iTnews

Time to welcome another acronym

By Mark Hughes on May 9, 2006 4:24PM
Time to welcome another acronym

As a relatively recent recruit to the world of security, I have two overwhelming impressions – first, the enormous number of abbreviations and acronyms, and second, the incredible professionalism and deep knowledge of my colleagues.

The latter is why I'm so enthusiastic about the arrival of the Institute of Information Security Professionals (IISP) earlier this year.

This is a serious milestone for the security community. A few might believe that our world is already full of enough acronyms, not to mention security qualifications and certifications. But while the latter are undoubtedly valuable, they are no match for 'doing the job'.

It has been shown time and again that what counts in this area is proven experience as well as formal qualifications. The IT security arena has a rich supply of people with outstanding practical expertise, often combined with an almost frightening ability to stay one step ahead of those who try to breach our systems.

Nonetheless, before the IISP, such people did not have the profile or recognition they deserve. It is this combination of deep experience and formal qualifications that is so powerful and which is now getting recognition.

Does this really matter? Is a professional body so crucial? Why is BT (a major employer of IT security professionals) one of the founding corporate members of the IISP alongside the likes of BP, RBS, CESG and Vodafone? The reason is that it aspires to be among the best-of-breed companies in the digital networked economy.

IISP membership will be the internationally recognised gold standard qualification for infosec professionals as they progress through their careers. There is no doubt that the two clearly go hand in hand.

I'm very pleased that the institute has backing at the highest level within BT. Getting those who work in this area to join the IISP is seen as important in helping BT maintain its reputation as a business that is recognised for the highest standards in IT security. This is why I am actively encouraging everyone across BT to join the Institute. This includes the One IT Security, Risk and Compliance function, the Global Business Continuity and Security practice, and the Chief Technology Office security research division.

BT will also mirror the Institute's benchmarks for professional development by setting up a security professional community across all lines of business. There will be similar roles, as well as recognition schemes for people's work and contribution across this important area.

Finally, it seems as if professionals working in IT security will gain the standing and collective voice that has been sorely lacking.

I'm delighted – even if it does mean having to learn yet another acronym.

For more information about the IISP, visit www.instisp.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
acronymanothersecuritytimetowelcome

Partner Content

Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
Teaching tech teams every step of implementing a machine learning project
Promoted Content Teaching tech teams every step of implementing a machine learning project
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
How a 'micro data centre' enables your business, your way
Promoted Content How a 'micro data centre' enables your business, your way

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Mark Hughes
May 9 2006
4:24PM
0 Comments

Related Articles

  • China spied on Russian defence research institutes
  • 'White hat' hackers no longer risk prosecution by the US
  • Careful you don't unwittingly hire North Korean IT freelancers
  • Australia's ID systems 'deficient', unfit for online: review
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.