","type":"post","link":"https:\/\/www.spsearch.fr\/en\/2016\/02\/01\/what-is-an-expert-in-cyber-security\/","title":{"rendered":"What is an expert in Cyber security ?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1633\" class=\"elementor elementor-1633 elementor-1627\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-18f584a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"18f584a0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-53e99a79\" data-id=\"53e99a79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ba4b93a elementor-widget elementor-widget-heading\" data-id=\"2ba4b93a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>1 \u2013 Managing the security<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-633dffd9 elementor-widget elementor-widget-text-editor\" data-id=\"633dffd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Managing the security that includes Chief Information Security Officers, Business Continuity Managers or dedicated contributors in charge of relaying good practice. Audit &amp; Risks or Legal can also be included in that category.<\/p><p>\u00a0<\/p><p>Those experts work mainly within an organisation but they can also be independent or work for IT services providers.<\/p><p>\u00a0<\/p><p>CISO are technical experts with a degree in IT engineering, very often with a Master in IT Security and an broad IT and business expertise. They have generally worked as CIO or in Risks &amp; Audit. They have a strategic role being able to communicate, to influence and to make key d\u00e9cisions.<\/p><p>\u00a0<\/p><p>I would like to share the vision of a French CAC 40 company CISO that I have met recently. He writes and publishes many articles on IT security but always anonymously.<\/p><p>\u00a0<\/p><p>\u201cI consider the CISO to be a cyber-warrior; he must be capable of planning cyberwar strategies and above all be capable of understanding his exposure in\u00a0order to put an end to the conflict while avoiding further attacks. \u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aec9f03 elementor-widget elementor-widget-heading\" data-id=\"6aec9f03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2 \u2013 Logical security, where we find the \u201csuper specialists\u201d.<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a774ee elementor-widget elementor-widget-text-editor\" data-id=\"2a774ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>IT network engineers with specialisation in security, all types of experts such as penetration testers \u2013 \u201cpentesters\u201d, vulnerability assessment experts, cryptography experts, anti-malware software developers who must have network security competences in addition to their software development skills, and security architects who have now an even more important role due to new technologies such as the Cloud, Big Data or connected products.<\/p><p>\u00a0<\/p><p>Those experts work mostly for IT systems integrators, IT services providers and security software editors who in turn provide their expertise and services to a .<\/p><p>\u00a0<\/p><p>An ideal profile has an advanced degree in IT engineering, a cyber-security certification and a strong experience. In addition like many other emerging sectors, cyber- security is heaven for geeks and self-taught experts. Cyber-security training courses are reliable and value added and it is not uncommon for hackers to convert into security experts.<\/p><p>\u00a0<\/p><p><strong>Patricia CABOT<\/strong> \u2013 February 2016<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>There are 2 main job categories in relation to IT security:<\/p>\n","protected":false},"author":1,"featured_media":1629,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"cybocfi_hide_featured_image":"","footnotes":""},"categories":[14],"tags":[],"class_list":["post-1633","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/posts\/1633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/comments?post=1633"}],"version-history":[{"count":2,"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/posts\/1633\/revisions"}],"predecessor-version":[{"id":1635,"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/posts\/1633\/revisions\/1635"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/media\/1629"}],"wp:attachment":[{"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/media?parent=1633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/categories?post=1633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spsearch.fr\/en\/wp-json\/wp\/v2\/tags?post=1633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}