SBN

Cyber Work: How to become a Chief Information Security Officer

Introduction 

In this episode of Infosec’s cybersecurity podcast series Cyber Work, host Chris Sienko talks with Joshua Knight, cybersecurity business leader at Dimension Data, about how to become a Chief Information Security Officer (CISO). Joshua has more than thirty years of experience in the technology space, including National Security Agency (NSA) and enterprise experience. Prepare for a rocket ride of insight and information into this highly sought-after information security role!

Your bio says you like “using life-changing technologies to transform business, culture and society.” What do you mean by this?

As technology evolves, Joshua has enjoyed watching the growth and change of technologies including cloud, virtualization, smartphones and artificial intelligence (AI). All of these can greatly transform business, culture and society. 

How did an interest in technology change into an interest in security?

Joshua got his start tinkering with computers at an early age. At around age 10, he was an at-risk student, so his college professor father brought him into a computer lab to keep him away from trouble and help him explore the technological opportunities the lab had to offer. It was in this lab that Joshua put in his foundational hours with Unix and Linux.

How has the cybersecurity landscape changed since you first got involved?

Joshua has been involved with security since the beginning when he was a white-hat hacker in 2001. He was working with Sprint at this time when he sat down with the head of the FBI and discussed security and how it would unfold in the future. 

Joshua has been involved with every expression of security over the years including network security, internet security, information security and the latest incarnation — digital security.

How did you get involved with the NSA?

During a period of career change, Joshua contacted (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/EEv3of3vjS8/