VIEWS: 4 PAGES: 2 CATEGORY: Computers POSTED ON: 7/3/2010
The big accounting fi rms and many "boutique" consulting fi rms have been gearing up to the threats and attacks on their Fortune 500 clients by hiring "cybersecurity consultants" to consult on matters relating to security management, privacy management and privacy tech integration.
JOBS MARKET Why did you get into IT Of what are you most Skills in demand Me and my job security? When I was in college, I began proud? Helping others achieve their The big accounting ﬁrms and to take computer courses and goals and providing clients many “boutique” consulting soon realized the power of with that “ah-ha” moment ﬁrms have been gearing up information. Later, while in when they come to the con- to the threats and attacks on the military as a cryptology clusion that the risks associ- their Fortune 500 clients by ofﬁcer, I understood that hav- ated with using the internet hiring “cybersecurity consul- ing access to the appropriate are real and can be effectively tants” to consult on matters data was a strategic asset. This and efﬁciently managed – relating to security manage- led me to start thinking about when risk management disci- ment, privacy management the protection of data. A plines are applied to the often and privacy tech integration. cybercriminal could manipu- highly technical discussions late data, causing an organiza- outlining information and What it takes Rich Baich tion to doubt the validity of cyber-related ﬁndings. “Must haves” include ﬁve years principal, Deloitte & Touche LLP the data; disrupt a transmis- in IT security, two years of secu- How do you describe sion, resulting in nonavailabil- For what would you use a rity engineering and a CISSP your job to the average ity; or exploit the data, causing magic IT security wand? cert. “Should haves” include person? doubt in the conﬁdentiality of To reinforce the concept that experience working with ﬁre- I provide strategic advice the data. information security is not a wall, network scanning and and innovative solutions technology issue – technology intrusion detection systems. that help organizations and What keeps you up at is the enabler. I would use people obtain the right infor- night? the wand to create teams in Compensation mation at the right time so
Pages to are hidden for
"JOBS MARKET: Me and my job"Please download to view full document