CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS

Size: px
Start display at page:

Download "CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS"

Transcription

1 CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS WHITE PAPER January 2017 January

2 THE PROBLEM PERSONNEL SHORTAGE The demand for skilled cyber security talent is outstripping supply. In 2014, there were 238,158 unfilled cyber security jobs in the United States. Cyber security job postings have grown 91% from 2010 to 2014, a growth rate that is 3.3x more than all other IT jobs. Cyber security jobs also take 24% longer to fill than all IT jobs and 36% longer than all jobs. Growth in Job Postings ( ) Job Posting Duration (2013) 91% 45 days 36 days 33 days 28% Cyber Security All IT Cyber Security All IT All Jobs Source: Burning Glass Job Market Intelligence: Cyber Security Jobs, Source: Burning Glass Job Market Intelligence: Report on Growth of Cyber Security Jobs, As we can see, the supply of skilled security professionals is limited and only expected to worsen over the next five years. The demand for cyber security professionals is expected to reach 6 million (globally) by 2019 with a projected shortfall of 1.5 million. This imbalance will drive higher demand for Cloud security, Managed Security Service Provider Services ( MSSP ), Security Information and Event Management ( SIEM ) solutions, and integrated security adoption as organizations look to find ways to more efficiently manage their network security infrastructure by either offloading these responsibilities to third party MSSP s and/or find ways to manage security tools more efficiently. Evolve is focused on training and staffing individuals within these service lines to meet the eminent demand. Demand-Meeting Projections for Security Professionals (U.S. or Global) 5,963 5,424 3,972 3, ,400 3,593 4, ,796 4, ,007 1,197 4,227 1,507 4, Supply-Constrained Projections Skilled Labor Shortfall Source: Bank of America Merrill Lynch Cyber Security Primer (January 8, 2016). Information Security workforce study January

3 UNSUSTAINABLE INCREASE IN SALARIES In 2014, employers posted 49,493 jobs requesting a CISSP certification, when there are only 65,362 CISSP holders nationwide, of which practically all are already employed. This example illustrates that employers have been forced to poach talent from other companies in order to satisfy their labor needs. In order to lure talent away from other organizations, exorbitant salaries must be offered. The average salary for information security analysts is $92k, which is 9% greater than all IT jobs. Average U.S. Salaries in Information Technology (2014) $68,670 $79,770 $82,690 $91,600 $83,839 $54,961 Help Desk Support Web Developers Network Administrator Computer Programmers Information Security Analyst All IT Select IT Occupations Feeders into Cyber Security Source: U.S. Bureau Labor Statistics (May 2014) for Computer Occupations ( ). INCREASED THREATS TO SMALL AND MEDIUM BUSINESSES Sixty-two percent (62%) of known security breaches were targeted at small to medium sized companies and 60% of those affected will go out of business within 6 months, according to the 2013 Verizon Cyber Crime Survey. The largest misconception of Small and Medium Businesses ( SMBs ) is that they are unaware of the risks. Cyber Streetwise reported that 66% of SMBs simply didn t believe they were at risk from a cyber-attack. The National Cyber Security Alliance has found shocking statistics showing the careless attitude towards security, with 45% of smaller companies providing no internet safety training to employees even though 69% handle sensitive information. IPSOS research found that 69% of the 6.5 million small companies in the U.S. are unaware of the risk and cost of data loss through cyber-attacks. The average cost of a security breach on a SMB is around $47,000, according to Kaspersky, an anti-virus software manufacturer, and Statistica shows that cybercrime cost SMBs over $781 million in the U.S. in January

4 INDUSTRY DYNAMICS GROWTH IN INFORMATION SECURITY Enterprise security spending growth is expected to outpace total IT spending by more than 2x as the threat landscape continues to evolve and expand. An annual study performed by Verizon shows that since 2013, the number of Security Incidents and Data Breaches have increased 70% and 242%, respectively. Security Incidents ( ) Data Breaches ( ) 47,000 63,437 79, ,367 2, Source: Verizon Data Breach Investigation Reports. Source: Verizon Data Breach Investigation Reports. Note: A Security incident is defined as any event that compromises the confidentiality, integrity, or availability of an information asset. A Data Breach is defined as an incident that resulted in confirmed disclosure (not just exposure) to an unauthorized party. According to a study conducted by FireEye, a forensics and malware protection security company, 90% of companies have been breached, and the average breach goes undetected for 205 days. Once attackers pierce the perimeter, they have free reign to compromise sensitive data, especially since internal networking equipment (i.e. switches and routers) is generally not secure. Global spending on enterprise information security in 2015 was estimated at $79 billion and is expected to reach $110 billion by The recent surge in spending in 2014 and 2015 has been mostly reactionary due to the higher frequency of notorious sophisticated attacks. Organizations will prioritize security budgets on solutions that are focused on offering tools and services that help to improve manageability, such as SIEM and MSSP. Longer term spending will then be focused on solutions that provide detection and prevention using advanced threat intelligence. Each of these focus areas will require sophisticated cyber security professionals to manage the security programs, solutions, and technologies, which is where Evolve is focused. ($ in billions) Enterprise Information Security Spending $110 $90 $70 $62 $68 $79 $86 $93 $101 $110 $ E 2016E 2017E 2018E 2019E Source: Gartner, Bank of America Merrill Lynch Cyber Security Primer (January 8, 2016). Information Security workforce study January

5 CURRENT TRAINING MODEL IS BROKEN The most severe challenge to the information security profession relates to the education versus experience conundrum. Many companies hiring in the cyber security industry today have a personal preference to hire based on experience and are not concerned with what degree or certification one has. James Arlen, a Senior Consultant at Leviathan Security Group, adamantly believes that the industry needs to stop equating education with experience. Arlen stated that "it is too hard for the average organization to hire actual qualified people degrees, certifications and fudged resumes do not magically create qualified people." It is experience with attacks and perhaps even unsavory hacking hobbies that can make the difference between filling a job with a talented defender, or with a salesman who has a pedigree but no grasp of the devilin-the-details meat of cybersecurity. TRADITIONAL EDUCATION (COLLEGES AND UNIVERSITIES) Traditional schools are not equipping their graduates with the tools necessary to secure these high paying cyber security jobs. Traditional education (colleges/universities) curriculum focuses on theory and design versus providing real-life handson project experience. College courses are also very expensive and take a long time to complete. One year in an information security or computer science program at a college costs 2x-3x more than an immersive bootcamp program and takes 2x longer to complete. Many individuals are willing and capable of entering the industry but do not have the luxury to go back to college for a 4-year bachelor s program or even a 2-year master s program. Evolve provides an intense fully immersive alternative to acquiring the necessary skills to enter the cyber security industry in a timely fashion. Cost Comparison Time Comparison $10,000 $17,216 $18,990 $37, Weeks 36 Weeks Evolve UIC* Devry* DePaul* Evolve College (1-year) * Equivalent to one-year tuition in IT related program (15 credit hours per semester) Note: Evolve s 17 weeks includes 4 week of remote and 13 weeks of inperson. CERTIFICATIONS Currently, the most popular form of training in the cyber security industry involves obtaining various kinds of certifications (i.e. CISSP, CISA, CEH, CISM, etc.). Historically, certifications have been the industry standard to determine qualifications in the industry but this perspective has shifted in recent years as employers have realized that certifications alone do not guarantee quality talent. The chart on the next page shows that employers are not valuing the possession of certifications as much as they may have in the past. Individuals without a certification are earning more in the form of bonuses at times than their certified counterpart showing that employers place more value on work performance then they do on certifications. January

6 10yr Change in Premium Pay for Certified vs. Non-Certified Individuals Premium Pay as % of Bsae Pay 9.0% 8.5% 8.0% 7.5% 7.0% 6.5% 6.0% Certified (357 IT Certifications) Non-Certified (392 noncertified IT skills) Source: Foote Partners, LLC February 26, 2015 News Release. The leading criticism for certifications involves the lack of experience that comes with obtaining a certification. Training for certifications are focused on teaching to the test and on specific areas or technologies and fails to provide applicable project experience in order to deliver a well-rounded cyber security educational experience. Amongst employers, the Certified Information Systems Security Professional ( CISSP ) certification holders are the highest in demand, mostly because the CISSP also requires five years of industry experience. Even though employers are requesting 49,493 CISSP certification holders, there are only 65,362 CISSP holders in the country, of which most are already employed. Certification Job Postings vs. Holders (2014) 49,493 65,362 Postings Holders 34,16733,640 15,831 10,730 11,750 5,882 5,436 1,413 3,942 4,920 8,400 3,733 2,202 3,600 CISSP CISA CISM GIAC GSEC SSCP CIPP GIAC GCIH GIAC GCIA Source: Burning Glass Job Market Intelligence: Cyber Security Jobs, Various forms of training for security certifications are also very expensive. The SANS Institute ( SANS ) is the leader in security certifications training and offer courses lasting 2-6 days that cost ~$850 per day. For example, SANS provides training for the CISSP exam that lasts for 6 days and costs $5,000 (not including travel, lodging, or cost of exam). This cost of training is 3.4x more expensive than Evolve and provides no hands-on experience, real-world project experience, or job placement services. SANS has been able to charge premium rates because they have been the only cyber security training company in the industry to date. $10,000 Evolve Cost Comparison $34,000 SANS Institute* * Equivalent of $850 a day for 8 weeks of training. January

7 BOOTCAMPS ARE THE SOLUTION For the past 5-10 years, the technology industry has experienced an alarming labor shortage of programmers and developers. According to a U.S. jobs report from the Bureau of Labor Statistics, the U.S. was adding an estimated 136,620 jobs per year from 2010 to 2012, and graduating about 40,000 computer science degrees each year, creating a gap of roughly 100,000 jobs a year. Currently there are 607,708 open computing jobs nationwide, and still only 42,969 computer science students graduating each year. This gap is expected to continue to widen as our nation unrealistically attempts to solve the problem by attempting to fill the traditional pipeline by urging people to pursue computer science degrees. Various types of coding bootcamps emerged several years ago and have shown success in helping fill the open computer jobs and close the labor shortfall gap. In 2015, there were 16,056 graduates from 67 of the larger bootcamps in the country. 89% of these graduates were placed into a job within 120 days and experienced an average 38%, or $18,000, increase in their salaries. Graduates of Coding Bootcamps vs. Computer Science Graduate ~45,000 2,098 5,987 16,056 Est. computer science graduates per year Bootcamp Graduates Source: Course Report 2015 Coding Bootcamp Market Size Study. As seen from the success of the current coding bootcamps, obtaining practical and hands-on training has been proven effective in the marketplace. Employers are becoming much more focused on hiring individuals that have applicable experience and demonstrate competency in their craft, rather than just relying on degrees and certifications as a proof of ability. January

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans. Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent SOC Summit 2017 June 6, 2017 Strengthening Capacity in Cyber Talent sans.org/cybertalent Increasing Sense of Urgency Cyber threats to U.S. national and economic security are increasing in frequency, scale,

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: October 2010 What is DoDD 8570? Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management

More information

Immersion Academy Annual Report 2017

Immersion Academy Annual Report 2017 Immersion Academy Annual Report 2017 Accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security systems.

More information

State of the Cyber Training Market January 2018

State of the Cyber Training Market January 2018 State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

T87 - Building a Stronger Business with a Connected Workforce

T87 - Building a Stronger Business with a Connected Workforce T87 - Building a Stronger Business with a Connected Workforce PUBLIC PUBLIC 2 Agenda The Realities of Manufacturing The Connected Enterprise Building a Connected Workforce Taking Action The Realities of

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Strengthening Capacity in Cyber Talent sans.org/cybertalent SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus

More information

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+

More information

A United States Cyber Academy Program

A United States Cyber Academy Program The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy

More information

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical

More information

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President CYBER APPRENTICESHIP Dr. Leigh Armistead, President 1 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a) business with core competencies in IT security, IA and cyber warfare.

More information

Security in Today s Insecure World for SecureTokyo

Security in Today s Insecure World for SecureTokyo Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation

More information

Cyber Security Advanced Education: Preparing the Emerging Workforce

Cyber Security Advanced Education: Preparing the Emerging Workforce Cyber Security Advanced Education: Preparing the Emerging Workforce Scott vonfischer, CISO We are all apprentices in a craft where no one ever becomes a master. Ernest Hemingway A Unique Perspective on

More information

Hidden Figures: Women in Cybersecurity

Hidden Figures: Women in Cybersecurity Hidden Figures: Women in Cybersecurity This is not a webinar. This is a topic relevant to the community and our initiatives. What is a virtual community meeting? We want to hear from you! Join into the

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

Immersion Academy Annual Report 2018

Immersion Academy Annual Report 2018 Immersion Academy Annual Report 2018 An accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security

More information

Cyber Security Occupations. in San Diego County

Cyber Security Occupations. in San Diego County Cyber Security s in San Diego County February 2017 Prepared by Center of Excellence for Labor Market Research San Diego & Imperial Counties Region Labor Market Demand & Wages Currently, there is only one

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

Why the Security Workforce Needs More Women and Men

Why the Security Workforce Needs More Women and Men Why the Security Workforce Needs More Women and Men ISSA International Conference Tammy Moskites, CIO/CISO, Venafi October 10, 2015 A Little Bit About Me 25+ Years in IT & Security Current CIO/CISO of

More information

Cyber Security: It s all about TRUST

Cyber Security: It s all about TRUST www.pwc.com/vn Cyber Security: It s all about TRUST 29 th March 2017 Robert Tran Cybersecurity leader, Vietnam Content s Digital IQ Survey 1 Current state of Cybersecurity in Vietnam 2 2 Our global team

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

CYBER APPRENTICESHIP. Dr Leigh Armistead, President

CYBER APPRENTICESHIP. Dr Leigh Armistead, President CYBER APPRENTICESHIP Dr Leigh Armistead, President 1 EVERYBODY HAS THE SAME ISSUE 2 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a), SB with core competencies in IT security,

More information

Reasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS

Reasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS Reasons to Become CISSP Certified Keith A. Watson, CISSP CERIAS Overview Certification review Organizational needs Individual needs Get paid more! See the world! CISSP requirements Common Body of Knowledge

More information

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA

More information

Secure Systems Administration and Engineering

Secure Systems Administration and Engineering Secure Systems Administration and Engineering Program Information The job outlook for careers in Cybersecurity and Information Technology continues to be very strong. Many experts predict a continued shortage

More information

Partner with an MSSP or Grow an In-House Security Team: What s Right For Your Business?

Partner with an MSSP or Grow an In-House Security Team: What s Right For Your Business? Partner with an MSSP or Grow an In-House Security Team: What s Right For Your Business? Partner with an MSSP or Grow an In-House Security Team: What s Right For Your Business? Your business is more vulnerable

More information

How to Become a CMA (Certified Management Accountant) May 10, 2017

How to Become a CMA (Certified Management Accountant) May 10, 2017 How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements

More information

Current skills gap for capable CTI analysts: Training for forensics & analysis

Current skills gap for capable CTI analysts: Training for forensics & analysis Current skills gap for capable CTI analysts: Training for forensics & analysis WORKSHOP CTI EU Bonding EU Cyber Threat Intelligence 30-31 October, Link Campus University, Rome, Italy Ing. Selene Giupponi

More information

MN CYBER STATEWIDE INSTITUTE FOR CYBERSECURITY, FORENSICS, AND IOT

MN CYBER STATEWIDE INSTITUTE FOR CYBERSECURITY, FORENSICS, AND IOT MN CYBER STATEWIDE INSTITUTE FOR CYBERSECURITY, FORENSICS, AND IOT WHO ARE WE? Faisal Kaleem Professor, Metro State Executive Director, MN Cyber Corey Blommel Cyber Range Instructor Anoka Ramsey College

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

Bachelor of Information Technology

Bachelor of Information Technology Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime

More information

Mastering The Endpoint

Mastering The Endpoint Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More

More information

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and

More information

IT Security: Managing a New Reality

IT Security: Managing a New Reality IT Security: Managing a New Reality Kevin Lonergan #IDCDirections IDC You re Only as Strong as Your Weakest Link Locks Only Work if you Know How to Use Them IDC 2 Millions Canadian Security Market Forecast:

More information

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst WORKFORCE COLLABORATIVE: CYBERSECURITY BUILDING THE TALENT PIPELINE SECURITY ANALYST CAREER PATHWAY UPDATED: 10/17/16 CYBERSECURITY SECURITY ANALYST CAREER PATHWAY Senior Level Senior Specialty Threat,

More information

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts Managed Enterprise Phishing Protection Comprehensive protection delivered 24/7 by anti-phishing experts MANAGED ENTERPRISE PHISHING PROTECTION 24/7 expert protection against phishing attacks that get past

More information

Career Paths In Cybersecurity

Career Paths In Cybersecurity Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

Security Management Occupations

Security Management Occupations Security Management Occupations Labor Market Analysis: San Diego County MARCH 2019 Summary To determine labor market demand for occupations that could be trained by a Security Management program, this

More information

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually 1 Leadership SANS is the most trusted, and the largest source for information security training and security certification in the world. No one is more trusted in cyber 25 years leading in cyber 165,000

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology

More information

The Cisco Networking Academy at Erie Community College

The Cisco Networking Academy at Erie Community College The Cisco Networking Academy at Erie Community College The Academy History and Goals In existence since 1997, the Cisco Networking Academy delivers a comprehensive, 21st century learning experience to

More information

Cybersecurity Employment SecureNinja

Cybersecurity Employment SecureNinja Cybersecurity Employment Opportunities @ SecureNinja CyberSecurity, Technical Engineer Responsible for security measures for networks & information. Senior Software Security Consultant Location: Alexandria,

More information

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

Computer Support Technician

Computer Support Technician Computer Support Technician Inland Empire/Desert Region (Riverside-San Bernardino-Ontario Metropolitan Statistical Area) Summary Employment for computer support technician occupational group is expected

More information

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

Collaboration on Cybersecurity program between California University and Shippensburg University

Collaboration on Cybersecurity program between California University and Shippensburg University Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,

More information

Certification and Career Guide

Certification and Career Guide Certification and Career Guide CompTIA offers some of the most recognized entry-level certifications for IT professionals, including its A+, Network+ and Security+ certifications. This certification guide

More information

RSA NetWitness Suite Respond in Minutes, Not Months

RSA NetWitness Suite Respond in Minutes, Not Months RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations

More information

UK Gender Pay Gap Report 2018

UK Gender Pay Gap Report 2018 UK Gender Pay Gap Report 2018 As part of McAfee s commitment to build a better, more balanced workplace and community, we wholly embrace the UK Gender Pay Gap report. This year s calculations cover our

More information

Computer Information Technology

Computer Information Technology Computer Information Technology Why Choose Computer Information Technology? To assure relevance and enduring value, our Computer Information Technology (CIT) program has been designed to align with industry

More information

Cyber Security Incident Response Fighting Fire with Fire

Cyber Security Incident Response Fighting Fire with Fire Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the

More information

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco

More information

Effective October 1, 2017 the Total Hourly Rates for the NYSTEC contract can be found below.

Effective October 1, 2017 the Total Hourly Rates for the NYSTEC contract can be found below. Effective October 1, 2017 the Total Hourly Rates for the NYSTEC contract can be found below. NYSTEC Labor Category Not to Exceed Rates exclusive of travel for NYSTEC FY 2017 Not to Exceed Rates exclusive

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

CAREERS SNAPSHOT INFORMATION AND COMMUNICATIONS TECHNOLOGY TAFENSW.EDU.AU TAFE NSW STRATEGY

CAREERS SNAPSHOT INFORMATION AND COMMUNICATIONS TECHNOLOGY TAFENSW.EDU.AU TAFE NSW STRATEGY CAREERS SNAPSHOT TAFE NSW STRATEGY INFORMATION AND COMMUNICATIONS TAFENSW.EDU.AU Which occupations in this industry are likely to have the largest employment growth over the next three years? Which TAFE

More information

Cybersecurity for Service Providers

Cybersecurity for Service Providers Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:

More information

When Computing Becomes Human: Automation, Innovation, and the Rise of the All-Powerful Service Provider

When Computing Becomes Human: Automation, Innovation, and the Rise of the All-Powerful Service Provider When Computing Becomes Human: Automation, Innovation, and the Rise of the All-Powerful Service Provider Michelle Bailey GVP/GM and Research Fellow Datacenter and Cloud Human Industry Human Productivity

More information

Management Update: Information Security Risk Best Practices

Management Update: Information Security Risk Best Practices IGG-07022003-01 R. Witty Article 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises to determine

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Which Side Are You On?

Which Side Are You On? 12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity

More information

PMI Certification Overview

PMI Certification Overview PMI Certification Overview March 4, 2015 Skilled practitioners in all aspects of Project, Program & Portfolio Management are in demand around the world. A globally recognized certification shows employers

More information

Welcome to the HP Institute

Welcome to the HP Institute Welcome to the HP Institute How HP is working with education to develop tomorrow s IT workforce today Capability Business need for speed The rate of business is increasing exponentially 2020 2T devices

More information

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1 COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1 Worldwide Infrastructure Security Report Highlights Volume XIII C F Chui, Principal Security Technologist COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 2 Overview This presentation

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

Securing Digital Transformation

Securing Digital Transformation September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated

More information

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. Intelligence-driven security STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. BETTER INTELLIGENCE. BETTER DEFENSE. The

More information

The Cisco Networking Academy at ECC Information Packet

The Cisco Networking Academy at ECC Information Packet The Cisco Networking Academy at ECC Information Packet January 1, 2017 This information packet was created as a guide for individuals interested in learning more about computers and computer networking,

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

The Widening Talent Gap: The greatest security challenge of our time

The Widening Talent Gap: The greatest security challenge of our time INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Power of the Threat Detection Trinity

Power of the Threat Detection Trinity White Paper Security Power of the Threat Detection Trinity How to Best Combine Real-time Correlation, Insider Threat Analysis and Hunting to protect against cyber threats. Combine real-time correlation,

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Outsourcing & remote teams: cyber security vulnerabilities

Outsourcing & remote teams: cyber security vulnerabilities Outsourcing & remote teams: cyber security vulnerabilities Mobilunity: Cyber security research 2017-2018 In 2017 alone, 978 million people from 20 countries together lost $172 billion to cybercrimes. That

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

BUILDING AND MAINTAINING SOC

BUILDING AND MAINTAINING SOC BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:

More information

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Introduction and Bio CyberSecurity Defined CyberSecurity Risks NIST CyberSecurity Framework References *** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Chapter 3. Framework Implementation Relationship

More information

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified EC-Council C T Certified I A Threat Intelligence Analyst CERTIFIED THREAT INTELLIGENCE ANALYST PROGRAM BROCHURE 1 Predictive Capabilities for Proactive Defense! Cyber threat incidents have taken a drastic

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

Managed Endpoint Defense

Managed Endpoint Defense DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts

More information

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE) What is the CISSP? (ISC)2 s Certified Information Systems Security Professional (CISSP ) is the gold standard professional certification for experienced information security and related professionals worldwide.

More information

FINDING LIGHT AT THE END OF THE GRADUATION TUNNEL

FINDING LIGHT AT THE END OF THE GRADUATION TUNNEL FINDING LIGHT AT THE END OF THE GRADUATION TUNNEL Bryan Marshall, Georgia College and State University, bryan.marshall@gcsu.edu Peter Cardon, University of South Carolina, pcardon@gwm.sc.edu Tanya Goette,

More information