SBN

Do Security Managers Need an IAPP Certificate?

You are probably looking into expanding your career in IT security, perhaps even aspiring to become a security manager, but you’re not sure about attaining an IAPP certification.

Maybe you don’t think that the price of admission is worth the effort and expense, or maybe you just don’t know much about them. You could be working in information security and you aren’t sure if getting an IAPP would help your situation. Perhaps your current role is leading you towards law enforcement and forensics, or maybe you are out in the field and need to help develop privacy strategies within your current environment.

In this article, we will be looking at why you would want to invest in an IAPP certification and how beneficial it could be for you, depending on your requirements and situation.

Why Invest in an IAPP Certification?

The International Association of Privacy Professionals is an organization that was formed to allow security practitioners to advance and improve both their professional  information security careers and the security stance of the organizations that they work for. It is able to do this by creating training programs based on a body of knowledge that has been created by the organization through decades of summits, seminars, meetings and conventions.

The organization was first founded back in 2000 and is thought by many to be the largest operating privacy group. It is considered an invaluable resource to the privacy community. What makes this gathering of professionals different from other, similar bodies is that it is a not-for-profit organization that deals with information privacy concerns and subjects that are important within the security community.

Now, more than ever, it makes sense for anyone that is involved within the digital economy to seriously consider IAPP certification. Privacy becomes a bigger area of concern: The (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Graeme Messina. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/w1x-bg61ucs/