SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Similar documents
Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Immersion Academy Annual Report 2017

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed.

A United States Cyber Academy Program

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Immersion Academy Annual Report 2018

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

Security in Today s Insecure World for SecureTokyo

State of the Cyber Training Market January 2018

Building the Cybersecurity Workforce. November 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

MALAYSIA S APPROACH IN CAPACITY BUILDING. Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017

O2O-FORT CARSON PROGRAM OVERVIEW

Sales Presentation Case 2018 Dell EMC

THE POWER OF TECH-SAVVY BOARDS:

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Cybersecurity Job Seekers

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents

UK Gender Pay Gap Report 2018

Which Side Are You On?

Creating a Cybersecurity Culture: (ISC)2 Survey Responses

Opening Doors to Cyber and Homeland Security Careers

Security in India: Enabling a New Connected Era

Why the Security Workforce Needs More Women and Men

Defensible and Beyond

CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

Cyber Risks in the Boardroom Conference

About the Global Communication Certification Council

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL

Certified Manager Certification

Hidden Figures: Women in Cybersecurity

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Securing Your Digital Transformation

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

ISACA West Florida Chapter - Cybersecurity Event

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Angela McKay Director, Government Security Policy and Strategy Microsoft

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Career and Technical Education DARLENE FRAZIER

Securing Digital Transformation

ForeScout Extended Module for Splunk

POSITION DESCRIPTION

The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017

Aligning Academic Supply and Industry Demand

House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing:

IT Security: Managing a New Reality

What Makes PMI Certifications Stand Apart?

Cyber Security Technologies

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary

WINNING THE WAR FOR CYBER TALENT

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

CCNA Cybersecurity Operations 1.1 Scope and Sequence

Internet of Things (IoT) Securing the Connected Ecosystem

Cyber Security School

Moving Beyond the Heat Map: Making Better Decisions with Cyber Risk Quantification

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

People risk. Capital risk. Technology risk

Leading Authority Doug Kaminski On 3 Key Ways To Protect Your IP. #FearlessLaw on High Performance Counsel

Certificate Program in Project Management

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Emerging Technologies The risks they pose to your organisations

U.S. Department of Homeland Security Office of Cybersecurity & Communications

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Risk Advisory Academy Training Brochure

UTCS Scholarships for Service

ISACA 2017 OVERVIEW. 3º Fórum IBGP de Tecnologias da Informação. Paulo Henrique Abreu Moreira. Brasília Chapter Associate & CSX Director 08/11/2017

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

Networking Fundamentals Training

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

POSITION DESCRIPTION

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

CCNA Cybersecurity Operations. Program Overview

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Department of Homeland Security Updates

to Enhance Your Cyber Security Needs

Driving Global Resilience

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Evolve Your Security Operations Strategy To Account For Cloud

Certification and Career Guide

HOSTED SECURITY SERVICES

Transcription:

SOC Summit 2017 June 6, 2017 Strengthening Capacity in Cyber Talent sans.org/cybertalent

Increasing Sense of Urgency Cyber threats to U.S. national and economic security are increasing in frequency, scale, sophistication, and severity of impact The ranges of cyber threat actors, methods of attack, targeted systems, and victims are also expanding. James Clapper Former Director of National Intelligence Retired Lt Gen, US Air Force

Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical over applied knowledge Lack of real-world skills 95% of security incidents involve human error Threat Proliferation Outpacing ability to respond 97% of Fortune 500 companies have been hacked. The other 3% have too, they just don t know it Average annualized cost of cyber incidents for U.S. companies is $15.4 million Increasing Risk & Cost Increasing data breaches Increasing vulnerabilities Yahoo: $350 million Undervalued in the organization C-suite understanding remains weak Rarely has something been so important and so talked about with less clarity and less understanding Talent Crisis Severe shortage of skills 348,000+ open positions over 12 months Est. to grow to 1-1.5 million by 2020 91% increase in 5 years (2010-2014) Fast growth across industry verticals Only 11% female

Challenges New Technology Fronts: Mobility to Cloud, IoT Motivated Threat Actors Increased Sophistication of Threats Exponential Increase in Number of Attacks Advanced Threats in the Cyber Security Landscape require an Advanced Skill Set to Compete Emerging Skill Set Education and Certification Training and Development Experience Motivations Immediate Impact A recent study conducted by the Center for Strategic and International Studies (CSIS) and Intel found that 82% of respondents reported a shortage of cybersecurity skills at their organization Seventy-one percent say the talent deficit has hurt their organization. One in four blame it directly for data loss and reputational damage

CyberTalent Issues for the SOC SOC Management Innovative ways to build your cyber talent pipeline Retention why is it so difficult? What can you do to mitigate issues? Working with HR to ensure human capital and corporate culture drive cybersecurity goals From Cyber Team: HR doesn t understand our business. Hiring Managers/Talent Acquisition How do you create and maintain a culture of cybersecurity? What is the role of HR in aligning workforce management with cybersecurity strategy? Common Challenges Best Practices

Workforce Shortage What has to change? Get more qualified people into the field 1.Accelerate Skilled Candidates into Workforce 2.Attract High Potential Candidates 3.Provide Training, Education and Certification 4.Provide Innovative Pathways to Jobs

Innovative Solutions Create diverse, constant talent pipelines Time-to-market sensitive, immersive training is needed to develop information security talent NOW for employers. Innovative solutions in cybersecurity right now include: SANS CyberTalent Immersion Academies NTT Security-SANS VetSuccess Academy Cisco Global Cybersecurity Scholarship Microsoft Software and Systems Academy (MSSA) Onward to Opportunity (O2O) Warriors to Cyber Warriors (W2CW) Cyberjutsu Girls Academy Raytheon Women s Cybersecurity Scholarship CyberCorps (R): Scholarship For Service (SFS) VetsInTech/Palo Alto Networks Evolve & SecureSet Cybersecurity Academies Rackspace Open Cloud Academy

Women: Bringing Diversity to Cybersecurity Academy Goals Provide educational opportunities to women interested in cybersecurity fields Increase gender diversity in the information security work force (11% female) Meet needs of critical national infrastructure firms, industry, law enforcement, and intelligence agencies Match talented, employment-ready women with top cybersecurity employers

SANS CT Academy: How it Works Fast Track: Three steps to a cybersecurity career Qualify Individuals take the qualifying exam, complete the application process, and interview with the admissions committee. Train & Certify Cohort members develop practical, hands-on skills by completing world-class SANS training courses and earning GIAC certifications. Employ Cohort members can earn guaranteed employment opportunities at Sponsored Academies, or pursue multiple opportunities at Open Academies.

VetSuccess Cohorts: Employment Status 118 STARTING SALARY $55-70k 20 $70-90K 29 $90-120K 19 $120K+ 9 SANS VetSuccess Cohort Members Security Clearances 12 in VS Academy process 2016 cohorts 24 in VS Academy process 2017 cohorts US Army Cyber Protection Brigade We ve been thrilled with the opportunity to participate in the VetSuccess Academy. I can t say enough about the cooperation and tireless efforts by SANS to make this program successful for both veterans and employers. -Arlin Halstead, VP, Human Resources

Talent Acquisition Strategy EMPLOYER BRANDING EVP Social Media Mobile Selection Process Live Talks Drives Employer Brand Exec build culture Built inside out Dynamic & Integrated Relevant content for demographics & audience One message across platforms Dynamic & ease of use Flexible Connected anywhere anyhow Digital Interviewing Psychometrics Values based interviewing Time saving Guest Speaking Conferences Careers Fairs 12

Talent Acquisition Strategy Building the Talent Pipeline Employee Referrals Career Fairs University Relations HiPo s Programs NTT Security Direct Sourcing Indirect Sourcing Social Media Key Success Factors Highly Educated Highly Experienced Highly Trained Industry Certifications Analytical / Critical Thinking Hybrid Jobs (IT Sec + Financial/Healthcare) People Skills Customer Service Skills

TALENT ACQUISITION STRATEGY VETERAN PROGRAMS = 18% TTL HIRES VetSuccess Program Well Trained Educated Engaged Skill Ready Immediate Impact Industry Certifications Built In Retention Other Veteran Programs Support Our Veterans Hire Our Heroes Wounded Warriors Joining Forces FortiVet GOAL = 20% TTL EE s 14

Keys to Successful Talent Acquisition Strategies Work Closely With Leadership Build and Present Business Case Develop and Grow Partner Relationships Aggressively Market Programs Prepare Readiness of Stakeholders Quality Assessment and Selection

Questions & Contact Max Shuftan: mshuftan@sans.org Arlin Halstead: Arlin.Halstead@nttsecurity.com