Cybersecurity Employment: Making Sense of Conflicting Messaging

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

For years, industry reports have broadcast a message to aspiring cybersecurity professionals that there is a major shortage of job seekers for an ever-growing number of job opportunities.

If only they just earn that university degree, complete that training course, or attain another certification, they can quickly secure one of many high paying jobs.

In this interactive session, we explore the current state of the cybersecurity workforce, discuss barriers to entry, and delve into actionable recommendations for job seekers of any level.

Join this session to:

  • Understand the ways in which policy decisions can affect hiring
  • Learn about the technological trends affecting cybersecurity
  • Gain insights into how job seekers can distinguish themselves from other applicants

Speakers

Photo of Jon Brandt

Jon Brandt

Director, Professional Practices and Innovation, ISACA

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Jeff Combs

Jeff Combs

Recruitment and Career Strategy Consultant

Photo of Kam Karaji

Kam Karaji

Director of Cybersecurity and Risk Management, NFL

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for ISACA here: https://www.isaca.org/privacy-policy. Please see Infosecurity Magazine’s privacy policy for more information.