Hidden Figures: Women in Cybersecurity
|
|
- Randell August Blankenship
- 5 years ago
- Views:
Transcription
1 Hidden Figures: Women in Cybersecurity
2 This is not a webinar. This is a topic relevant to the community and our initiatives. What is a virtual community meeting? We want to hear from you! Join into the conversation and add your voice to the discussion.
3 Please use WebEx Panels to Participate You can show the panels using the buttons along the bottom of the screen (You may have to mouse over them.) Please mute when you aren t speaking Raise your hand by clicking the hand next to your name in the Participants List. Click it again to put your hand down. Type messages to Host, All Participants or an individual attendee using Chat. Type text, select name or group from list and click Send. Audio control Participants list Chat
4 Using Annotation tools 1. Click the squiggly line on the right to expand the Annotation tools 2. Click Arrow tool 3. Then, click next to item on screen. An arrow displays your name Your Name 4. To clear your arrow
5 Click Arrow tool (left) Then, click next to location on screen An arrow displays your name Where in North America are you? Do we have anyone with us today who is NOT in North America? Europe? Asia? South America? Africa? Australia?
6 Introduce yourself What are you hoping to learn today? Share with us in the chat box to the right.
7 Cross- Community Workshop
8 What is Cybersecurity? Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
9 The Cost of Cybersecurity Attacks By 2018, nearly 70 percent of businesses had experienced some form of cybersecurity attack, and over half of them had experienced a data breach. 60 percent of small businesses will close within six months of a major cyberattack. Norton Security estimates that by 2023 cybercriminals will be stealing a total of 33 billion records a year. The average cost of a data breach has risen to $3.86 million, with the cost of each data record breached weighing in at $148.
10 The Gap Estimates indicate women make up between 13-18% of the cybersecurity workforce. Cybercrime will more than triple the number of job openings over the next 5 years. Cybersecurity Ventures predicts there will be 3.5 million cybersecurity job openings by We have to consider alternative paths to filing the pipeline: Engaging girls in middle school Vocational or skill based education Apprentice, Internship, and Co-Op programs Certifications
11 What do you think is the average opening salary in cybersecurity? $35,000 $50,000 $75,000 Community Poll $85,000
12 Cybersecurity Career Pathway Entry Level Cybersecurity Specialist/Technician Cyber Crime Analyst/Investigator Incident Analyst IT Auditor Average Salary: $86,250 Mid-Level Cybersecurity Analyst Cybersecurity Consultant Penetration & Vulnerability Tester Average Salary: $95,667 Advanced Cybersecurity Manager/ Administrator Cybersecurity Engineer Cybersecurity Architect Average Salary: $117,333 Source: CyberSeek
13 Please use WebEx Panels to Participate You can show the panels using the buttons along the bottom of the screen (You may have to mouse over them.) Please mute when you aren t speaking Raise your hand by clicking the hand next to your name in the Participants List. Click it again to put your hand down. Type messages to Host, All Participants or an individual attendee using Chat. Type text, select name or group from list and click Send. Audio control Participants list Chat
14 In the chat box share what you would add to our list: Legos, puzzles, and games Breaking stuff, trial & error Confidence, asking questions Nothing is unreachable Skills: K-12 Capture the flag
15 Skills: College In the chat box share what you would add to our list: Problem solving Curiosity Analytical thinking Continuous learning Adaptability Business acumen Creativity Collaboration skills Communication skills Resiliency Emotional intelligence
16 Skills: Women Pivoting Careers In the chat box share what you would add to our list: Detail oriented Organized Soft skills Responsive Biz acumen Baseline computer skills Empathy
17 How can we prepare girls/women to navigate environments that might be less-than-accepting of their talents? Using the chat box share what you would add to our list: Internships/Co-Ops Advisors Mentors/Sponsors Involvement by people in the industry Female staff & teachers Bootcamps and intensives
18 Do you think we have a gap in the technology industry, cybersecurity, or both? Technology Industry Cybersecurity Both Community Poll No gap
19 In the chat box share what you would add to our list: Awareness Promote success stories What can we do to help men and boys see women and girls as capable in technology? Networking invite women to join your group or bring one person with you.
20 Using Annotation tools 1. Click the squiggly line on the right to expand the Annotation tools 2. Click Arrow tool 3. Then, click next to item on screen. An arrow displays your name Your Name 4. To clear your arrow
21 What are our challenges? Awareness No mentors Thinking them can t do it Starting somewhere Ground zero Might pick insiders first Self-select themselves out I agree I have a comment Just listening
22 What would you add to our discussion? Share in the chat. Raise your hand if you have a comment or a question. Let us know if you are just listening (are you still with us?) I agree I have a comment Just listening
23 What certifications are available? Using the text box what certifications would you add to our list? CEH: Certified Ethical Hacker CISM: Certified Information Security Manager CompTIA Security+ CISSP: Certified Information Systems Security Professional GSEC: SANS GIAC Security Essentials CISA Certified Information Systems Auditor CCSP Certified Cloud Security Professional Vendor specific: Microsoft, Cisco
24 Any question? I have a comment Just listening
25 THANK YOU Join our communities on CompTIA.org
ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationTHE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS
SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA
More informationHearing Voices: The Cybersecurity Pro s View of the Profession
SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International
More informationCareer Paths In Cybersecurity
Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationBuilding new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.
Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory
More informationSECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH
SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+
More informationWhich Side Are You On?
12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity
More informationCybersecurity Employment SecureNinja
Cybersecurity Employment Opportunities @ SecureNinja CyberSecurity, Technical Engineer Responsible for security measures for networks & information. Senior Software Security Consultant Location: Alexandria,
More informationCyberVista Certify cybervista.net
ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training
More informationUPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst
WORKFORCE COLLABORATIVE: CYBERSECURITY BUILDING THE TALENT PIPELINE SECURITY ANALYST CAREER PATHWAY UPDATED: 10/17/16 CYBERSECURITY SECURITY ANALYST CAREER PATHWAY Senior Level Senior Specialty Threat,
More informationSOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent
SOC Summit 2017 June 6, 2017 Strengthening Capacity in Cyber Talent sans.org/cybertalent Increasing Sense of Urgency Cyber threats to U.S. national and economic security are increasing in frequency, scale,
More informationCyber Security Advanced Education: Preparing the Emerging Workforce
Cyber Security Advanced Education: Preparing the Emerging Workforce Scott vonfischer, CISO We are all apprentices in a craft where no one ever becomes a master. Ernest Hemingway A Unique Perspective on
More informationWelcome to the HP Institute
Welcome to the HP Institute How HP is working with education to develop tomorrow s IT workforce today Capability Business need for speed The rate of business is increasing exponentially 2020 2T devices
More informationNZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL
NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL SKILLS SHORTAGE BRIEFING PAPER CONNECT PROMOTE ADVANCE @NZTechIA PREPARED BY THE NEW ZEALAND TECHNOLOGY INDUSTRY ASSOCIATION Published: November 2016
More informationSecurity. Protect your business from security threats with Pearl Technology. The Connection That Matters Most
Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to
More informationHacking the Industry S. Malone & N. Beddome. Page 1
Hacking the Industry 2012 S. Malone & N. Beddome Page 1 Step 1: Build Your Tool Kit Page 2 What Your Tool Kit Should Contain To be successful in the industry just like in a penetration test you need a
More informationBuilding the Cybersecurity Workforce. November 2017
Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationThe fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
More informationStrengthening Capacity in Cyber Talent sans.org/cybertalent
SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationCYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS
CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS WHITE PAPER January 2017 January 2017 1 THE PROBLEM PERSONNEL SHORTAGE The demand for skilled cyber security talent is outstripping supply. In 2014, there
More informationISACA West Florida Chapter - Cybersecurity Event
ISACA West Florida Chapter - Cybersecurity Event Presented by Sri Sridharan Managing Director & Chief Operating Officer Florida Center for Cybersecurity CURRENT TRENDS Top Cybersecurity Trends of 2015
More information#2 Unified Communications Engineer
#1 System Architect / IT Manager While IT managers and system architects are often in demand, anyone with automation, process, or workflow skills particularly ITIL or CoBIT has become particularly sought
More informationWhy the Security Workforce Needs More Women and Men
Why the Security Workforce Needs More Women and Men ISSA International Conference Tammy Moskites, CIO/CISO, Venafi October 10, 2015 A Little Bit About Me 25+ Years in IT & Security Current CIO/CISO of
More informationHow NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity
How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web
More informationCERTIFICATION TRAINING - ISC2
MERIT CLASSES The Michigan Cyber Range features a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE).
More informationKNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals
KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity
More informationImmersion Academy Annual Report 2018
Immersion Academy Annual Report 2018 An accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security
More informationTechnology Training Center. WebEx Meeting Center User Guide
Technology Training Center WebEx Meeting Center User Guide Updated 9/26/2017 Table of Contents ACCESSING WEBEX AS A PARTICIPANT... 1 Joining a WebEx as a Participant... 1 Audio and Video Connection...
More informationDIABLO VALLEY COLLEGE CATALOG
COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in
More informationState of the Cyber Training Market January 2018
State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017
More informationPlaying Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert?
Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert? Presented by: Curtis Coats, CISSP, CAP Kelley P. Archer, CISSR MN ISSA Agenda Types
More informationCybersecurity Job Seekers
Cybersecurity Job Seekers 2018 Insights and Trends David Shearer, CISSP (ISC)² CEO 3 Who s This Guy?» Lead (ISC)² Certified CISSP» 30 years experience Public sector CIO, architecture, security, engineering
More informationThe fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion
More informationA United States Cyber Academy Program
The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationCracking the code on an IT career
Cracking the code on an IT career Jade Khoo Patrick Hosseini & Laura Deans James Hamlyn-Harris CRICOS 00111D, TOID 3069 Snapshot of stories that made news 2 Hacks that leave you exposed The Australian
More informationImmersion Academy Annual Report 2017
Immersion Academy Annual Report 2017 Accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security systems.
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationEducation and technology are two of our greatest social equalizers.
Corporate Social Responsibility Education and technology are two of our greatest social equalizers. As the worldwide leader in networking, Cisco knows technology can be used to improve access to education.
More informationVal-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.
Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting
More informationTeam Advanced VC Services. Cisco WebEx Services
Team Advanced VC Services Cisco WebEx Services People Want to Collaborate Their Way More Technology Choices Are Available Than Ever Before They want mobility. They want applications that make them more
More informationMeeting Center: Organizing and Conducting Collaborative Meetings
Meeting Center: Organizing and Conducting Collaborative Meetings Cisco Learning Services This document is for training purposes only. All content is subject to change without notice. PNCOPS v1.0 1 Course
More informationCyber Security Occupations. in San Diego County
Cyber Security s in San Diego County February 2017 Prepared by Center of Excellence for Labor Market Research San Diego & Imperial Counties Region Labor Market Demand & Wages Currently, there is only one
More informationCPRE Question Bank. 200 questions with answers and explanations. LN Mishra, CPRE, CBAP, CSM, PMP
CPRE Question Bank 200 questions with answers and explanations LN Mishra, CPRE, CBAP, CSM, PMP Copyright notice All rights reserved. CPRE is registered Trademarks of International Requirements Engineering
More informationCyber Security Incident Response Fighting Fire with Fire
Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the
More informationReasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS
Reasons to Become CISSP Certified Keith A. Watson, CISSP CERIAS Overview Certification review Organizational needs Individual needs Get paid more! See the world! CISSP requirements Common Body of Knowledge
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting
More informationCyber Security School
Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government
More informationSecurity-as-a-Service: The Future of Security Management
Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is
More informationDoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: October 2010 What is DoDD 8570? Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management
More informationSynchronous Classroom User Guide
Synchronous Classroom User Guide Help Topics System & Equipment Set Up Synchronous Classroom System Requirements and Options Audio and Video Equipment Audio Equipment Set Up and Use Connect by VoIP Connect
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning
More informationWINNING THE WAR FOR CYBER TALENT
WINNING THE WAR FOR CYBER TALENT National Initiative for Cyber Education (NICE) Conference Keynote NOVEMBER 2017 AGENDA CYBER TALENT SUPPLY VS. DEMAND MULTIDIMENSIONAL APPROACH TO ADDRESS THE SUPPLY /
More informationYou will not hear audio until the webinar begins.
Welcome to today s webinar on: Innovation: A New Approach to Patient Safety Challenges You will not hear audio until the webinar begins. To view audio information click on the Event Info tab. 1 Rebecca
More informationDeveloping Career-Relevant Academic Programs
2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)
More informationWebEx University. WebEx University. Mastering Cisco WebEx Meeting Center. Program Overview
WebEx University WebEx University Mastering Cisco WebEx Meeting Center Program Overview Program Introduction Thank you for your interest in the Cisco WebEx Meeting Center Mastery Program. Please contact
More informationBachelor of Information Technology
Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime
More informationLesson Guides INTERMEDIATE
Lesson Guides INTERMEDIATE British Council 2018 The British Council is the United Kingdom s international organisation for cultural relations and educational opportunities. INTERMEDIATE LESSON GUIDE WORK
More informationAn Annual Research Report (Part I)
RESEARCH REPORT The State of Cyber Security Professional Careers: An Annual Research Report (Part I) By Jon Oltsik, ESG Senior Principal Analyst October 2016 A Cooperative Research Project by ESG and ISSA
More informationCCNA R&S Tying Certifications to Career Paths Webinar Series
CCNA R&S Tying Certifications to Career Paths Webinar Series Speaker: Varun Chandrasekharan Learning at Cisco Hostess: Kara Sullivan Cisco Networking Academy 21 March 2018 Welcome to the 2nd session of
More informationMission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS
Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning
More informationAn Aflac Case Study: Moving a Security Program from Defense to Offense
SESSION ID: CXO-W11 An Aflac Case Study: Moving a Security Program from Defense to Offense Tim Callahan SVP & Global CISO Aflac Threat Landscape Selected losses > 30,000 records (updated 10/15/16) Security
More informationUK Gender Pay Gap Report 2018
UK Gender Pay Gap Report 2018 As part of McAfee s commitment to build a better, more balanced workplace and community, we wholly embrace the UK Gender Pay Gap report. This year s calculations cover our
More informationMedia-Ready Network Transcript
Media-Ready Network Transcript Hello and welcome to this Cisco on Cisco Seminar. I m Bob Scarbrough, Cisco IT manager on the Cisco on Cisco team. With me today are Sheila Jordan, Vice President of the
More informationPeople risk. Capital risk. Technology risk
Decode secure. People risk Capital risk Technology risk Cybersecurity needs a new battle plan. A better plan that deals with the full spectrum of your company s cybersecurity not just your technology.
More informationCYBER SECURITY TAILORED FOR BUSINESS SUCCESS
CYBER SECURITY TAILORED FOR BUSINESS SUCCESS KNOW THE ASIAN CYBER SECURITY LANDSCAPE As your organisation adopts digital transformation initiatives to accelerate your business ahead, understand the cyber
More informationEdiscovery Professional
CYBER CERTIFICATIONS FUTURE-PROOFING FOR THE Ediscovery Professional by Janice Jaco When we work with clients or industry groups on topics related to the maturation of ediscovery practice and professionals,
More informationitsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program
itsm003 v.3.0 NICE Training Curriculum & Workforce Planning Program Agenda and Objectives NICE Cybersecurity Curriculum Consortium IT & Cybersecurity Frameworks & Methodologies NICE Curriculum Catalog
More informationFOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY
FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide
More informationEducation and technology are two of our greatest social equalizers.
Corporate Social Responsibility Education and technology are two of our greatest social equalizers. As the worldwide leader in networking, Cisco knows technology can be used to improve access to education.
More informationThe Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018
The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationPresented by National CyberWatch Center March 31, April 1 & 2, 2016 Johns Hopkins University Applied Physics Lab Laurel, Maryland
Presented by National CyberWatch Center March 31, April 1 & 2, 2016 Johns Hopkins University Applied Physics Lab Laurel, Maryland 2016 SPONSOR BROCHURE WHAT IS THE NATIONAL CYBERWATCH CENTER MID-ATLANTIC
More informationEC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1
EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and
More informationBuild Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development
Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education
More informationCyber Analyst Academy. Closing the Cyber Security Skills Gap.
Cyber Analyst Academy Closing the Cyber Security Skills Gap. Why do the Cyber Analyst Academy? Why QA? There is a huge gap in the market for this skills set and QA are excited to deliver a new hands-on
More informationO2O-FORT CARSON PROGRAM OVERVIEW
O2O-FORT CARSON PROGRAM OVERVIEW ONWARD TO OPPORTUNITY (O2O) IN PARTNERSHIP WITH THE VETERANS CAREER TRANSITION PROGRAM (VCTP) A JOINT VENTURE B ETWEEN THE DEPARTMENT OF DEFENSE, THE SCHULTZ F AMILY FOUNDATION,
More informationCitation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.
Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation
More informationKeeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent
Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical
More informationISACA Enterprise. Solutions and Resources
ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationChallenges and games to inspire the next generation of cyber security professionals
Challenges and games to inspire the next generation of cyber security professionals What is CyberStart? CyberStart: a suite of challenges, tools and games designed to introduce young people to the field
More informationCareer and Technical Education DARLENE FRAZIER
Career and Technical Education DARLENE FRAZIER College Ready High School Prep Work Ready Where do I begin? Career Ready Empowering students to be successful citizens, employees, and leaders in a global
More informationWhat is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)
What is the CISSP? (ISC)2 s Certified Information Systems Security Professional (CISSP ) is the gold standard professional certification for experienced information security and related professionals worldwide.
More informationCyber Security Day 1 Workforce Ready Graduates
Cyber Security Day 1 Workforce Ready Graduates Susan Moon Career Academy Coordinator November 6, 2014 Huntsville City Schools has implemented a that is: networked collaborative interactive personalized
More informationQuick Reference Guide WebEx on an ipad
Quick Reference Guide WebEx on an ipad Install WebEx Meetings for ipad In order to schedule and attend WebEx meetings from your ipad you need to download, install and activate the Cisco WebEx Meetings
More informationSALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually
SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationแนวทางการพ ฒนา Information Security Professional ในประเทศไทย
แนวทางการพ ฒนา Information Security Professional ในประเทศไทย โดย Thailand Information Security Association (TISA) Agenda 1) Global Information Security Professional Situation 2) Current Thailand Information
More informationCurrent skills gap for capable CTI analysts: Training for forensics & analysis
Current skills gap for capable CTI analysts: Training for forensics & analysis WORKSHOP CTI EU Bonding EU Cyber Threat Intelligence 30-31 October, Link Campus University, Rome, Italy Ing. Selene Giupponi
More informationWebEx New user Orientation. Meeting Organizer Guide
WebEx New user Orientation Meeting Organizer Guide OBJECTIVE: AGENDA: I. II. III. IV. Utilize the tools provided at Kent State University to host and attend online meetings via the WebEx application and
More informationAn Aflac Case Study: Moving a Security Program from Defense to Offense
SESSION ID: TTA-F02 An Aflac Case Study: Moving a Security Program from Defense to Offense Tim Callahan SVP & Global Chief Security Officer Aflac Threat Landscape Security risks are growing at a faster
More information