The Widening Talent Gap: The greatest security challenge of our time

Size: px
Start display at page:

Download "The Widening Talent Gap: The greatest security challenge of our time"

Transcription

1 INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016

2 General Information Share the webinar Questions: Submit your questions throughout the presentation Attachments: Download today s presentation materials Ratings: Rate the webinar upon completion Experis Thursday, April 14,

3 CPE Credit This event qualifies for 1 CPE Credit Attendees must participate on today s webinar for at least 50 minutes to receive credit Certificates will be ed to you within 24-hours Experis Thursday, April 14,

4 Today s Panelists MICHAEL GERDES, CISSP Director Information Security Center of Expertise, Experis Mike has over 35 years experience as an information security thought leader, providing governance, risk management and technology solutions to a wide variety of employers and client organizations around the globe. He was one of the principal authors of the Information Security Talent Shortage White Paper and has been a Certified Information Systems Security Professional (CISSP) for over 20 years. Experis Thursday, April 14,

5 Not IF, but WHEN. Experis Thursday, April 14,

6 1.5 MILLION Jobs disparity between the number of open positions and the number of available candidates by Experis Thursday, April 14,

7 Complimentary Whitepaper Discusses issues facing organizations and offers a view on potential solutions as the Information Security talent shortage grows Available at: information-security/ Experis Thursday, April 14,

8 Today s Host & Moderator JILL HARLAMERT Vice President and General Manager Project Solutions, Experis Jill Harlamert has more than 32 years of experience providing and leading solutions in both IT and Engineering. Harlamert has responsibility for the direction and delivery of project-based offerings and initiatives for Experis across North America and the Enterprise Client Teams. Jill holds a master s degree in Electrical Engineering from Wright State University and is currently a Ph.D. candidate in Computing Technology at Nova Southeastern University Experis Thursday, April 14,

9 Today s Panelists DEBRA BANNING Vice President Information Security Practice Experis Debra Banning has spent over 30 years as an Information Security Practitioner providing consulting expertise across all industry and government sectors as well as with International clients. She is currently the Leader of the Experis Information Security Consulting Practice. Debra holds a Master s Degree in Computer Science from California State University, Long Beach and a Bachelor s Degree in Computer Science from George Mason University. Experis Thursday, April 14,

10 Today s Panelists CHRISTOPHER DAVIS, PH.D. Provost Western International University In his role, Dr. Chris Davis serves as the Chief Academic Officer and is responsible for teaching and learning at the university including faculty and curriculum. He has served as a faculty member and administrator in higher education for 20 years. He holds a Ph.D. in Urban, Technological, and Environmental Planning from the University of Michigan, a Master's of Science in Education from Capella University and a Master's of Science in Psychology from Walden University. Experis Thursday, April 14,

11 Today s Panelists SCOTT FROST Chief Information Security Officer Belk Scott Frost joined Belk as their first (and only) Chief Information Security Officer in He has responsibility for leading information technology security, compliance, disaster recovery and business continuity for the company. Scott holds a Master s of Science in network security from Capitol College and is currently pursuing a Doctorate of Science in Information Assurance. Experis Thursday, April 14,

12 Today s Panelists STEVE JARBOE Senior Manager Accenture Federal Systems Steve has worked on Business continuity and securityfocused federal efforts with the company since He has served as a consultant and advisor to various Federal Chief Information Security Officers (CISO), dealing with cybersecurity workforce matters. Currently, Steve supports the CISO of a Cabinet Level Federal Agency in all aspects of the Enterprise Cybersecurity Program from Strategic planning and policy promulgation to operationally fighting-through attacks against the Department. Experis Thursday, April 14,

13 OUR PANELISTS DEBRA BANNING Experis CHRISTOPHER DAVIS PH.D. Western International University SCOTT FROST Belk STEVE JARBOE Accenture Federal Systems INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time

14 THANK YOU. CONTACT US MICHAEL GERDES Director, Information Security, Experis Learn more at Experis.us

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America 5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,

More information

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

Information Technology

Information Technology Information Technology 2017-2018 Well connected. Right here 2 Contents weltec.ac.nz/it Introductory NZ Certificate in Information Technology Essentials 6 NZ Diploma in Information Technology (Technical

More information

UTCS Scholarships for Service

UTCS Scholarships for Service Preparing for a Career in Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Fall, 2018 Slideset 1: 1 We Need Cyber Warriors: Recent News Items The Cybersecurity Talent

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Digital Forensics. Graduate Certificate

Digital Forensics. Graduate Certificate Digital Forensics Graduate Certificate Effective January 8, 2018 Digital Forensics Graduate Certificate Capella University has been designated by the National Security Agency (NSA) and the Department of

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Security in Today s Insecure World for SecureTokyo

Security in Today s Insecure World for SecureTokyo Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation

More information

UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554

UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554 UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554 In the Matter Of ) ) Cyber Security Certification Program ) PS Docket No. 10-93 COMMENTS OF THE NATIONAL BOARD

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

Collaboration on Cybersecurity program between California University and Shippensburg University

Collaboration on Cybersecurity program between California University and Shippensburg University Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,

More information

Commonwealth Cyber Initiative Letters of Support

Commonwealth Cyber Initiative Letters of Support James Madison University Norfolk State University University of Mary Washington Virginia Commonwealth University Virginia Community College System Virginia State University Commonwealth Cyber Initiative

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

Monthly Meeting February 27, 2019

Monthly Meeting February 27, 2019 Monthly Meeting February 27, 2019 Updates to Meeting Schedule February 2019 5:15 to 5:45 Business Meeting 5:45 to 6:15 Networking and Dinner 6:15 to 7:45 Speaker and Q&A Agenda / Announcements Welcome

More information

Which Side Are You On?

Which Side Are You On? 12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity

More information

Commonwealth Cyber Initiative Blueprint Development

Commonwealth Cyber Initiative Blueprint Development Commonwealth Cyber Initiative Blueprint Development Theresa Mayer and Laurel Miner Virginia Tech Presented to VRIC on August 14, 2018 https://www.networkworld.com/article/3235124/internet-of-things/internet-of-things-definitions-a-handy-guide-to-essential-iot-terms.html

More information

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary Cyberbit Range A Global Success Story 2017 by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary The Israeli Defense Forces Cyber Academy (Israel) The official training platform for the Israeli

More information

2018 Government Professional Accounting Seminar

2018 Government Professional Accounting Seminar 2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,

More information

Opening Doors to Cyber and Homeland Security Careers

Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy

More information

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA

More information

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in Health Care Security Effective January 8, 2018 Master of Science (MS) in Information Assurance and Cybersecurity

More information

Immersion Academy Annual Report 2018

Immersion Academy Annual Report 2018 Immersion Academy Annual Report 2018 An accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Digital Forensics

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Digital Forensics Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in Digital Forensics Effective January 8, 2018 Master of Science (MS) in Information Assurance and Cybersecurity

More information

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online. A leader in online learning since 1998 To learn more about programs in Enterprise Architecture, visit: worldcampus.psu.edu/psueabt Programs in Enterprise Architecture a PennState ~ World Campus A world

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

System Chief Business Officer - B. J. Crain The Texas A&M University System Position Description--January 13, 2010

System Chief Business Officer - B. J. Crain The Texas A&M University System Position Description--January 13, 2010 System Chief Business Officer - B. J. Crain Position Description--January 13, 2010 Dual reporting to the Chancellor and President of Texas A&M University with consideration to an executive oversight committee*

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

Bachelor of Applied Science Degree IT NETWORKING

Bachelor of Applied Science Degree IT NETWORKING Bachelor of Applied Science Degree IT NETWORKING Beginning fall 2017! Whatcom Community College s nationally acclaimed computer information systems program will begin offering a bachelor of applied science

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Embedding Cyber Security in the Computer Science Curriculum. Alastair Irons, Carsten Maple, Nick Savage, Adrian Davis, Lyndsay Turley

Embedding Cyber Security in the Computer Science Curriculum. Alastair Irons, Carsten Maple, Nick Savage, Adrian Davis, Lyndsay Turley Embedding Cyber Security in the Computer Science Curriculum Alastair Irons, Carsten Maple, Nick Savage, Adrian Davis, Lyndsay Turley Objectives from Session To discuss the issue trying to be resolved Summary

More information

2016 NCCA Standards Revisions Recap and Takeaways: What You Need to Know

2016 NCCA Standards Revisions Recap and Takeaways: What You Need to Know 2016 NCCA Standards Revisions Recap and Takeaways: What You Need to Know Certification programs must stay up to date with the latest revisions to the NCCA Standards for certification. Written by Dr. Jim

More information

How Secure is Blockchain? June 6 th, 2017

How Secure is Blockchain? June 6 th, 2017 How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones

More information

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS (ISC) 2 CISSP Recertification Guidelines (rev. 8-06) Page 1 of 16 CONTENTS Introduction... 3 CPE Record Keeping... 4 CPE Credit

More information

PARTNER PROGRAM OVERVIEW

PARTNER PROGRAM OVERVIEW PARTNER PROGRAM OVERVIEW Partner Program GROW YOUR BUSINESS A Powerful Cybersecurity Management Platform Skybox Security provides the industry s broadest cybersecurity management platform, giving our partners

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION 9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.

More information

Advancement Application

Advancement Application Advancement Application for Senior Member and Fellow Member status Philosophy The purpose of the advancement program is to recognize those members who have provided substantial service and contributions

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

Network Technology: Microsoft. Undergraduate Certificate

Network Technology: Microsoft. Undergraduate Certificate Network Technology: Microsoft Undergraduate Certificate Effective January 8, 2018 Network Technology: Microsoft Undergraduate Certificate Undergraduate certificates are an ideal way to update existing

More information

Network Technology: Cisco. Undergraduate Certificate

Network Technology: Cisco. Undergraduate Certificate Network Technology: Cisco Undergraduate Certificate Effective January 8, 2018 Network Technology: Cisco Undergraduate Certificate Undergraduate certificates are an ideal way to update existing knowledge,

More information

PROFESSIONAL MASTER S IN

PROFESSIONAL MASTER S IN I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

Get Exam Ready. Attention Potential HFMA Certification Candidates! HFMA Certification Candidate

Get Exam Ready. Attention Potential HFMA Certification Candidates! HFMA Certification Candidate Get Exam Ready HFMA Certification Candidate Attention Potential HFMA Certification Candidates! Thursdays February 12, 2015 March 12, 2015 12:00 pm to 2:00 pm cst Course Instructor Christoph Stauder FHFMA,

More information

The Institute of Internal Auditors San Gabriel Valley Chapter

The Institute of Internal Auditors San Gabriel Valley Chapter The Institute of Internal Auditors San Gabriel Valley Chapter Presents INFORMATION TECHNOLOGY (IT) and PERFORMANCE AUDITING SEMINAR February 4 and 5, 2014 The San Gabriel Valley Chapter of the IIA is hosting

More information

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

ACADEMIC AFFAIRS COUNCIL ****************************************************************************** ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 4.D.4 DATE: February 25, 2010 ****************************************************************************** SUBJECT: Intent to Plan Joint Proposal, DSU & SDSU MS

More information

Several factors will be considered when matching instructors with training opportunities identified by Corporate Solutions.

Several factors will be considered when matching instructors with training opportunities identified by Corporate Solutions. Qualifications for Corporate Solutions Non-credit instructors Several factors will be considered when matching instructors with training opportunities identified by Corporate Solutions. They are: Certifications

More information

4A Healthcare Data Security & Privacy

4A Healthcare Data Security & Privacy 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits

More information

chief information security officer

chief information security officer FROM IDG CAREER TRACKER What it takes to become a chief information security officer (CISO) What it takes to become a chief information security officer (CISO) A CISO typically has a technical information

More information

AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer

AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer 8:30 9:00AM Breakfast with Various Members of the Search Comm./Chair @ A306A 9:00 9:45AM Meeting with Provost and Deans @ A310

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Why the Security Workforce Needs More Women and Men

Why the Security Workforce Needs More Women and Men Why the Security Workforce Needs More Women and Men ISSA International Conference Tammy Moskites, CIO/CISO, Venafi October 10, 2015 A Little Bit About Me 25+ Years in IT & Security Current CIO/CISO of

More information

EMC ACADEMIC ALLIANCE

EMC ACADEMIC ALLIANCE EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. Equip your students with the broad and deep knowledge required in today s complex

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers 2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Shon Harris s Newly Updated CISSP Materials

Shon Harris s Newly Updated CISSP Materials Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management

More information

COURSE BROCHURE CISA TRAINING

COURSE BROCHURE CISA TRAINING COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within

More information

ISSP Sustainability Professional Credentials UPDATE: March 20, 2019

ISSP Sustainability Professional Credentials UPDATE: March 20, 2019 ISSP Sustainability Professional Credentials UPDATE: March 20, 2019 Why get credentialed? Who do we credential? ISSP-SA ISSP-CSP Credential Maintenance Next steps Stephen Dworkin Certification Manager,

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

What Makes PMI Certifications Stand Apart?

What Makes PMI Certifications Stand Apart? What Makes PMI Certifications Stand Apart? Many certifications exist for managers that claim to offer practitioners and organizations a number of benefits. So, why are PMI certifications unique? PMI certifications

More information

Thirtieth Annual. Electrical & Computer Engineering Day

Thirtieth Annual. Electrical & Computer Engineering Day \ Thirtieth Annual Electrical & Computer Engineering Day Thursday, November 10, 2016 Villanova Room, Connelly Center Activities are scheduled from 3:00 PM to 7:00 PM ECE DAY 16 The 30th annual ECE Day

More information

Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time?

Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time? SESSION ID: AIR T09F Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time? MODERATOR: Dr. Anton Chuvakin Research Vice President at Gartner @anton_chuvakin PANELISTS: Brian Engle Executive Director

More information

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans. Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and

More information

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and

More information

cimc Information Brochure Chartered Institute of Management Consultants

cimc Information Brochure   Chartered Institute of Management Consultants cimc Chartered Institute of Management Consultants // Membership // CIMC Program // Capella Partnership // Business and Aquisition Certificate // Information Brochure Take a career leap with the Chartered

More information

Continuing Professional Education Policy: Requirements for Certification and Qualification Programs. (formerly known as Administrative Directive #4)

Continuing Professional Education Policy: Requirements for Certification and Qualification Programs. (formerly known as Administrative Directive #4) Continuing Professional Education Policy: Requirements for Certification and Qualification Programs (formerly known as Administrative Directive #4) IIA Professional Certification Board November 2017 Contents

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework Prepared by: Larry Wilson lwilson@umassp.edu Chief Information Security Officer University

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose

More information

QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM

QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM DEPARTMENT OF CONSTRUCTION MANAGEMENT AND CIVIL AND CONSTRUCTION ENGINEERING QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM Updated 5/17 Organization The QIP consists of

More information

THE INSTITUTE OF CERTIFIED MANAGERS.

THE INSTITUTE OF CERTIFIED MANAGERS. THE INSTITUTE OF CERTIFIED MANAGERS Update on ICRM Certifications and Specialty Designations: What They Are and How to Pursue Them mjanicik14@comcast.net September 6, 2017 at DGI JJJOHN Records Management

More information

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM Ben Eu Associate Partner, Infrastructure & Endpoint Security at IBM Summary Ben Eu is currently an Associate Partner at IBM Security Services, North America. As an experienced information security executive

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education National Initiative for Cybersecurity Education NIST Special Publication, 800-181 NICE Cybersecurity Workforce Framework Douglas Rausch Cybersecurity Program Director, Bellevue University Lead Skills-based

More information

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m.

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Financial institutions are subject to threats on multiple fronts. Two threats of significant

More information

ContinuingProfessionalEducation(CPE)Guide

ContinuingProfessionalEducation(CPE)Guide ContinuingProfessionalEducation(CPE)Guide CPCM CFCM CCCM Program Year 2017 2018 Table of Contents Page 2 INTRODUCTION....3 THREE CATEGORIES OF CPE.....3 EXPIRATION OF CPE..3 CPE PROGRAMS AND TOPIC/SUBJECT

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

Moderator: Tino Mantella President, Tier4 Advisors

Moderator: Tino Mantella President, Tier4 Advisors Moderator: Tino Mantella President, Tier4 Advisors On January 9th 2017 Tino Mantella took the helm of one of the fastest growing private companies in Georgia. Serving companies across the globe, Tier4

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

Monthly Dinner Meeting

Monthly Dinner Meeting Newsletter Monthly Dinner Meeting Thursday, March 28, 2013 Deann Desai Georgia Institute of Technology THE CHANGES ARE COMING! The Changes are coming changes are coming. The High Level Structure and Text

More information

Developing a Software Industry with TSP and PSP

Developing a Software Industry with TSP and PSP Developing a Software Industry with TSP and PSP Carlos Montes de Oca, PhD Center for Mathematical Research CIMAT SM Personal Software Process, PSP, Team Software Process, and TSP are service marks of Carnegie

More information

Drive Your Career Forward IIA Certifications and Qualifications

Drive Your Career Forward IIA Certifications and Qualifications Drive Your Career Forward IIA Certifications and Qualifications Mapping Your Path for Growth Professional development is a journey. Demonstrating your knowledge, acumen, and leadership ability are key

More information

Legal Disclaimer. Copyright Notice

Legal Disclaimer. Copyright Notice Legal Disclaimer Although the information provided by Clearwater Compliance may be helpful in informing customers and others who have an interest in data privacy and security issues, it does not constitute

More information

APICS Certified Supply Chain Professional (CSCP) Presented by Chicago Chapter of APICS 8/7/2012

APICS Certified Supply Chain Professional (CSCP) Presented by Chicago Chapter of APICS 8/7/2012 APICS Certified Supply Chain Professional (CSCP) Presented by Chicago Chapter of APICS 8/7/2012 Agenda 1. Opening and introductions 2. What is CSCP 3. How will CSCP designation help you 4. Eligibility

More information

SSR Staff Information Sessions Information Technology

SSR Staff Information Sessions Information Technology SSR Staff Information Sessions Information Technology Foreword We don t know what we don t know Commitment to implementation Finishing at 10 mins to 12pm Questions - FAQ or direct to SSR Team Plan Compartmentalised

More information