SlideShare a Scribd company logo
1 of 10
CYBERSECURITY:
THE INDUSTRY OF THE PRESENT AND
FUTURE
PRESENTED BY JENNIFER BRAUN
WHAT IS CYBERSECURITY AND HOW DOES THE
DEPARTMENT OF HOMELAND SECURITY PLAN TO
ADDRESS THE CONCERNS RAISED BY THESE
ATTACKS?
Cybersecurity is the protection of hardware and software infrastructure. It
includes measures to prevent attacks and vulnerabilities that could take place
within these systems. With the ever increasing technological integration in
essential services, these protections must take place to protect our population
from harm.
The Department of Homeland Security endeavors to accomplish with their
mission over the next 5 years “to keep pace with the evolving cyber risk
landscape by reducing vulnerabilities and building resilience; countering
malicious actors in cyberspace; responding to incidents; and making the cyber
ecosystem more secure and resilient” (U.S. Department of Homeland Security,
2018)
(U.S. Department of Homeland Security, 2018)
EDUCATION AND
CAREER
DEVELOPMENT
National Integrated Cyber Education Research
Center (NICERC) “a not-for profit academic
development center to provide K-12 cybersecurity
curricula and hands-on professional development
for teachers at no cost” (U.S. Department of
Homeland Security, 2018)
National Security Agency (NSA) and National
Centers of Academic Excellence Program (CAE)
work together to support cybersecurity education
in 2 year, 4 year, and specialty programs.
National Initiative for Cybersecurity Careers and
Studies (NICCS) “serves as a national resource for
cybersecurity awareness, education, training, and
career opportunities” (U.S. Department of
Homeland Security, 2018)
Many programs exist to enforce,
educate, promote cybersecurity
careers so that we will have enough
skilled professionals to fill the need
that we certainly have and will have
as a nation. The emphasis placed on
these programs only goes to show
the importance of maintaining
secure technology infrastructure.
(U.S. Department of Homeland Security, 2018)
CAREERS IN
CYBERSECURITY
ARE AT ALL
LEVELS
Professionals are needed across
federal, state, local, and private sector
to be able to secure and protect the
nation.
These different areas are able to
collaborate when threats need to be
addressed. This allows all levels to
pool their resources and skill sets to
allow for the best coverage possible.
Seeing the advantage of utilizing skills
at all levels there are already
cooperative relationships established
to combat cybercrime activities.
(U.S. Department of Homeland Security, 2018)
CYBERSECURITY PROFESSIONALS ARE
NEEDED IN MANY AREAS
PREVENTION
Vulnerability Detection and
Assessment
Networks and Systems
Engineering
Software Assurance
REACTION
Cyber Incident
Response
Intelligence and
Investigation
ANALYSIS
Cyber Risk and Strategic
Analysis
Digital Forensics and
Forensics Analysis
The Department of Homeland Security is looking for professionals in the
following areas:
(U.S. Department of Homeland Security, 2018)
HIGH DEMAND FOR A PROTECTED FUTURE
• There are more than 500,000 jobs
in IT and cybersecurity that need to
be filled.
• Careers in IT have salaries almost
50% larger than private sector jobs
in other areas.
• Technology centered jobs are in
growing demand and it is expected
that the jobs demand will only
continue to grow.
(U.S. Department of Homeland Security, 2018)
CYBERSECURITY DEMAND ISN’T
DIMINISHING
• According to a report from
Cybersecurity Ventures, there will be
nearly 3.5 million cyber security jobs
unfilled by 2021 (Morgan, 2018).
• India and Israel are and will be in the
highest demand for cyber security
professionals (Morgan, 2018)
• “The workforce shortage has left CISOs
and IT security teams shorthanded while
the cyber attacks are intensifying.”
(Morgan 2018)
• It is expected that cyber security will
have a 0% unemployment rate for at
least the next 3 years. Even then the
demand is not expected to be met
(Morgan, 2018).
• Third party companies are emerging to
take over the responsibility of large
corporations and creating demand for
dynamic workforces to fill positions at
these companies (Morgan, 2018)
#BECYBERSMART
Even public education is being used to fill the
gaps in the cyber security environment.
#BeCyberSmart is a program aimed at educating
the public on various aspects of protecting
oneself from general cyber threats. It is just one
more way that the Department of Homeland
Security is trying to reduce cyber threats in the
US.
A few tips to the reduce risk of
becoming a victim of cyber crime:
1. Enable multi-factor authentication whenever
possible.
2. Make sure your connection via wi-fi is and
remains secure.
3. Don’t give your phone applications too much
access to your device.
4. Be aware of what you are sharing with
geotagging and social media which could
make you vulnerable.
5. Protect your devices with antivirus software
6. Vary and be creative with your passwords.
7. Do not open or access links from unknown
senders.(U.S. Department of Homeland Security, 2018)
FINAL TAKEAWAYS ABOUT CYBERSECURITY
• With so many areas of specialty and
need, many people should be able to
transition to a cybersecurity position
that compliments their current skillset,
especially as some jobs lose demand or
become obsolete.
• There seems to be a common
misconception about cybersecurity
professionals needing to be
programmers or engineers, however,
there is such a broad array of positions
in the field that many college majors
are needed to fill cybersecurity jobs.
• The demand is serious for cybersecurity
professionals and with education taking
time to catch up with that demand,
there is this scary gap that is leaving us
open and vulnerable to cybercrime.
• I feel the focus on STEM careers,
especially with a recent emphasis of
including women in the field is almost
crucial to being able to fill the needs of
our future cybersecurity demand.
• Personally, I have enjoyed the challenge
of changing careers and the prospects
available through cybersecurity is what
attracted me to the major.
REFERENCES
Morgan, S. (2018, June 13). Cybersecurity Jobs Report 2018-2021.
Retrieved from https://cybersecurityventures.com/jobs/
U.S. Department of Homeland Security. (2018, September 14).
Cybersecurity. Retrieved from
https://www.dhs.gov/topic/cybersecurity
U.S. Department of Homeland Security. (2017, September 27).
Homeland Security Information Network - Cybersecurity. Retrieved
from https://www.youtube.com/watch?v=NK-_sj4UHEc
U.S. Department of Homeland Security. (2012, July 24). Join DHS
Cybersecurity. Retrieved from
https://www.youtube.com/watch?v=qRjAk96B_t4

More Related Content

What's hot

NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Eryk Budi Pratama
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. JeniferAM Publications
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 

What's hot (20)

NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 

Similar to Cybersecurity jobs jb

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cybersecurity Talent : The Big Gap in Cyber Protection
Cybersecurity Talent : The Big Gap in Cyber ProtectionCybersecurity Talent : The Big Gap in Cyber Protection
Cybersecurity Talent : The Big Gap in Cyber ProtectionCapgemini
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speedjcichelli
 
How large is the cyber security skills gap?
How large is the cyber security skills gap?How large is the cyber security skills gap?
How large is the cyber security skills gap?Megan Thudium
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityCareer Communications Group
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityNizar Ben Neji
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
 
Preparing for the Inevitable
Preparing for the InevitablePreparing for the Inevitable
Preparing for the InevitableOmoniyiAnimasaun
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...Matthew Rosenquist
 

Similar to Cybersecurity jobs jb (20)

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybersecurity Talent : The Big Gap in Cyber Protection
Cybersecurity Talent : The Big Gap in Cyber ProtectionCybersecurity Talent : The Big Gap in Cyber Protection
Cybersecurity Talent : The Big Gap in Cyber Protection
 
Cyber security brochure(1)
Cyber security brochure(1)Cyber security brochure(1)
Cyber security brochure(1)
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
 
How large is the cyber security skills gap?
How large is the cyber security skills gap?How large is the cyber security skills gap?
How large is the cyber security skills gap?
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in Cybersecurity
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the University
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
Preparing for the Inevitable
Preparing for the InevitablePreparing for the Inevitable
Preparing for the Inevitable
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Cybersecurity jobs jb

  • 1. CYBERSECURITY: THE INDUSTRY OF THE PRESENT AND FUTURE PRESENTED BY JENNIFER BRAUN
  • 2. WHAT IS CYBERSECURITY AND HOW DOES THE DEPARTMENT OF HOMELAND SECURITY PLAN TO ADDRESS THE CONCERNS RAISED BY THESE ATTACKS? Cybersecurity is the protection of hardware and software infrastructure. It includes measures to prevent attacks and vulnerabilities that could take place within these systems. With the ever increasing technological integration in essential services, these protections must take place to protect our population from harm. The Department of Homeland Security endeavors to accomplish with their mission over the next 5 years “to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient” (U.S. Department of Homeland Security, 2018) (U.S. Department of Homeland Security, 2018)
  • 3. EDUCATION AND CAREER DEVELOPMENT National Integrated Cyber Education Research Center (NICERC) “a not-for profit academic development center to provide K-12 cybersecurity curricula and hands-on professional development for teachers at no cost” (U.S. Department of Homeland Security, 2018) National Security Agency (NSA) and National Centers of Academic Excellence Program (CAE) work together to support cybersecurity education in 2 year, 4 year, and specialty programs. National Initiative for Cybersecurity Careers and Studies (NICCS) “serves as a national resource for cybersecurity awareness, education, training, and career opportunities” (U.S. Department of Homeland Security, 2018) Many programs exist to enforce, educate, promote cybersecurity careers so that we will have enough skilled professionals to fill the need that we certainly have and will have as a nation. The emphasis placed on these programs only goes to show the importance of maintaining secure technology infrastructure. (U.S. Department of Homeland Security, 2018)
  • 4. CAREERS IN CYBERSECURITY ARE AT ALL LEVELS Professionals are needed across federal, state, local, and private sector to be able to secure and protect the nation. These different areas are able to collaborate when threats need to be addressed. This allows all levels to pool their resources and skill sets to allow for the best coverage possible. Seeing the advantage of utilizing skills at all levels there are already cooperative relationships established to combat cybercrime activities. (U.S. Department of Homeland Security, 2018)
  • 5. CYBERSECURITY PROFESSIONALS ARE NEEDED IN MANY AREAS PREVENTION Vulnerability Detection and Assessment Networks and Systems Engineering Software Assurance REACTION Cyber Incident Response Intelligence and Investigation ANALYSIS Cyber Risk and Strategic Analysis Digital Forensics and Forensics Analysis The Department of Homeland Security is looking for professionals in the following areas: (U.S. Department of Homeland Security, 2018)
  • 6. HIGH DEMAND FOR A PROTECTED FUTURE • There are more than 500,000 jobs in IT and cybersecurity that need to be filled. • Careers in IT have salaries almost 50% larger than private sector jobs in other areas. • Technology centered jobs are in growing demand and it is expected that the jobs demand will only continue to grow. (U.S. Department of Homeland Security, 2018)
  • 7. CYBERSECURITY DEMAND ISN’T DIMINISHING • According to a report from Cybersecurity Ventures, there will be nearly 3.5 million cyber security jobs unfilled by 2021 (Morgan, 2018). • India and Israel are and will be in the highest demand for cyber security professionals (Morgan, 2018) • “The workforce shortage has left CISOs and IT security teams shorthanded while the cyber attacks are intensifying.” (Morgan 2018) • It is expected that cyber security will have a 0% unemployment rate for at least the next 3 years. Even then the demand is not expected to be met (Morgan, 2018). • Third party companies are emerging to take over the responsibility of large corporations and creating demand for dynamic workforces to fill positions at these companies (Morgan, 2018)
  • 8. #BECYBERSMART Even public education is being used to fill the gaps in the cyber security environment. #BeCyberSmart is a program aimed at educating the public on various aspects of protecting oneself from general cyber threats. It is just one more way that the Department of Homeland Security is trying to reduce cyber threats in the US. A few tips to the reduce risk of becoming a victim of cyber crime: 1. Enable multi-factor authentication whenever possible. 2. Make sure your connection via wi-fi is and remains secure. 3. Don’t give your phone applications too much access to your device. 4. Be aware of what you are sharing with geotagging and social media which could make you vulnerable. 5. Protect your devices with antivirus software 6. Vary and be creative with your passwords. 7. Do not open or access links from unknown senders.(U.S. Department of Homeland Security, 2018)
  • 9. FINAL TAKEAWAYS ABOUT CYBERSECURITY • With so many areas of specialty and need, many people should be able to transition to a cybersecurity position that compliments their current skillset, especially as some jobs lose demand or become obsolete. • There seems to be a common misconception about cybersecurity professionals needing to be programmers or engineers, however, there is such a broad array of positions in the field that many college majors are needed to fill cybersecurity jobs. • The demand is serious for cybersecurity professionals and with education taking time to catch up with that demand, there is this scary gap that is leaving us open and vulnerable to cybercrime. • I feel the focus on STEM careers, especially with a recent emphasis of including women in the field is almost crucial to being able to fill the needs of our future cybersecurity demand. • Personally, I have enjoyed the challenge of changing careers and the prospects available through cybersecurity is what attracted me to the major.
  • 10. REFERENCES Morgan, S. (2018, June 13). Cybersecurity Jobs Report 2018-2021. Retrieved from https://cybersecurityventures.com/jobs/ U.S. Department of Homeland Security. (2018, September 14). Cybersecurity. Retrieved from https://www.dhs.gov/topic/cybersecurity U.S. Department of Homeland Security. (2017, September 27). Homeland Security Information Network - Cybersecurity. Retrieved from https://www.youtube.com/watch?v=NK-_sj4UHEc U.S. Department of Homeland Security. (2012, July 24). Join DHS Cybersecurity. Retrieved from https://www.youtube.com/watch?v=qRjAk96B_t4