TITLE

C&W extends IT security scheme

AUTHOR(S)
Donovan, Tristan
PUB. DATE
June 2003
SOURCE
IT Training;Jun2003, p6
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
May 2003 saw a further 20 information technology security specialists at Cable & Wireless Inc. gain ISC2 certification as part of a global training project to promote firm's security skills. The latest training program took place at C&W's Swindon, England offices and takes the total number of staff who have gained ISC2 status under the scheme to more than 150. According to Ionut Ionescu, director of security services for C & W's professional services team vendor-neutral stance and wide scope of ISC2, which stands for the International Information Systems Security Certification Consortium, made the qualification ideal for fulfilling this latter aspect of the training.
ACCESSION #
10022304

 

Related Articles

  • All IT staff need security certification, says (ISC)2. Goodwin, Bill // Computer Weekly;5/17/2007, p45 

    The article focuses on the significance of information technology (IT) security training certification among IT professionals in Great Britain. Security certification body (ISC)2 emphasizes the need of IT professionals for formal training in security principles for effective implementation of...

  • SECURITY CERTIFICATIONS SPARK DEBATE. Patilla, Jody // eWeek;12/31/2001, Vol. 18 Issue 50, p34 

    Focuses on the need to secure for a security certification from the International Information Systems Security Certification Consortium in applying for a security job in the United States. Requirements in getting a certificate; Value of the certifications; Way in improving the value of a...

  • PERSONNEL MOST IMPORTANT FACTOR IN SECURITY, STUDY FINDS.  // Certification Magazine;Jan2007, Vol. 9 Issue 1, p9 

    The article looks at the results of the third-annual Global Information Security Workforce Study sponsored by the International Information Systems Security Certification Consortium. More than 4,000 information security professionals in more than 100 countries were polled in the survey. One...

  • Professional Monitor.  // SC Magazine: For IT Security Professionals (UK Edition);Jun/Jul2009, p70 

    The article discusses the highlights of the workshops hosted by the International Information Systems Security Certifications Consortium (ISC)⊃2 and the Information Security Forum (ISF) in 2008. The topic of the workshops was the challenge of being both an information technology (IT)...

  • IT Certifications That Make a Difference for Your Business. Wenzel, Elsa // PCWorld;Jan2011, Vol. 29 Issue 1, p30 

    This article presents some information technology (IT) certifications for help desk and networking professionals. It recommends a range of specialized training programs offer by Microsoft for those who service its products. It also suggests to obtain vendor-neutral certifications from the...

  • Untitled. Ashford, Warwick // Computer Weekly;8/17/2010, p80 

    In this article the author discusses the worthiness of using passwords and its need to be replaced by authentication methods. Managing director of EMEA for the company (ISC)2, John Colley states that the use of authentication method depends on the application. The author reports that the...

  • (ISC)2® Survey.  // Database & Network Journal;Jun2009, Vol. 39 Issue 3, p24 

    The article focuses on the final results of the survey conducted in April-May 2009 by International Information Systems Security Certification Consortium (ISC)2® ("ISC-squared") on the economic downturn's effect to its employers and certified memberships. The survey shows the possible new...

  • WHERE ARE THE BIGGEST THREATS COMING FROM?  // SC Magazine: For IT Security Professionals (UK Edition);Oct2007, p78 

    The article presents the results of a survey of information security professionals by (ISC)² on their opinions on external versus internal security threats. Of the 2,543 information security professionals surveyed, majority prioritizes internal security threats. When asked whether they have...

  • Study: People and Processes Important in Security.  // IT Professional;Nov/Dec2006, Vol. 8 Issue 6, p7 

    The article features policies, processes, and people as the top three success factors of information-systems security. This is according to an annual study by the International Information Systems Security Certification Consortium. The study highlights the need for public and private entities to...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics