Advancing Women in Cyber Security Careers - A National Priority

461 views
276 views

Published on

Cybersecurity is a critical area of IT and one of the five national security priorities for the US department of Homeland security. Despite the critical nature of this field, women continue to be greatly underrepresented in cyber security fields. It is a national priority to have a diverse and well trained workforce to secure cyberspace. This workshop will examine required skills, success factors, opportunities, and challenges in cyber security careers.
Outcomes: Increase professional awareness and career advancement
At the end of the workshop, participants will be able to:
a. Identify required skills and areas in cyber security careers
b. Opportunities and challenges for women in Cyber security careers
c. Examine critical success factors
d. Connect with other successful cyber security professionals
e. Explore progress and best practices for 2013 in Cyberspace

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
461
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Welcome everyone to the sessionIntroduce myself as the moderatorTo explore this topic We are fortunate today to have 3 panelist Let me introduce Panelist 1, panelist 2, panelist 3
  • First, I’d like for everyone to reach the same level of understanding of why we desperately as a nation, need to advance women in Cybersecurity careers. We all know that malicious people will use malicious software to gain entry into your systems. The above is a number of the unique malware instances that are newly introduced into the world via the internet. Since 2000 the number of malicious programs have grown exponentially.What’s worse is that the number of malicious programs are appearing on average of a new one every second. The last column is where we are as of mid-May 2013. We’ll exceed last year’s number easily.This isn’t good!
  • All information is worth something to someone.State Sponsored cyber-attacksTo gain an advantage, countries will forge a cyber attack to collect military secrets or steal IP Terrorist GroupsWho want to make a political statement, instill fear or cause harm or even cause a disruption in financial networks will wage an attackOrganized CrimeWill sell stolen IP, use extortion tactics or steal personal or business information.Skilled HackerIs motivated by the thrill of the hunt – rewarded by hacking into difficult to access-high profile sites, stealing financial or personal information or doing a mischievous prankSpeaking of mischievous hacking…
  • I wanted to show you 2 – 45 second videos which will shock you on the new ways that cyber criminals can affect your life.The first is an example of a mischievous prank where the hacker gets notoriety for his accomplishmentsThe second is pretty scary – where the hackers ill-behaved prank could, in the right scenario, turn deadly.
  • So you may ask – Are things really that bad? Well – you be the judgeWith over 95% of business last year enduring some type of cyber attack one could say we need more help in this area.There are new viruses being introduced to the internet at a rate of 1 per second. By the end of this 75 minute session there will have been 4,500 new viruses introduced to the internet.Some of the viruses will target your mobile deviceAs you can imagine our scanners have a tough time keeping up. Per ??? They are only 20-30% effective – which is better than nothing.So to keep up the good fight, we need to conquer by numbers. We need more people to become a part of this field
  • Major goals designed to help secure the United States in cyberspace:
  • The Bad and disappointing newsIn 2009, SUNY (State University of New York) Buffalo released a report noting that women represent a mere 13 percent of the overall workforce in the cyber-security field — despite the fact that they make up more than half of the overall American workforce.  The Good NewsAccording to the U.S. Bureau of Labor Statistics, the field of Information Security is predicted to grow faster than average over the next decade — 22 percent faster, in fact. Not only are job opportunities abundant, given the growth of cybercrime and the need for trained professionals to protect increasingly complex networks in both the government and private sectors, but the pay is above average: According to the BLS, the average annual salary in the field is more than $75,000, with management earning well into the six figures.For women, the news is even better: Cybersecurity is one of the few fields in which the gender pay gap has been all but eliminated. While in some fields, women only earn about 77 cents to each dollar earned by men, the average difference between the pay for men and women in cybersecurity is only about $2,000. In management roles, women and men earn the same annual salaries.The not so uglyA number of schools and security firms have developed programs and initiatives designed to encourage women to enter the field — a field that is ripe with opportunity for everyone.
  • Now that we’ve level set – you can see the importance of advancing women’s careers in Cyber-security. We need every mind that would have an interest for this line of important work to solve these complex problems and defend us from these varying cyber threats.As the panelists discuss this topic today, I’d like you to imagine yourself in the place of this silhouette
  • We’ve heard today from out panelists of experts as to why it is so important to promote women in Cyber-security.
  • Advancing Women in Cyber Security Careers - A National Priority

    1. 1. October 17–19, 2013 ADVANCING WOMEN IN CYBER-SECURITY CAREERS A NATIONAL PRIORITY
    2. 2. Introductions • Moderator - ??? • Panelist 1 – Pamela J. Jones Lead Software Engineer, Northrop Grumman • Panelist 2 • Panelist 3 -
    3. 3. The growth of Cyber Threats Source: AVTEst.org sample collection through May, 2013
    4. 4. All information is worth something to someone State Sponsored Terrorist Groups Organized Crime Skilled Hacker
    5. 5. New Cyber attack threats You tube on car hacking http://www.youtube.com/watch?v=oqe6S6m73Zw You tube on hacking a traffic sign http://www.youtube.com/watch?v=32JgSJYpL8o
    6. 6. What’s at stake National Security Transportation Power Grid Personal Safety Financial Systems Manufacturing
    7. 7. Are things REALLY that desperate? • 93% of large organizations and 87% of small businesses were hit by cyber attacks • 31% of all targeted attacks were aimed at small businesses – less than 250 employees – Symantec • 32% of all mobile threats steal information • Vulnerability scanners are deficient at handling new attacks and have an effectiveness rate of 20 – 30%
    8. 8. Comprehensive National Cyber-security Initiative (CNCI) To establish a front line of defense against today’s immediate threats: by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government. To defend against the full spectrum of threats: by enhancing U.S. counterintelligence capabilities and increasing the security of the supply chain for key information technologies. To strengthen the future cyber-security environment: by expanding cyber education; coordinating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.
    9. 9. Why Women in Cyber-Security • The Bad • The Good • The not so ugly
    10. 10. What can we surmise Major Conclusions: • The Nation’s digital infrastructure is neither secure nor resilient • The Federal government is not organized to address cyber-security effectively now or in the future • Information and communications networks are largely owned and operated by the private sector • The general public is not aware of the threats and risks involved • Investment in cyber-security R&D is currently lacking
    11. 11. Here’s to Advancing Women’s Careers in Cyber-security
    12. 12. Wrapping Up I want you to consider a Cyber-Security career! copyright 2013 Pamela J. Jones

    ×