O'Reilly logo

Breaking into Information Security by Chris Liu, Anthony J. Stieber, Josh More

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3.c

Tier 3—Lateral: Entrepreneur

Abstract

If you want to function as an entrepreneur in information security, you will either be an information security practitioner who wants to launch a company, or you are already an entrepreneur and want to move into a more lucrative field. If you are the former, odds are that you understand a core problem and have a good solution in mind. You may need funding to create a proof-of-concept device or application. You may already have that and need help finding customers. You may just have a rough idea that you want to be your own boss and nothing beyond that. In all of these cases, the key is to find a partner.

Keywords

entrepreneur
partner
launch
company
proof-of-concept
customer

Introduction

Odds are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required