SlideShare a Scribd company logo
1 of 21
Class 1: Motivation to Study
Information Security Management
Why study info sec management?
1. If you’re good, you can make a difference in
   peoples lives

2. There is money to be made

3. Congress and the country looks to InfoSec
   leaders to write policy
If you’re good, you can make a
        difference in peoples lives
• Rick Rescorla – Chief Security Officer for
  Morgan Stanley
  – Evacuated 2,700 people from 22 floors of WTC

• His ability to see risk and create plans to
  mitigate that risk is the essential skill needed
  to excel in this profession

    • Piss Poor Planning Promotes Piss Poor
                   Performance
There is money to be made
• Highest Paid Professions in computer security
  industry:

  – Chief Information Officer
  – Chief Technology Officer


• What’s the difference?
CIO Duties
  CIO’s role mandated
  by legislation

  CIO’s must be held
  accountable for these
  business operations




http://www.govloop.com/profiles/b
logs/the-roles-of-cios-and-ctos
CTO Duties
CTO role is still evolving
and therefore adaptable to
changing technologies

If you want a executive
officer aiding your
company, employ a CTO,
not a CIO




http://www.govloop.com/profiles/blogs/the-roles-of-cios-and-ctos
CIO & CTO often work together




http://www.govloop.com/profiles/blogs/the-roles-of-cios-and-ctos
How much do they make?
            Who are they?
• Pay attention to the next 7 slides

• Note similarities, differences, and things you
  find interesting
John Tracy
• CTO Boeing
• 2010 compensation $3.6 million




    •Undergrad School: CSU Dominguez Hills - Physics
    •Master’s: CSULA – Physics
    •PhD: UC Irvine - Engineering
Lori Beer
• CTO WellPoint
• 2010 compensation $4.5 million




   •Undergrad School: University of Dayton
   •Undergrad Major: Computer Science
Bill Chenevich
• CIO US Bancorp
• 2010 compensation $4.4 million




•Undergrad School: City College of New York
•MBA: City University of New York
Thomas Stephens
• CTO General Motors
• 2010 compensation $5.6 million




   •Undergrad School: University of Michigan
   •Undergrad Major: Mechanical Engineering
Rob Carter
• CIO FedEx
• 2010 compensation $3.6 million




   •Undergrad School: University of Florida
   •Undergrad Major: Computer and Information Science
David Thompson
• CIO Symantec
• 2010 compensation $1.9 million




   •Undergrad School: Marymount University
   •Undergrad Major: Business administration, management & operations
Tim Sullivan
• CIO SunTrust Banks
• 2010 compensation $2.1 million




•Undergrad School: Unioversity of Illinois
•Undergrad Major: BA Economics
What did you notice?
Although these executives undoubtedly
  understand technologies surrounding
  computer security…

… they have mastered management and division
  operations with corporations.

Point: to reach their level, you need infosec
  management.
Congress looks to InfoSec leaders to
      help write federal policy
• Energy & Commerce Committee
  – Communications & Technology Subcommittee
    • Jurisdiction: Interstate and foreign telecommunications
      and information transmission by broadcast, radio, wire,
      microwave, satellite and, Homeland security-related
      aspects of the foregoing, including cybersecurity.
InfoSec professionals advise
           Congressional members
• Feb. 8: Cybersecurity: Threats to Communications Networks and
  Private-Sector Responses
   – http://democrats.energycommerce.house.gov/index.php?q=hearing/c
     ommunications-technology-subcommittee-hearing-on-cybersecurity-
     threats-to-communications-ne
• March 7: Cybersecurity: The Pivotal Role of Communications
  Networks
   – http://democrats.energycommerce.house.gov/index.php?q=hearing/c
     ommunications-and-technology-subcommittee-hearing-on-
     cybersecurity-communications-networks
• March 28: Cybersecurity: Threats to Communications Networks and
  Public-Sector Responses
   – http://democrats.energycommerce.house.gov/index.php?q=hearing/c
     ommunications-technology-subcommittee-hearing-on-cybersecurity-
     threats-to-communications--0
Assignment: due next class
• Watch the rest of the posted Congressional
  Hearing
  – If you prefer text over video, look through the
    transcripts of the videos found in links posted on
    previous slide
• Come to class ready to discuss
  – Bring facts, ideas, you found interesting
  – Try to answer the question: how are these particular
    speakers chosen to testify?
  – Bring questions you have
• Read through chapter 1

More Related Content

What's hot

Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
sappingtonkr
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
manpreet04
 
C&IS Manager Presentation (1)
C&IS Manager Presentation (1)C&IS Manager Presentation (1)
C&IS Manager Presentation (1)
Jeffrey Fiermen
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
Hassan Nasir
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
university of education,Lahore
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
Prof. Othman Alsalloum
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
Wish Mrt'xa
 

What's hot (19)

Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Ict
IctIct
Ict
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Usage Of Ict In Every Day Life
Usage Of Ict In Every Day LifeUsage Of Ict In Every Day Life
Usage Of Ict In Every Day Life
 
Chapter4 issues with ict2016
Chapter4 issues with ict2016Chapter4 issues with ict2016
Chapter4 issues with ict2016
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
C&IS Manager Presentation (1)
C&IS Manager Presentation (1)C&IS Manager Presentation (1)
C&IS Manager Presentation (1)
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of things
 

Viewers also liked

Ementa Restaurante Naturwaterpark
Ementa Restaurante NaturwaterparkEmenta Restaurante Naturwaterpark
Ementa Restaurante Naturwaterpark
naturwaterpark
 
Storyboard pitch of advertisement
Storyboard pitch of advertisementStoryboard pitch of advertisement
Storyboard pitch of advertisement
ingrid_dv
 

Viewers also liked (19)

Ementa Restaurante Naturwaterpark
Ementa Restaurante NaturwaterparkEmenta Restaurante Naturwaterpark
Ementa Restaurante Naturwaterpark
 
Hipaa
HipaaHipaa
Hipaa
 
Task compilation - Differential Equation II
Task compilation - Differential Equation IITask compilation - Differential Equation II
Task compilation - Differential Equation II
 
Representation
RepresentationRepresentation
Representation
 
Storyboard pitch of advertisement
Storyboard pitch of advertisementStoryboard pitch of advertisement
Storyboard pitch of advertisement
 
Erp and saas
Erp and saasErp and saas
Erp and saas
 
Lesson plan of experimental and control class
Lesson plan of experimental and control classLesson plan of experimental and control class
Lesson plan of experimental and control class
 
Professionalism in Education
Professionalism in EducationProfessionalism in Education
Professionalism in Education
 
Creating Learning Environment
Creating Learning EnvironmentCreating Learning Environment
Creating Learning Environment
 
Creating learning environment
Creating learning environmentCreating learning environment
Creating learning environment
 
RPP Suku Banyak
RPP Suku BanyakRPP Suku Banyak
RPP Suku Banyak
 
Bisection and fixed point method
Bisection and fixed point methodBisection and fixed point method
Bisection and fixed point method
 
Case Study Praktiker
Case Study PraktikerCase Study Praktiker
Case Study Praktiker
 
Responsive Email Templates
Responsive Email TemplatesResponsive Email Templates
Responsive Email Templates
 
Publishingo
PublishingoPublishingo
Publishingo
 
Sendingo / Technologie, Bezpieczeństwo i Case Studies
Sendingo / Technologie, Bezpieczeństwo i Case StudiesSendingo / Technologie, Bezpieczeństwo i Case Studies
Sendingo / Technologie, Bezpieczeństwo i Case Studies
 
Pozyskiwanie i utrzymanie klienta, a profesjonalny e-mail marketing
Pozyskiwanie i utrzymanie klienta, a profesjonalny e-mail marketingPozyskiwanie i utrzymanie klienta, a profesjonalny e-mail marketing
Pozyskiwanie i utrzymanie klienta, a profesjonalny e-mail marketing
 
eMail Marketing - Pokaz Sendingo i przykłady rzeczywistych rezultatów
eMail Marketing - Pokaz Sendingo i przykłady rzeczywistych rezultatóweMail Marketing - Pokaz Sendingo i przykłady rzeczywistych rezultatów
eMail Marketing - Pokaz Sendingo i przykłady rzeczywistych rezultatów
 
Realism philosophy
Realism philosophyRealism philosophy
Realism philosophy
 

Similar to Class 1 motivation

2016.02.25 CSUSM BlairBakerCO
2016.02.25 CSUSM BlairBakerCO2016.02.25 CSUSM BlairBakerCO
2016.02.25 CSUSM BlairBakerCO
blairbaker008
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
TBledsoe
 
Discussion 1 Anthony KelleyContains unread postsAnthony Kelle.docx
Discussion 1 Anthony KelleyContains unread postsAnthony Kelle.docxDiscussion 1 Anthony KelleyContains unread postsAnthony Kelle.docx
Discussion 1 Anthony KelleyContains unread postsAnthony Kelle.docx
duketjoy27252
 
Computer Application in Business Group Presentation
Computer Application in Business Group PresentationComputer Application in Business Group Presentation
Computer Application in Business Group Presentation
2023210000518
 
Essay On Women In Information Technology
Essay On Women In Information TechnologyEssay On Women In Information Technology
Essay On Women In Information Technology
Jessica Cannella
 

Similar to Class 1 motivation (20)

Explore BICT Presentation
Explore BICT PresentationExplore BICT Presentation
Explore BICT Presentation
 
Fall forum
Fall forumFall forum
Fall forum
 
2016.02.25 CSUSM BlairBakerCO
2016.02.25 CSUSM BlairBakerCO2016.02.25 CSUSM BlairBakerCO
2016.02.25 CSUSM BlairBakerCO
 
Why DOD is Woefully Behind in IT
Why DOD is Woefully Behind in ITWhy DOD is Woefully Behind in IT
Why DOD is Woefully Behind in IT
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
 
Discussion 1 Anthony KelleyContains unread postsAnthony Kelle.docx
Discussion 1 Anthony KelleyContains unread postsAnthony Kelle.docxDiscussion 1 Anthony KelleyContains unread postsAnthony Kelle.docx
Discussion 1 Anthony KelleyContains unread postsAnthony Kelle.docx
 
Women in Fintech: Evolving the Financial Landscape
Women in Fintech: Evolving the Financial LandscapeWomen in Fintech: Evolving the Financial Landscape
Women in Fintech: Evolving the Financial Landscape
 
Computer Application in Business Group Presentation
Computer Application in Business Group PresentationComputer Application in Business Group Presentation
Computer Application in Business Group Presentation
 
#Futureproofing your School: A Toolkit for Bursars
#Futureproofing your School: A Toolkit for Bursars#Futureproofing your School: A Toolkit for Bursars
#Futureproofing your School: A Toolkit for Bursars
 
The Chief Information Officer in Higher Education
The Chief Information Officer in Higher EducationThe Chief Information Officer in Higher Education
The Chief Information Officer in Higher Education
 
How is Big Content Different From Big Data?
How is Big Content Different From Big Data?How is Big Content Different From Big Data?
How is Big Content Different From Big Data?
 
Essay On Women In Information Technology
Essay On Women In Information TechnologyEssay On Women In Information Technology
Essay On Women In Information Technology
 
Nicholas G. Carr - IT Doesnt Matter
Nicholas G. Carr - IT Doesnt MatterNicholas G. Carr - IT Doesnt Matter
Nicholas G. Carr - IT Doesnt Matter
 
The Anatomy of an IT Accessibility Coordinator
The Anatomy of an IT Accessibility CoordinatorThe Anatomy of an IT Accessibility Coordinator
The Anatomy of an IT Accessibility Coordinator
 
IT 2000 National IT Policy
IT 2000 National IT PolicyIT 2000 National IT Policy
IT 2000 National IT Policy
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETThe Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
 
2010 Tech America Federal CIO Survey Final Report
2010 Tech America Federal CIO Survey Final Report2010 Tech America Federal CIO Survey Final Report
2010 Tech America Federal CIO Survey Final Report
 
Technology Directors on Corporate Boards October 2013
Technology Directors on Corporate Boards October 2013Technology Directors on Corporate Boards October 2013
Technology Directors on Corporate Boards October 2013
 
On data literacy by Marek Danis
On data literacy by Marek Danis On data literacy by Marek Danis
On data literacy by Marek Danis
 

Class 1 motivation

  • 1. Class 1: Motivation to Study Information Security Management
  • 2. Why study info sec management? 1. If you’re good, you can make a difference in peoples lives 2. There is money to be made 3. Congress and the country looks to InfoSec leaders to write policy
  • 3. If you’re good, you can make a difference in peoples lives • Rick Rescorla – Chief Security Officer for Morgan Stanley – Evacuated 2,700 people from 22 floors of WTC • His ability to see risk and create plans to mitigate that risk is the essential skill needed to excel in this profession • Piss Poor Planning Promotes Piss Poor Performance
  • 4. There is money to be made • Highest Paid Professions in computer security industry: – Chief Information Officer – Chief Technology Officer • What’s the difference?
  • 5. CIO Duties CIO’s role mandated by legislation CIO’s must be held accountable for these business operations http://www.govloop.com/profiles/b logs/the-roles-of-cios-and-ctos
  • 6. CTO Duties CTO role is still evolving and therefore adaptable to changing technologies If you want a executive officer aiding your company, employ a CTO, not a CIO http://www.govloop.com/profiles/blogs/the-roles-of-cios-and-ctos
  • 7. CIO & CTO often work together http://www.govloop.com/profiles/blogs/the-roles-of-cios-and-ctos
  • 8. How much do they make? Who are they? • Pay attention to the next 7 slides • Note similarities, differences, and things you find interesting
  • 9. John Tracy • CTO Boeing • 2010 compensation $3.6 million •Undergrad School: CSU Dominguez Hills - Physics •Master’s: CSULA – Physics •PhD: UC Irvine - Engineering
  • 10. Lori Beer • CTO WellPoint • 2010 compensation $4.5 million •Undergrad School: University of Dayton •Undergrad Major: Computer Science
  • 11. Bill Chenevich • CIO US Bancorp • 2010 compensation $4.4 million •Undergrad School: City College of New York •MBA: City University of New York
  • 12. Thomas Stephens • CTO General Motors • 2010 compensation $5.6 million •Undergrad School: University of Michigan •Undergrad Major: Mechanical Engineering
  • 13. Rob Carter • CIO FedEx • 2010 compensation $3.6 million •Undergrad School: University of Florida •Undergrad Major: Computer and Information Science
  • 14. David Thompson • CIO Symantec • 2010 compensation $1.9 million •Undergrad School: Marymount University •Undergrad Major: Business administration, management & operations
  • 15. Tim Sullivan • CIO SunTrust Banks • 2010 compensation $2.1 million •Undergrad School: Unioversity of Illinois •Undergrad Major: BA Economics
  • 16. What did you notice?
  • 17. Although these executives undoubtedly understand technologies surrounding computer security… … they have mastered management and division operations with corporations. Point: to reach their level, you need infosec management.
  • 18. Congress looks to InfoSec leaders to help write federal policy • Energy & Commerce Committee – Communications & Technology Subcommittee • Jurisdiction: Interstate and foreign telecommunications and information transmission by broadcast, radio, wire, microwave, satellite and, Homeland security-related aspects of the foregoing, including cybersecurity.
  • 19.
  • 20. InfoSec professionals advise Congressional members • Feb. 8: Cybersecurity: Threats to Communications Networks and Private-Sector Responses – http://democrats.energycommerce.house.gov/index.php?q=hearing/c ommunications-technology-subcommittee-hearing-on-cybersecurity- threats-to-communications-ne • March 7: Cybersecurity: The Pivotal Role of Communications Networks – http://democrats.energycommerce.house.gov/index.php?q=hearing/c ommunications-and-technology-subcommittee-hearing-on- cybersecurity-communications-networks • March 28: Cybersecurity: Threats to Communications Networks and Public-Sector Responses – http://democrats.energycommerce.house.gov/index.php?q=hearing/c ommunications-technology-subcommittee-hearing-on-cybersecurity- threats-to-communications--0
  • 21. Assignment: due next class • Watch the rest of the posted Congressional Hearing – If you prefer text over video, look through the transcripts of the videos found in links posted on previous slide • Come to class ready to discuss – Bring facts, ideas, you found interesting – Try to answer the question: how are these particular speakers chosen to testify? – Bring questions you have • Read through chapter 1