Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Similar documents
Strengthening Capacity in Cyber Talent sans.org/cybertalent

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

A United States Cyber Academy Program

Immersion Academy Annual Report 2017

Immersion Academy Annual Report 2018

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

O2O-FORT CARSON PROGRAM OVERVIEW

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Building the Cybersecurity Workforce. November 2017

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CYBER APPRENTICESHIP. Dr Leigh Armistead, President

CCNA Cybersecurity Operations. Program Overview

Career Paths In Cybersecurity

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Strengthening Cybersecurity Workforce Development December 2017

Cyber Security Advanced Education: Preparing the Emerging Workforce

Computer Networking Technologies and Information Assurance & Cybersecurity

CCNA Cybersecurity Operations 1.1 Scope and Sequence

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

College Of. Technological Innovation

PROFESSIONAL MASTER S IN

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

PECB UNIVERSITY PECB UNIVERSITY

CISCO CCNA DISCOVERY

Cyber Security Technologies

Networking Technology

Sage Data Security Services Directory

Bachelor Business Engineering Technology (Hons) in Networking System (BNS)

The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Information Technology

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

THE POWER OF TECH-SAVVY BOARDS:

CyberSecurity Apprenticeships

Secure Systems Administration and Engineering

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Developing Career-Relevant Academic Programs

CYBER SECURITY TRAINING

CompTIA Cybersecurity Analyst+

Cyber Security School

School of Engineering & Built Environment

Researching New Ways to Build a Cybersecurity Workforce

ENGINEERING AND TECHNOLOGY MANAGEMENT

Developing the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO

Accounting Ethics and Auditing

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

Certified Cyber Security Analyst VS-1160

Computer Information Science xxx

Manufacturing Cybersecurity Cooperative Overview

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Networking Fundamentals Training

Cybersecurity Job Seekers

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

DoD Directive (DoDD) 8570 & GIAC Certification

Building the IA Workforce

Certification and Career Guide

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

MN CYBER STATEWIDE INSTITUTE FOR CYBERSECURITY, FORENSICS, AND IOT

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary

Open Cloud Academy: Cyber Security Learning Track. Deborah Carter August, 2016

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION

Aligning Academic Supply and Industry Demand

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT

GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT

Application for Certification

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Department of Management Services REQUEST FOR INFORMATION

Computer Science & IT

Cyber Range Buyers Guide for Fortune 1000 Security Operations

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Current skills gap for capable CTI analysts: Training for forensics & analysis

Cyber Risks in the Boardroom Conference

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

Certified Manager Certification

Bachelor of Applied Science Degree IT NETWORKING

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Networking Technology. Associate in Applied Science Networking Fundamentals Diploma Cisco Networking Certificate Network Security Certificate

What can I do with a major in Computer Science?

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

The premier internationally recognized certification in Facility management

Transcription:

Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent

Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical over applied knowledge Lack of real-world skills 95% of security incidents involve human error Threat Proliferation Outpacing ability to respond Increasing Risk Increasing data breaches Increasing vulnerabilities Undervalued in the organization C-suite understanding remains weak Rarely has something been so important and so talked about with less clarity and less understanding Talent Crisis Severe shortage of skills 97% of Fortune 500 companies have been hacked. The other 3% have too, they just don t know it 240,000 open positions in 12 months 91% increase in 5 years (2010-2014)

A systems approach is needed Cyber Human Capital Management Strategy Talent Lifecycle Training & Development Community Resources & Thought Leadership CT SOLUTIONS CT SOLUTIONS CT SOLUTIONS CT INITIATIVES Strategy Consulting VetSuccess Academies Technical Training Collaboratives Organization Design Women s Academies Management Training Summits CT Career Mapping Skills and Aptitude Assessments Onboarding & Retention Strategy White Papers Community Investment

VetSuccess Immersion Academy Fast Track: Three steps to a cybersecurity career Qualify Take the qualifying exam, complete the application process, and interview with the admissions committee. Train & Certify Develop practical, hands-on skills by completing world-class SANS training courses. Two and three course programs available. Earn GIAC certifications, recognized by employers around the world. Employ Earn a guaranteed employment opportunity at Sponsored Academies (agreed to an anticipated minimum two-year term), or seek multiple nonguaranteed opportunities at Open Academies.

Graduate Profile to Date 18United States Veterans 13 US Air Force 3 US Army 1 US Marines 1 US Navy Security Clearances Experience 16 years average in Information Technology 9 years average in Cybersecurity SECRET TOP SECRET TS/SCI TS/SCI with CI Polygraph 50 Additional Candidates currently in the program Education Master s Degrees Systems Technology Management Information Systems Business Administration Bachelor s Degrees Information Technology Management Network Security Computer and Information Science B.S. in Cybersecurity Criminal Justice Multimedia Computer Information Systems Associate Degrees Environmental Systems Technology Electronic Systems Technology

Immediate impact, Hands-on skills Skills Mismatch Emphasis on theory over practice Education focus on theoretical over applied knowledge Lack of real-world skills 95% of security incidents involve human error Talent Crisis Severe shortage of skills 240,000 open positions in 12 months 91% increase in 5 years (2010-2014) The relevance of the hands-on labs and exercises was clearly evident as we applied the skills we learned to real and recent scenarios from the security community... This instruction was as close to front line operations as one can get without being in a production work center. Edmond Russell Academy graduate, recently hired by Solutionary

Joseph Robbins without the Academy I d have finished my degree and would still be looking for a job. Instead, everything worked out and I m right where I want to be Currently Web Security Engineer at ISHPI Military US Air Force 24 years active duty, Master Sergeant, retired Special Duty - Defense Information Systems Agency, Fort Meade. Electronics Technology - radio systems repair, Air traffic control systems, etc. Education Bachelor s in Computer Science, U MD, 3.9GPA Master s in Cyber, U of MD 4.0 GPA Certifications Security Essentials Intrusion Analyst Incident Handler EC council Hacking for Forensics SANS VetSuccess Video: https://www.youtube.com/watch?v=a8pywaocxce&rel=0 On Academy Training SANS gave me the practical hands-on experience. My master s degree didn t teach me what I had to do. It was theory - papers, research, policy. Employers want the certs and real-world experience. At Home I run my own servers, and have a Pen Testing Lab I built myself What s Next I m signing up for my next SANS course - Web App Pen Testing.

Women: Building a diverse industry Academy Goals Provide educational opportunities to women interested in cybersecurity fields Increase gender diversity in the information security work force Meet needs of critical national infrastructure firms, industry, law enforcement, and intelligence agencies Match talented, employment-ready women with top cybersecurity employers

Women: Building a diverse industry Recruiting: Partnership with the National Center For Women in Information Technology (NCWIT) 300 inquiries with 200 qualified candidates taking the Aptitude Exam 90 high scoring candidates identified and invited to submit resumes and transcripts 19 candidates participating in the initial cohorts at three SANS conferences in May and June Curriculum: SEC 401 & GSEC will be taken live as a cohort at three SANS events in May and June SEC 504 and & GCIH taken on demand after 401 is completed A third optional elective will be offered to successful candidates as well Employment: Graduates will be matched with prospective employers. We are currently looking for additional employers to participate as well as to be named sponsors of the program

Free Demo: sans.org/cybertalent/free-demo CyberTalent Assessments Essential tools to assess and develop talent APTITUDE CYBER DEFENSE PENETRATION TESTING APPLICATION SECURITY DIGITAL FORENSICS Measures technical aptitude Information Security Foundations Penetration Testing Fundamentals Web application attacks & architecture security Digital Forensics Foundations Provides predictability for likelihood for success in cybersecurity Cornerstone Information Security Advanced Information Security Principles Cornerstone Penetration Testing Advanced Penetration Testing Principles Web technologies & service Cornerstone Digital Forensics Advanced Digital Forensics Principles

Assessments: How they help Increase Hiring Success Improve Training ROI Identify candidates with high likelihood of success in cybersecurity Performance on SANS CTE assessments shows strong positive correlation with performance on GIAC exams. (limited sample size) Benchmark your team. Map strengths and areas of development to manage talent as a portfolio Develop personal training plans. Eliminate wasted and misaligned training costs Work from simple, easy to use web-based reporting Ensure Contractor Expertise Simple, reliable, cost-effective way to confirm contractors skills

Top talent, in one place, with one click Pre-Screened Applicants Cost-effective Recruiting & Hiring Access to SANS CyberTalent Assessments provided to all job seekers Innovative virtual format includes dynamic chat with viewable profiles and resumes, and next steps mechanisms to facilitate follow-up emails, interviews, etc.

Search, assess, find the talent you need A simple, easy to use database resource that helps employers search, assess, and find top talent faster and for less cost Connects individuals with cybersecurity experience to employers in the information security industry Initial emphasis on transitioning veterans with skills and experience in cybersecurity SANS CTE = Better Data = Better Connection SANS CyberTalent Enhanced (CTE) offered to all members of the CyberTalent Connection database Provides employers with improved data and insights available only through CyberTalent Connection Working with new placement firm partner NinjaJobs on additional applications for the data base

Contact Max Shuftan:mshuftan@sans.org Jim Michaud: jmichaud@sans.org Web: sans.org/cybertalent