SlideShare a Scribd company logo
1 of 10
Download to read offline
Cybersecurity in
South Carolina
MG Les Eisner (USA, Ret.)
Deputy Director
USC Office of Economic Engagement
“56 million accounts at risk in
Home Depot hack”
- CBS News, Sep. 28, 2014“Target: 40 million credit cards compromised”
- CNN Money, Dec. 19, 2013
“Anthem: Hacked Database
Included 78.8 Million People”
- Wall Street Journal, Feb. 24, 2015
“Hacks of OPM databases
compromised 22.1 million people, federal authorities say”
- Washington Post, July 9, 2015
“South Carolina reveals massive data breach of
Social Security Numbers, credit cards”
- InfoWorld, October 29, 2012
“Fiat Chrysler recalls 1.4 million
cars after Jeep hack”
-BBC News, July 24, 2015
• Information security spending was $71.1 billion in 2014
• Federal government is allocating $14 billion for cybersecurity in 2016
• In the US, there are 209,000 unfilled cybersecurity jobs
• SC alone has 2,300 open cybersecurity jobs – up 134% since 2010
• Cybersecurity jobs take 8% longer to fill annd pay 9% more on average
• Salary range for a CISSP was $109,000 to $154,00
There were 60,000 open positions for only 55,000 CISSP holders
Opportunities
TALENT TECHNOLOGY COMMITMENT
WHAT WE NEED
• Incorporation of security education and activities at the K-12 level
• Coursework and programs at college and universities
• New programs and additions to technical college programs
• Credentialing (CEH, CISSP, etc.), and professional development
TALENT
• University-based research and development
• Startup and small-business support and technology assistance
• Programs to support rapid transition of new technologies to industry
TECHNOLOGY
• Education of executives and senior government officials
• Understanding of the threat landscape and development of a security mindset
• Allocation of sufficient resources to protect critical infrastructure
• Outreach to the public and small/medium businesses on security issues
COMMITMENT
THE PATH FORWARD
Strengthen collaboration among cybersecurity stakeholders in SC
Expand education and training opportunities at all levels
Build world-class research and development capabilities
Foster the creation and retention of home-grown technologies
Grow awareness of the threats and build a culture of security

More Related Content

Similar to Cybersecurity in South Carolina - Major General Les Eisner

BSides Manchester
BSides ManchesterBSides Manchester
BSides Manchester
Jane Frankland
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
 
The Global Economic Security Strategy (GESS) Public Version
 The Global Economic Security Strategy (GESS)  Public Version The Global Economic Security Strategy (GESS)  Public Version
The Global Economic Security Strategy (GESS) Public Version
Keith Krach
 

Similar to Cybersecurity in South Carolina - Major General Les Eisner (20)

BSides Manchester
BSides ManchesterBSides Manchester
BSides Manchester
 
Massachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemMassachusetts Cyber Security Ecosystem
Massachusetts Cyber Security Ecosystem
 
WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair Handbook
 
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
COBNewsletterFeb15
COBNewsletterFeb15COBNewsletterFeb15
COBNewsletterFeb15
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North America
 
Bhef almaden 20131122 v1
Bhef almaden 20131122 v1Bhef almaden 20131122 v1
Bhef almaden 20131122 v1
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptx
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
File Mn Ti E 120939s34m1212132009
File Mn Ti E 120939s34m1212132009File Mn Ti E 120939s34m1212132009
File Mn Ti E 120939s34m1212132009
 
File Mn Ti E 120939s34m1212132009
File Mn Ti E 120939s34m1212132009File Mn Ti E 120939s34m1212132009
File Mn Ti E 120939s34m1212132009
 
The Global Economic Security Strategy (GESS) Public Version
 The Global Economic Security Strategy (GESS)  Public Version The Global Economic Security Strategy (GESS)  Public Version
The Global Economic Security Strategy (GESS) Public Version
 
Rural Info Tech Alliance: Growing and Keeping IT Talent
Rural Info Tech Alliance: Growing and Keeping IT TalentRural Info Tech Alliance: Growing and Keeping IT Talent
Rural Info Tech Alliance: Growing and Keeping IT Talent
 
Forecast and Outlook for big tech, privacy legislation, green tech and climat...
Forecast and Outlook for big tech, privacy legislation, green tech and climat...Forecast and Outlook for big tech, privacy legislation, green tech and climat...
Forecast and Outlook for big tech, privacy legislation, green tech and climat...
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber security
 
Ken Cochrane - Reading the Signals and Preparing for the Future
Ken Cochrane - Reading the Signals and Preparing for the FutureKen Cochrane - Reading the Signals and Preparing for the Future
Ken Cochrane - Reading the Signals and Preparing for the Future
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016
 

More from IT-oLogy

IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy
 
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy
 

More from IT-oLogy (20)

Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockLow Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De Block
 
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
 
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserNational Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett Coco
 
Open Security - Chad Cravens
Open Security - Chad CravensOpen Security - Chad Cravens
Open Security - Chad Cravens
 
Live Exploit - Chad Cravens
Live Exploit - Chad CravensLive Exploit - Chad Cravens
Live Exploit - Chad Cravens
 
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsSoftware Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce Jenkins
 
In the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim SalterIn the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim Salter
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Cybersecurity in South Carolina - Major General Les Eisner

  • 1. Cybersecurity in South Carolina MG Les Eisner (USA, Ret.) Deputy Director USC Office of Economic Engagement
  • 2.
  • 3. “56 million accounts at risk in Home Depot hack” - CBS News, Sep. 28, 2014“Target: 40 million credit cards compromised” - CNN Money, Dec. 19, 2013 “Anthem: Hacked Database Included 78.8 Million People” - Wall Street Journal, Feb. 24, 2015 “Hacks of OPM databases compromised 22.1 million people, federal authorities say” - Washington Post, July 9, 2015 “South Carolina reveals massive data breach of Social Security Numbers, credit cards” - InfoWorld, October 29, 2012 “Fiat Chrysler recalls 1.4 million cars after Jeep hack” -BBC News, July 24, 2015
  • 4.
  • 5. • Information security spending was $71.1 billion in 2014 • Federal government is allocating $14 billion for cybersecurity in 2016 • In the US, there are 209,000 unfilled cybersecurity jobs • SC alone has 2,300 open cybersecurity jobs – up 134% since 2010 • Cybersecurity jobs take 8% longer to fill annd pay 9% more on average • Salary range for a CISSP was $109,000 to $154,00 There were 60,000 open positions for only 55,000 CISSP holders Opportunities
  • 7. • Incorporation of security education and activities at the K-12 level • Coursework and programs at college and universities • New programs and additions to technical college programs • Credentialing (CEH, CISSP, etc.), and professional development TALENT
  • 8. • University-based research and development • Startup and small-business support and technology assistance • Programs to support rapid transition of new technologies to industry TECHNOLOGY
  • 9. • Education of executives and senior government officials • Understanding of the threat landscape and development of a security mindset • Allocation of sufficient resources to protect critical infrastructure • Outreach to the public and small/medium businesses on security issues COMMITMENT
  • 10. THE PATH FORWARD Strengthen collaboration among cybersecurity stakeholders in SC Expand education and training opportunities at all levels Build world-class research and development capabilities Foster the creation and retention of home-grown technologies Grow awareness of the threats and build a culture of security