ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Similar documents
Building the Cybersecurity Workforce. November 2017

Hidden Figures: Women in Cybersecurity

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

Mohammad Shahadat Hossain

Career Paths In Cybersecurity

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Hearing Voices: The Cybersecurity Pro s View of the Profession

Security in Today s Insecure World for SecureTokyo

building for my Future 2013 Certification

CERTIFICATION TRAINING - ISC2

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

Strengthening Capacity in Cyber Talent sans.org/cybertalent

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Which Side Are You On?

CyberVista Certify cybervista.net

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

School of Engineering & Built Environment

Bachelor of Information Technology

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

The fast track to top skills and top jobs in cyber. Guaranteed.

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Ingram Micro Cyber Security Portfolio

Immersion Academy Annual Report 2018

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

Developing Career-Relevant Academic Programs

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Cyber Security Advanced Education: Preparing the Emerging Workforce

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

Cybersecurity Employment SecureNinja

BHConsulting. Your trusted cybersecurity partner

Cyber Security Incident Response Fighting Fire with Fire

Why the Security Workforce Needs More Women and Men

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

A United States Cyber Academy Program

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

Les joies et les peines de la transformation numérique

CIT 480: Securing Computer Systems. Putting It All Together

BHConsulting. Your trusted cybersecurity partner

CAREERS SNAPSHOT INFORMATION AND COMMUNICATIONS TECHNOLOGY TAFENSW.EDU.AU TAFE NSW STRATEGY

Cybersecurity Job Seekers

Personnel Certification

CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS

Information Systems Security Certificate Program

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

STUDENT AND ACADEMIC SERVICES

Computer Information Science xxx

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

Certified Cyber Security Analyst VS-1160

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL

Cyber Security Occupations. in San Diego County

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

Application for Certification

CYBER SECURITY TRAINING

Hacking the Industry S. Malone & N. Beddome. Page 1

Cyber Security School

DIABLO VALLEY COLLEGE CATALOG

Ediscovery Professional

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Information Technology

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

CISCO NETWORKING ACADEMY CASE STUDY

Cyber Security: It s all about TRUST

Unlocking Potential Through Learning

UTCS Scholarships for Service

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

ISACA Enterprise. Solutions and Resources

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Gujarat Forensic Sciences University

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Emerging Technologies The risks they pose to your organisations

Immersion Academy Annual Report 2017

Security in India: Enabling a New Connected Era

Wolfpack Cyber Academy Training Catalogue

Reasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS

Current skills gap for capable CTI analysts: Training for forensics & analysis

C HFI SCIENCE SECURING FORENSIC. Every crime leaves a trail of evidence. Computer Hacking Forensic Investigator v9 NETWORKS WITH.

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

CCNA Cybersecurity Operations. Program Overview

Management Update: Information Security Risk Best Practices

Certification and Career Guide

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Cyber, Information Security, and Data Protection

PECB UNIVERSITY PECB UNIVERSITY

Spreading the ICT Gospel With Cisco Network Academy Program

Ambition Market Insights

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Spillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012

The UK s National Cyber Security Strategy

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

Transcription:

GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences of Bizerte (FSB) University of Carthage nizar.benneji@fsb.rnu.tn

Outline Evolution of security Digital security domains Digital security needed competencies and certifications Digital workforce shortage Role of the university career pathway 1

Evolution of Digital Information Cyber Information Technology (IT) Physical and Environmental Operational Technology (OT) Internet of Things (IoT) Digital 2

Digital Cornerstone of the Digital Economy Experts are predicting that digital crime will cost businesses 6 trillion dollars annually by 2021 556 Million victims per year, 1.5 Million victims per day and 1.8 victims per second Digital crime is going mobile: 2/3 of Internet users are using mobile devices and 31% of victims are mobile users Digital crime is going social: 40% of social network users have fallen victim In 2020, 20.8 billion Internet connected things: Human will be more exposed to digital criminality Digital economy and digital business environment are built on trust: Digital ethics and Digitalsecurity: Legal framework (Laws, decrees and regulation texts) Institutional framework (National Digital Agencies, Government Certification Authorities,..) Technical framework (Last emerging technologies) Organisations that are able to attract and retain digital security talent will be much more successful in profiting from the digital opportunity and managing the digital security risk 3

Digital Domains Nine main domains Digital 4

Digital Expertise Top Skills and Certifications TOP SKILLS TOP CERTIFICATIONS Information Administration Linux / UNIX Audit Planning Audit Reporting Risk Assessment Computer Forensics Malware Analysis Project CISA (Certified Information Systems Auditor) CISM (Certified Information Manager) GIAC (Global Information Assurance Certification) CompTIA + Certification CCNA (Cisco Certified Network Associate) CEH (Certified Ethical Hacker) CHFI (Computer Hacking Forensic Investigator) CISSP (Certified Information Systems Professional) ISO 2700X CIA (Certified Internal Auditor) CRISC (Certified in Risk and Information Systems Control) 5

Digital Workforce Shortage High Demand Digital security skills ranked first in both demand and talent gap Digital security workforce gap will reach 1.8 million in 2022 according to the 2017 Global Information Workforce Study of the International Information System Certification Consortium (ISC 2 ) Capgemini Digital Transformation Institute Survey (June July 2017) 6

Top Reasons for Shortage Reasons for shortage are various and vary mainly by region: UNIVERISTY COMPANY Global Information Workforce Study (2017) Problem in finding qualified persons with knowledge, skills and abilities Hybrid job combining different skill sets that are not traditionally taught together Certifications become prominent for the employers and candidates are filtered out of the hiring process on the basis of certifications Women not well involved and encouraged to practice this profession: Only make up 11% of the cyber workforce Leadership not understanding the requirements for digital security skills Focus on senior professionals with years of experience and overlook recent grads Distribution of the digital security resources (private/public, country/abroad, ) Not well defined career path Inability to retain cyber security employees 7

Role of the University Apply possible solutions as early as possible better than recycling Universities have a big role to play in the solution to Adapt the university programs to the digital security job market to have a better aligned education and training pipelines Provide students with the needed skills Prepare for entry level certifications since IT digital security positions request at least one of certifications (CISA, CEH, CISSP, ) and industry certification increase salaries Frequently update the content of the course materials to keep pace with this fast evolving demand Career centres at universities should provide students with guidance and advices regarding the job market needs to avoid unemployment and underemployment Universities could support the growth of technology based new ventures especially in digital security (create job opportunities for recent grads) Encourage female students to study and pursue degrees and careers in cybersecurity 8

Career Pathway Specialist / Technician University Entry Level Mid Level Advanced Level 1 2 3 4 TOP 5 SKILLS Information Administration Linux / UNIX Audit Planning TOP 5 CISA CISM GIAC + CCNA Specialist / Technician Incident Responder Analyst Consultant Manager Senior Engineer 5 Audit Reporting Risk Assessment Computer Forensics Malware Analysis Project CEH CHFI CISSP ISO 2700X CIA CRISC IT Auditor Cybercrime Investigator Penetration & Vulnerability Tester Architect 9

Career Pathway Incident Responder University Entry Level Mid Level Advanced Level 1 2 3 4 TOP 5 SKILLS Information Administration Linux / UNIX Audit Planning TOP 5 CISA CISM GIAC + CCNA Specialist / Technician Incident Responder Analyst Consultant Manager Senior Engineer 5 Audit Reporting Risk Assessment Computer Forensics Malware Analysis Project CEH CHFI CISSP ISO 2700X CIA CRISC IT Auditor Cybercrime Investigator Penetration & Vulnerability Tester Architect 10

Career Pathway IT Auditor University Entry Level Mid Level Advanced Level 1 2 3 4 5 TOP 5 SKILLS TOP 5 Information Administration Linux / UNIX Audit Planning Audit Reporting Risk Assessment Computer Forensics Malware Analysis Project CISA CISM GIAC + CCNA CEH CHFI CISSP ISO 2700X CIA CRISC Specialist / Technician Incident Responder IT Auditor Cybercrime Investigator Analyst Consultant Penetration & Vulnerability Tester Manager Senior Engineer Architect 11

Career Pathway Cybercrime Investigator University Entry Level Mid Level Advanced Level 1 2 3 TOP 5 SKILLS TOP 5 Information Administration Linux / UNIX Audit Planning CISA CISM GIAC + CCNA Specialist / Technician Incident Responder Analyst Consultant Manager Senior Engineer 4 5 Audit Reporting Risk Assessment Computer Forensics Malware Analysis Project CEH CHFI CISSP ISO 2700X CIA CRISC IT Auditor Cybercrime Investigator Penetration & Vulnerability Tester Architect 12

Career Pathway Consultant University Entry Level Mid Level Advanced Level 1 2 3 4 5 TOP 5 SKILLS TOP 5 Information Information Systems Cryptography Project Risk Linux / UNIX Business Process Software Development Scanners Operations CISA CISM GIAC + CCNA CEH CHFI CISSP ISO 2700X CIA CRISC Specialist / Technician Incident Responder IT Auditor Cybercrime Investigator Analyst Consultant Penetration & Vulnerability Tester Manager Senior Engineer Architect 13

Career Pathway Manager University Entry Level Mid Level Advanced Level 1 2 3 4 5 TOP 5 SKILLS TOP 5 Information Information Systems Cryptography Project Risk Linux / UNIX Business Process Software Development Scanners Operations CISA CISM GIAC + CCNA CEH CHFI CISSP ISO 2700X CIA CRISC Specialist / Technician Incident Responder IT Auditor Cybercrime Investigator Analyst Consultant Penetration & Vulnerability Tester Manager Senior Engineer Architect 14

Conclusion Digital Capacity Building Digital security is the cornerstone of the digital economy Evolution of security: new needs, constraints, trends and challenges Digital security domains, required skills and certifications Digital security workforce shortage and universities simply aren t in a position to fill the void Career pathway starts at the university Universities have a big role to play in the solution (update programs, include certifications, university career centres, partnerships with firms, research activities, entrepreneurship, ) Make clear and concise cyber security path ways to save the cyber security professions 15

THANK YOU FOR YOUR ATTENTION Dr. Eng. Nizar Ben Neji IT Trainer, Consultant and Researcher PhD in Information and Communication Technologies nizar.benneji@fsb.rnu.tn /(+216) 99 207 377