Strengthening Capacity in Cyber Talent sans.org/cybertalent

Similar documents
Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

A United States Cyber Academy Program

Immersion Academy Annual Report 2017

Immersion Academy Annual Report 2018

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Networking Fundamentals Training

Building the Cybersecurity Workforce. November 2017

CCNA Cybersecurity Operations. Program Overview

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

CCNA Cybersecurity Operations 1.1 Scope and Sequence

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

O2O-FORT CARSON PROGRAM OVERVIEW

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

THE POWER OF TECH-SAVVY BOARDS:

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

RISK MANAGEMENT Education and Certification

Secure Systems Administration and Engineering

Sage Data Security Services Directory

Hacker Academy UK. Black Suits, White Hats!

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

CyberSecurity Apprenticeships

Computer Networking Technologies and Information Assurance & Cybersecurity

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Career Paths In Cybersecurity

SANS/REN-ISAC Partnership

Strengthening Cybersecurity Workforce Development December 2017

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Cyber Security Advanced Education: Preparing the Emerging Workforce

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Software Development & Education Center Security+ Certification

CCISO Blueprint v1. EC-Council

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

State of the Cyber Training Market January 2018

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

Collaboration on Cybersecurity program between California University and Shippensburg University

CompTIA Cybersecurity Analyst+

Application for Certification

State of South Carolina Interim Security Assessment

Security in India: Enabling a New Connected Era

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

STRATEGIC PLAN

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure

Computer Science & IT

The Value of Automated Penetration Testing White Paper

Researching New Ways to Build a Cybersecurity Workforce

SANS/REN-ISAC PARTNERSHIP AGGREGATE BUY PROGRAM

DoD Directive (DoDD) 8570 & GIAC Certification

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

Unified Communications Networks Security and Platforms

Which Side Are You On?

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

ENGINEERING AND TECHNOLOGY MANAGEMENT

DEEPER KNOWLEDGE. ADVANCED SECURITY.

SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE

Securing Your Digital Transformation

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Figure 11-1: Organizational Issues. Managing the Security Function. Chapter 11. Figure 11-1: Organizational Issues. Figure 11-1: Organizational Issues

Provisional Translation

Security in Today s Insecure World for SecureTokyo

Manufacturing Cybersecurity Cooperative Overview

Developing the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

School of Engineering & Built Environment

CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS

Training and Certifying Security Testers Beyond Penetration Testing

Cybersecurity Job Seekers

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

Cyber Management for Ports Results of Small Port Cyber Security Workshops

What Makes PMI Certifications Stand Apart?

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

What It Takes to be a CISO in 2017

CND Exam Blueprint v2.0

Transcription:

SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent

Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical over applied knowledge Lack of real-world skills 95% of security incidents involve human error Threat Proliferation Outpacing ability to respond Increasing Risk Increasing data breaches Increasing vulnerabilities Undervalued in the organization C-suite understanding remains weak Rarely has something been so important and so talked about with less clarity and less understanding Talent Crisis Severe shortage of skills 97% of Fortune 500 companies have been hacked. The other 3% have too, they just don t know it Average annualized cost of cyber incidents for U.S. companies is $15.4 million 240,000 open positions in 12 months 91% increase in 5 years (2010-2014) Fast growth across industry verticals (e.g. Finance, HC, Retail Trade)

A Systems Approach is Needed Cyber Human Capital Management Strategy Talent Lifecycle Training & Development Community Resources & Thought Leadership CT SOLUTIONS CT SOLUTIONS CT SOLUTIONS CT INITIATIVES Strategy Consulting VetSuccess Academies Technical Training Collaboratives Organization Design Women s Academies Management Training Summits CT Career Mapping Skills and Aptitude Assessments Onboarding & Retention Strategy White Papers Community Investment

VetSuccess Immersion Academy Fast Track: Three steps to a cybersecurity career Qualify Take the qualifying exam, complete the application process, and interview with the admissions committee. Train & Certify Develop practical, hands-on skills by completing world-class SANS training courses. Two and three course programs available. Earn GIAC certifications, recognized by employers around the world. Employ Earn a guaranteed employment opportunity at Sponsored Academies (agreed to an anticipated minimum two-year term), or seek multiple nonguaranteed opportunities at Open Academies.

Participant Profile (2015 Pilot Cohorts) 18United States Veterans 13 US Air Force 3 US Army 1 US Marines 1 US Navy Experience 16 years average Security in Information Technology Clearances STARTING SALARY $70-90K 8 $90-8 120K $120K+ 2 37 additional candidates currently completing the program. Six Academies in the planning phase. US Army Cyber Protection Brigade We ve been thrilled with the opportunity to participate in the VetSuccess Academy. I can t say enough about the cooperation and tireless efforts by SANS to make this program successful for both veterans and employers. -Arlin Halstead, VP, Human Resources Contact: mshuftan@sans.org

Women: Bringing Diversity to Cyber Security Academy Goals Provide educational opportunities to women interested in cybersecurity fields Increase gender diversity in the information security work force Meet needs of critical national infrastructure firms, industry, law enforcement, and intelligence agencies Match talented, employment-ready women with top cybersecurity employers

Women: Bringing Diversity to Cyber Security Recruiting: Partnership with the National Center For Women in Information Technology (NCWIT) 300 inquiries with 200 qualified candidates taking the Aptitude Exam 90 high scoring candidates identified and invited to submit resumes and transcripts for interviews 19 top candidates selected for the initial cohort Curriculum: SEC 401 was taken live as cohorts at three SANS conferences in May and June SEC 504 will be taken on demand after passaged of GSEC; third elective will be offered to successful candidates as well Expected graduation in September 2016 Employment: Graduates will be matched with prospective employers. We are currently looking for additional employers to participate as well as to be named sponsors of the program

Free Demo: sans.org/cybertalent/free-demo CyberTalent Assessments Essential tools to assess and develop talent CYBERTALENT ENHANCED (CTE) CYBER DEFENSE PENETRATION TESTING APPLICATION SECURITY DIGITAL FORENSICS Measures technical aptitude Information Security Foundations Penetration Testing Fundamentals Web application attacks & architecture security Digital Forensics Foundations Provides predictability for likelihood for success in cybersecurity Cornerstone Information Security Advanced Information Security Principles Cornerstone Penetration Testing Advanced Penetration Testing Principles Web technologies & service Cornerstone Digital Forensics Advanced Digital Forensics Principles

CyberTalent Enhanced (CTE) How to use CyberTalent Enhanced CyberTalent Enhanced (CTE) was developed to determine if an individual has the aptitude and basic skills to succeed in information security, as demonstrated on various GIAC exams such as GSEC (SANS SEC401 training) and GCIH (SANS SEC504 training). The exam was developed using common measurement and testing standards to support a validity claim for the CTE test. The 50 item exam was developed by qualified information security subject matter experts, and predicts potential success on GIAC exams. With hundreds of test takers to date, the assessment shows a strong correlation with success in passing GIAC certifications.

CyberTalent Enhanced Aptitude (25 questions) Information Security Aptitude: The aptitude of the candidate toward general information security principles will be observed Basic InfoSec Skills (25 questions) Networking Concepts Domain: The candidate will demonstrate a thorough understanding of networking design, hardware, and common protocols such as Ipv4, IPv6, TCP, UDP, and ICMP, and will be able to read network packets. Defense in Depth Domain: The candidate will demonstrate a thorough understanding of defense-in-depth such as anti-malware, access control, authentication, and application security. Internet Security Technologies Domain: The candidate will demonstrate a thorough understanding of communications security including cryptography, VPNs, PKI, and data encryption. Communications Security Domain: The candidate will demonstrate a thorough understanding of common Internet security technologies such as firewalls, and processes such as vulnerability management, intrusion detection and prevention, and risk management. Operating Systems Security Domain: The candidate will demonstrate a thorough understanding of common operating system security for Windows and Linux, auditing, permissions, and security configuration.

How CyberTalent Assessments Help Improve your training ROI Benchmark your Team Personnel Development Plans Simple Web-based Reports Establish a baseline to more effectively manage and measure progress. Take a portfolio management approach to overall IS performance. Receive clear views of where individual team members are strong and where skills need development. Eliminate wasted and ineffective training costs. Generate an easy to use report summarizing the individual and team performance.

Top talent, in one place, with one click Pre-Screened Applicants Cost-effective Recruiting & Hiring Access to SANS CyberTalent Assessments provided to all job seekers Innovative virtual format includes dynamic chat with viewable profiles and resumes, and next steps mechanisms to facilitate follow-up emails, interviews, etc.

Contact Max Shuftan:mshuftan@sans.org Jim Michaud: jmichaud@sans.org Web: sans.org/cybertalent