Jewish World Review

JWR's Pundits
World Editorial
Cartoon Showcase

Mallard Fillmore

Michael Barone
Mona Charen
Linda Chavez
Greg Crosby
Larry Elder
Don Feder
Suzanne Fields
James Glassman
Paul Greenberg
Bob Greene
Betsy Hart
Nat Hentoff
David Horowitz
Marianne Jennings
Michael Kelly
Mort Kondracke
Ch. Krauthammer
Lawrence Kudlow
Dr. Laura
John Leo
David Limbaugh
Michelle Malkin
Jackie Mason
Chris Matthews
Michael Medved
MUGGER
Kathleen Parker
Wes Pruden
Sam Schulman
Amity Shlaes
Roger Simon
Tony Snow
Thomas Sowell
Cal Thomas
Jonathan S. Tobin
Ben Wattenberg
George Will
Bruce Williams
Walter Williams
Mort Zuckerman

Consumer Reports


Information security an expanding field

http://www.jewishworldreview.com | (KRT) One of the few areas of technology still expanding is doing so because of the three-headed Hydra of legislation, disaster and paranoia. It's information security - from disaster planning to hacker-proofing.

Chris Vennitti, regional manager of Robert Half Technologies, said that as companies rely more on the Internet and computer networks, the need for security professionals increases.

"Network security is a high-growth industry and remains critical within IT departments," he said. "As firms depend on their internal systems to share information with their organization and increasingly rely on remote or wireless access, there is a growing emphasis on safeguarding corporate systems. They're seeking networking security professionals with extensive experience in designing and monitoring secure networks that enable remote access to users."

David B. Morrow, managing principal of global security and privacy services at Electronic Data Systems, said Sept. 11 forced companies to consider off-site operations and business continuity. "9-11 was a catalyst, combined with a lot of other things like viruses and worms, that increased the visibility of security issues."

Morrow sees security, disaster recovery and business continuity as overlapping circles.

"Disaster recovery is concerned with what you do when a natural disaster occurs. How do you get the business up and running?" he said. Business continuity is closely related.

Kimberly A. Austin, an IT recruiter with ZSI in Dallas, said there had been a lot of buzz regarding security but little action - until recently.

"In the past few weeks, it's picked up a bit," she said.

Austin attributes the upswing to international events and funding cycles. She said companies finally may be getting the funding to purchase and implement products.

Although Austin said the red-hot spots for tech-based security operations are Washington and Northern Virginia, financial companies lead the way in the North Texas.

"So many people are making payments on the Internet that financial institutions need to make sure their networks are secure," she said.

Vennitti said financial services firms are seeking IT professionals to handle disaster recovery and storage functions, and to assist with financial reporting processes to ensure compliance with the Sarbanes-Oxley act.

Another hot spot is with the government or government subcontractors. A search of government jobs at www.usajobs.opm.gov showed 121 openings for technical security personnel in the United States.

Morrow said many of the jobs are in government because of homeland security.

"Every year, the GAO 1/8General Accounting Office3/8 and Congress put out a report card of how bad security is, so there's a big push to do security work," he said.

A national initiative called e-government aims to implement and upgrade government networks and network security.

Geoffrey Orsak, associate dean for research and development at the Southern Methodist University school of engineering, said the government's chief information officer will have about $50 billion to spend on the initiative.

Education and certification matter to potential employers.

Morrow stresses the importance of a solid network background, certification in convergent network technologies, education or training in operating systems, and Unix and Linux experience. "A good technical underpinning is what people need," he said.

Morrow added that technical people should be able to speak in nontechnical terms.

"There is a need for real technical people to have an understanding of business processes and how to work with people - and who can explain why a password can't be two letters without a long, technical diatribe," he said.

SMU's advanced computer education center, an offshoot of the engineering department, offers computer technology certification programs and seminars.

Orsak said the potential growth of the security field is high.

"The industry needs lots of levels from certification to master's degrees and beyond," he said, "because security and commerce - really security and information - go hand in hand."

He used the oft-quoted comparison of the Internet to a highway.

"We don't expect highways to be safe, so we make cars safe," he said. In the same way, Orsak said, business and the government need people to make networks safe.

Appreciate this type of reporting? Why not sign-up for the daily JWR update. It's free. Just click here.


Comment by clicking here.

Up

© 2003, Distributed by Knight Ridder/Tribune Information Services