Opening Doors to Cyber and Homeland Security Careers

Similar documents
G7 Bar Associations and Councils

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Security in Today s Insecure World for SecureTokyo

Cybersecurity and Hospitals: A Board Perspective

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

Collaboration on Cybersecurity program between California University and Shippensburg University

Cybersecurity in Higher Ed

Building the Cybersecurity Workforce. November 2017

Media Kit. California Cybersecurity Institute

Department of Homeland Security Updates

Cybersecurity Risk Management:

The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Security and Privacy Governance Program Guidelines

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

An Overview of DHS s Role and Missions. James McCament Chief of Legislative Affairs, USCIS

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Defending Our Digital Density.

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Cyber COBIT. Ophir Zilbiger, CEO SECOZ Shay Zandani, CEO CyberARM. December 2013

TRIAEM LLC Corporate Capabilities Briefing

Bad Idea: Creating a U.S. Department of Cybersecurity

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CYBERSECURITY. Protecting Against the Financial, Regulatory and Reputational Impacts of Cyber Attack

Speakers. Shellie Zavatsky Director of Internal Audit at Hurley Medical Center. Trent Long Director of Managed Privacy Services at FairWarning, Inc

Anatomy of a Data Breach: A Practical Guide for Small Law Departments

CYBERSECURITY: Scholarship and Job Opportunities

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Cyber Attacks & Breaches It s not if, it s When

Cybersecurity Job Seekers

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

Cyber Security Roadmap

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Homeland Security Graduate Programs

THE POWER OF TECH-SAVVY BOARDS:

The UK s National Cyber Security Strategy

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

U.S. Army Cyber Center of Excellence and Fort Gordon

SOUTH DAKOTA BOARD OF REGENTS. Budget and Finance ******************************************************************************

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

CYBER SOLUTIONS & THREAT INTELLIGENCE

Cybersecurity Overview

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m.

PECB UNIVERSITY PECB UNIVERSITY

UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Commonwealth Cyber Declaration

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Breaking Out the Cybersecurity Workforce Framework

Security Takes Center Stage

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

ISACA West Florida Chapter - Cybersecurity Event

Adversary Playbooks. An Approach to Disrupting Malicious Actors and Activity

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment

Teaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cyber Resilience. Think18. Felicity March IBM Corporation

ISACA 2017 OVERVIEW. 3º Fórum IBGP de Tecnologias da Informação. Paulo Henrique Abreu Moreira. Brasília Chapter Associate & CSX Director 08/11/2017

Barbara Ciaramitaro, lead professor of IT and cyber security at Walsh College in Troy

Cyber (In)Security. What Business Leaders Need To Know. Roy Luebke Innovation and Growth Consultant. Presented by:

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Building a Threat Intelligence Program

Building the IA Workforce

The Widening Talent Gap: The greatest security challenge of our time

Understanding the Changing Cybersecurity Problem

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

The Value of Bipartisanship

Your Challenge. Our Priority.

The NIST Cybersecurity Framework

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

MN CYBER STATEWIDE INSTITUTE FOR CYBERSECURITY, FORENSICS, AND IOT

Statement for the Record

Awareness as a Cyber Security Vulnerability. Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

California Cybersecurity Integration Center (Cal-CSIC)

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

FOR FINANCIAL SERVICES ORGANIZATIONS

PIONEER TRAINING INSTITUTE

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

Shaping the Future of Cybersecurity Education

SOC for cybersecurity

Transcription:

Opening Doors to Cyber and Homeland Security Careers

Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy and Information Management, The George Washington University College of Professional Studies Connie Peterson Uthoff Professor and Assistant Program Director, Cybersecurity Strategy and Information Management, The George Washington University College of Professional Studies

Agenda Overview of the security career landscape Where are the jobs? What types of positions are available? What are the gaps in skills? What role does training play in success?

George Washington University Chartered in 1821 by Congress on behalf of George Washington 270,000 alumni worldwide Top provider of Peace Corps volunteers 31% enter government, education or nonprofit 10 alumni in 114 th U.S. Congress 60 Fulbright scholars on faculty 5 Supreme Court Justices served on GW Law faculty

College of Professional Studies GWU is designated by NSA and DHS as a Federal Center for Academic Excellence in Information Assurance Research Empowering working professionals Practical knowledge, flexible, innovative learning environment Meet emerging workforce needs for public sector professionals

Where are the opportunities?

Government Is a Major Employer The Department of Homeland Security itself employs 230,000 people. At least 1,000 homeland security openings per year (usajobs.opm.gov/homeland.asp) in many fields: Law Enforcement (ICE, CBP, USSS, FPS, FLETC) Immigration and Travel Security (TSA, CIS) Prevention and Response (FEMA, Coast Guards) Mission Support (federal, state, local)

Workforce Diversity Women 25% of IT Workforce 8-13% of cybersecurity workforce Hispanics 6.4% of IT workforce 5% of cybersecurity workforce African Americans 8.3% of IT workforce 7% of cybersecurity workforce Source: NIST Panel on Diversity in Cybersecurity, 2013.

Range of Cyber Attacks, Sophistication and Cost Critical Area of Concern, Varied Training and Education Needed to Prepare For Future Snowden Target Some Breaches and Cost - Snapshot Motivation: Ideology Actor: Insider, US Loss: 1.7 million documents Estimated Cost: billions of dollar cost Other Implications: US Reputation, Diplomatic Strain, Breach of Trust, Compromise to US National Security Motivation: Theft, Money Actor: Cyber Criminals Loss: Data breach 70 million Estimated Cost: $ 67 million + Other: CEO, CTO, Executive Board, Stock drop, Loss of Consumer Confidence, Class Action Law Suit Sony Motivation: Cyber Vandalism Actor: North Korea (Nation State) Loss: Movie release, 47,000 SSN Estimated Cost: $15 million dollars Other: Censoring Ourselves Obama. Sanctions on North Korea Office of Personnel Management Motivation: Theft, Espionage Actor: Chinese State Sponsored Loss: @ 22 million compromised Estimated Cost: Taxpayer $350 million Other: National Security, Individual Security, Removal of Leadership Katherine Archuleta, Director

Gaps in workforce skill and knowledge Lack of focused, coherent, and applied education that tackle current and emerging cybersecurity threats. Shortcomings related to risk assessment, implementation and testing of security controls. Need to improve detection, response, and mitigation of cybersecurity incidents. Expand capability to investigate cybersecurity incidents. Source: Government Accountability Office 2013

Addressing the Gaps Policy - Strategies - Assessment - Law & Policy - Design / architecture - Performance analysis Info Security Requirements - Incident response - Forensic - IA practices - Standards and norms - Data center best practices Info System Requirements Practice

Security & Safety Leadership Learning Model National/International Coordination and Harmonization Comparative Approach Tactical Operational Leadership Tactical & operational standards at international and national levels Tactical & operational practices at regional and local levels Critical thinking on international and national security and safety issues Analytical approach on regional and local security and safety issues Strategic Visionnary Leadership Implementation and Management Understand causes and consequences Local/Regional

Training Exploring the Need Cybersecurity Workforce Framework Cybersecurity profession is maturing and growing Diverse sectors: retail, healthcare, manufacturing, and energy all depend on the security and reliability of cyberspace Scale, Sophistication and Cost of Attack increasing Impact to organizations growing: Financial, Reputation, Market Value, Client Impact Board Members, CEOs Changing responsibilities Needed Robust, skilled workforce that can deal with growing national concern Flexible training to meet organizational needs.

Preparing Future Workforce Flexible Response Preparing Future Workforce Flexible Response Variety of attacks coupled with the growing and varied demands within the cyber workforce calls for training and/or education that fits the environment. One model to address this challenge: Customized training to fill a specific need or gap Some Models from George Washington University Cyber Academy Recent Scenario Training Cyber Warfare CISSP and other certification training SCADA, ICS training Structured Cyber Intelligence

Educational Offerings Bachelor s in Cybersecurity Certificate 1: Protection and Defense of Computer Networks Non-technical bachelor s degree or associate s degree State of the art protection technologies Certificate 2: Cyber Attacks and Cyber Threats Analysis Highly specialized review and evaluation of cybersecurity attacks and breaches Certificate 3: Investigation of Cyber Security Incidents Investigation and analysis of cybersecurity incidents Collection of digital evidence for analysis

Educational Offerings Master of Professional Studies in Cybersecurity Strategy and Information Management Arlington/Ashburn and Hampton Roads, VA Play video https://www.youtube.com/watch?v=wbqyiprorgg&feature=player_embe dded

Educational Offerings Master of Professional Studies in Security and Safety Leadership Arlington/Ashburn and Hampton Roads, VA Counter-terrorism Intelligence analysis Emerging security threats Relevant legislation Online or through evening classes in Arlington, VA and Hampton Roads, VA

Recent Publication Features leaders in the field and GW Faculty Main Themes: Conflicts in Cyber Space Geopolitics of Cyber Conflicts Defense Strategy and Practice Cyber Intelligence and Information Security

GET IN TOUCH Frederic Lemieux, Ph.D. 703-248-6210 flemieux@gwu.edu cps@gwu.edu Facebook.com/CPSGW Connie Peterson Uthoff 301-675-9905 cuthoff@gwu.edu @GWCPS www.cps.gwu.edu