Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

CISM and CRISC Named Top Paying IT Certifications

CISM and CRISC Named Top Paying IT Certifications as 250 Others Slide Downward

According to the IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners, ISACA’s CISM (Certified Information Security Manager) and CRISC (Certified in Risk and Information Systems Control) certifications are the two highest paying credentials in the IT security.

CISM and CRISC Named Top Paying IT Certifications as 250 Others Slide Downward

According to the IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners, ISACA’s CISM (Certified Information Security Manager) and CRISC (Certified in Risk and Information Systems Control) certifications are the two highest paying credentials in the IT security.

The ITSCPI, launched in 1999, tracks market values for individual IT skills and certifications at 2,350 employers in North America, with results and detailed market analyses published every three months.

At the same time, while the two ISACA certifications made the top grade, the latest figures from Foote Partners show that IT Security-based certifications actually fell in value this quarter, down 1.6% when compared to previous quarters. Overall, pay premiums for 250 IT certifications kept their downward trend for a seventh quarter in a row.

In addition to the IT Security certification decline, Networking and Communications certifications fell 4.1%. Web Development, however, is rather popular, gaining 5.7% this quarter.

“We believe recent quarterly losses can be attributed to economic uncertainties, severe skills shortages, difficult organizational restructurings and the rise of new staffing models as employers adjust to investments in cloud computing and managed service models that have introduced new skills sourcing practices using a variety of labor channels,” a note in Foote Partners’ report explains.

The CISM is over ten years old; the CRISC certification was established in 2010. More information on the certifications can be found here

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem