SBN

Julian Tang on InfoSec Institute’s CISSP Boot Camp: Compressed, Engaging & Effective

Julian Tang is Chief Information Officer (CIO) at Tennenbaum Capital Partners in Santa Monica, California. A seasoned security professional with over 20 years of industry experience and more than a half dozen certifications, Julian enrolled in InfoSec Institute’s Certified Information Systems Security Professional (CISSP) Boot Camp to get ready for his CISSP exam.

Julian offers a wealth of knowledge for security practitioners at all levels of their careers. In the following Q&A, Julian shares why he picked InfoSec Institute as his training partner and several professional development tips for aspiring information security professionals.

Why Did You Decide to Earn Your CISSP Certification?

Julian: I achieved my first CISSP back in 2003, but due to career demands, I was not able to maintain the certification. I enrolled at InfoSec Institute to renew the certification and refresh my knowledge of the domains. Throughout my career at Mail2World and Tennenbaum Capital Partners, I’ve leveraged the knowledge of the CISSP to build and maintain their cybersecurity programs. As the CIO for Tennenbaum Capital Partners, it’s also my responsibility to encourage professional development of my team and increase our asset value. Certifications are just one of the many tools we use to show executive management our value.

When I first got my CISSP, the industry was still developing. Now the industry is at scale and as technology professionals, we need to be at the top of our game. Certifications are not a silver bullet, but experience plus certifications are a killer combination that is good for your career. I can always tell the difference when I’m interacting with someone who has just hands-on experience, certifications, or both. A professional who has both certifications and hands-on experience always operates at a higher level than anyone who does not.

Why Did You Choose InfoSec Institute as Your (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/PASyd5MF48I/