SlideShare a Scribd company logo
1 of 15
Perspectives from ISSA
International
One guy’s ideas about dependable security
Agenda
1.Where does dependable security
come from?
2.What is the ISSA doing to make
security more dependable?
3.Discussion
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 2
Speaker
Keyaan Williams
President, ISSA International
CEO, The Cyber BEAR Group, Inc.
www.linkedin.com/in/keyaan
@KeyaanWilliams
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 3
Image courtesy of Bitmoji
dependable
adjective
capable of being trusted or depended
on; reliable
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 4
Where does dependable
security come from?
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 5
Vendors?
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 6
Vendors?
“The cybersecurity market size is expected to grow from USD 137.85
Billion in 2017 to USD 231.94 Billion by 2022.” MarketsandMarkets Research
Infrastructure
Security
Endpoint Security
Application
Security
Managed Security
Service Provider
Messaging
Security
Web
Security
IoT
Security
Security Operations and Incident
Response
Threat
Intelligence
Data
Security
Mobile
Security
Transaction
Security
Risk and
Compliance
Specialized Threat Analysis and
Protection
Cloud Security
IAM
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 7
Standards and Frameworks?
ISO 9000
SP 800-30SP 800-37
SP 800-39
ISO 27001
ISO 27002ISO 27005
SP 800-61
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 8
Consultants?
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 9
Dependable security
comes from dependable
people!!!
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 10
Cybersecurity Domains 2.0
By: Henry Jiang, CISO, CISSP
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 11
Career Development Security Architecture Risk Assessment
User Education
Threat Intelligence
Governance
Cybersecurity
Domains
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 12
www.issa.orgwww.issa.orgwww.issa.orgwww.issa.org
How is ISSA making security people
more dependable?
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 13
How is ISSA making security people
more dependable?
Focusing on education and professional development.
Delivering real value members, partners, and communities.
Expanding influence by strengthening ISSA chapters
globally.
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 14
Discussion
Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 15
?
☺☺☺☺
X
?
!!!

More Related Content

What's hot

Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...African Cyber Security Summit
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...MarketingArrowECS_CZ
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyScott Cressman
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE - ATT&CKcon
 
SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?Amazon Web Services
 
24By7Security-SFHHA-Panel-Ppt 9-22-16
24By7Security-SFHHA-Panel-Ppt 9-22-1624By7Security-SFHHA-Panel-Ppt 9-22-16
24By7Security-SFHHA-Panel-Ppt 9-22-16Sanjay Deo
 
Why conquering complexity is a critical component of an effective security pr...
Why conquering complexity is a critical component of an effective security pr...Why conquering complexity is a critical component of an effective security pr...
Why conquering complexity is a critical component of an effective security pr...Dominic Vogel
 
Lastline RSAC 2018 Highlights
Lastline RSAC 2018 HighlightsLastline RSAC 2018 Highlights
Lastline RSAC 2018 HighlightsLastline, Inc.
 
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceSecurity Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceJoshua Berman
 
ASIS International Collaborating on Security Awareness Standard
ASIS International Collaborating on Security Awareness StandardASIS International Collaborating on Security Awareness Standard
ASIS International Collaborating on Security Awareness StandardEmblez Longoria
 
Decentralized Server-less Applications with Blockstack at AllThingsOpen
Decentralized Server-less Applications with Blockstack at AllThingsOpenDecentralized Server-less Applications with Blockstack at AllThingsOpen
Decentralized Server-less Applications with Blockstack at AllThingsOpenRyan Shea
 
Cyber resilience and secure information sharing with third parties amsterdam...
Cyber resilience and secure information sharing with third parties  amsterdam...Cyber resilience and secure information sharing with third parties  amsterdam...
Cyber resilience and secure information sharing with third parties amsterdam...Niran Seriki, CCISO, CISM
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 
Will Embedded Artificial Intelligence Deliver The Video Analytics We've Been ...
Will Embedded Artificial Intelligence Deliver The Video Analytics We've Been ...Will Embedded Artificial Intelligence Deliver The Video Analytics We've Been ...
Will Embedded Artificial Intelligence Deliver The Video Analytics We've Been ...Memoori
 
INSA Intelligence Champions Council Speed Mentoring - March 12th
INSA Intelligence Champions Council Speed Mentoring - March 12th INSA Intelligence Champions Council Speed Mentoring - March 12th
INSA Intelligence Champions Council Speed Mentoring - March 12th ClearedJobs.Net
 
NSE1 Network Security Associate
NSE1 Network Security AssociateNSE1 Network Security Associate
NSE1 Network Security AssociateFlexos-Tunisie
 
Maturing IoT Solutions with Microsoft Azure
Maturing IoT Solutions with Microsoft AzureMaturing IoT Solutions with Microsoft Azure
Maturing IoT Solutions with Microsoft AzureEstelle Auberix
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITREMITRE - ATT&CKcon
 

What's hot (18)

Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
 
SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?
 
24By7Security-SFHHA-Panel-Ppt 9-22-16
24By7Security-SFHHA-Panel-Ppt 9-22-1624By7Security-SFHHA-Panel-Ppt 9-22-16
24By7Security-SFHHA-Panel-Ppt 9-22-16
 
Why conquering complexity is a critical component of an effective security pr...
Why conquering complexity is a critical component of an effective security pr...Why conquering complexity is a critical component of an effective security pr...
Why conquering complexity is a critical component of an effective security pr...
 
Lastline RSAC 2018 Highlights
Lastline RSAC 2018 HighlightsLastline RSAC 2018 Highlights
Lastline RSAC 2018 Highlights
 
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceSecurity Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. Compliance
 
ASIS International Collaborating on Security Awareness Standard
ASIS International Collaborating on Security Awareness StandardASIS International Collaborating on Security Awareness Standard
ASIS International Collaborating on Security Awareness Standard
 
Decentralized Server-less Applications with Blockstack at AllThingsOpen
Decentralized Server-less Applications with Blockstack at AllThingsOpenDecentralized Server-less Applications with Blockstack at AllThingsOpen
Decentralized Server-less Applications with Blockstack at AllThingsOpen
 
Cyber resilience and secure information sharing with third parties amsterdam...
Cyber resilience and secure information sharing with third parties  amsterdam...Cyber resilience and secure information sharing with third parties  amsterdam...
Cyber resilience and secure information sharing with third parties amsterdam...
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
Will Embedded Artificial Intelligence Deliver The Video Analytics We've Been ...
Will Embedded Artificial Intelligence Deliver The Video Analytics We've Been ...Will Embedded Artificial Intelligence Deliver The Video Analytics We've Been ...
Will Embedded Artificial Intelligence Deliver The Video Analytics We've Been ...
 
INSA Intelligence Champions Council Speed Mentoring - March 12th
INSA Intelligence Champions Council Speed Mentoring - March 12th INSA Intelligence Champions Council Speed Mentoring - March 12th
INSA Intelligence Champions Council Speed Mentoring - March 12th
 
NSE1 Network Security Associate
NSE1 Network Security AssociateNSE1 Network Security Associate
NSE1 Network Security Associate
 
Maturing IoT Solutions with Microsoft Azure
Maturing IoT Solutions with Microsoft AzureMaturing IoT Solutions with Microsoft Azure
Maturing IoT Solutions with Microsoft Azure
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
 

Similar to ISSA Perspectives on Dependable Security

Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNorth Texas Chapter of the ISSA
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 publishedDSCI_Connect
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynoteNetworkCollaborators
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNorth Texas Chapter of the ISSA
 
The Essentials of Cyber Insurance: A Panel of Industry Experts
The Essentials of Cyber Insurance: A Panel of Industry ExpertsThe Essentials of Cyber Insurance: A Panel of Industry Experts
The Essentials of Cyber Insurance: A Panel of Industry ExpertsShawn Tuma
 
(SACON) Wayne Tufek - chapter three - sabsa
(SACON) Wayne Tufek - chapter three - sabsa(SACON) Wayne Tufek - chapter three - sabsa
(SACON) Wayne Tufek - chapter three - sabsaPriyanka Aash
 
CISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportCISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportSarthak Nanda
 
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 ReportRahul Neel Mani
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...Nur Shiqim Chok
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNorth Texas Chapter of the ISSA
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...Nur Shiqim Chok
 
Ericsson Technology Review: Securing the cloud with compliance auditing
Ericsson Technology Review: Securing the cloud with compliance auditingEricsson Technology Review: Securing the cloud with compliance auditing
Ericsson Technology Review: Securing the cloud with compliance auditingEricsson
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of SecuritySaumil Shah
 
Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016Tracxn
 
Trade Surveillance and data capture for MiFID II compliance
Trade Surveillance and data capture for MiFID II complianceTrade Surveillance and data capture for MiFID II compliance
Trade Surveillance and data capture for MiFID II complianceLeigh Hill
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016Ulf Mattsson
 
FST_2017_MediaKit
FST_2017_MediaKitFST_2017_MediaKit
FST_2017_MediaKitMark Quinn
 

Similar to ISSA Perspectives on Dependable Security (20)

Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
The Essentials of Cyber Insurance: A Panel of Industry Experts
The Essentials of Cyber Insurance: A Panel of Industry ExpertsThe Essentials of Cyber Insurance: A Panel of Industry Experts
The Essentials of Cyber Insurance: A Panel of Industry Experts
 
(SACON) Wayne Tufek - chapter three - sabsa
(SACON) Wayne Tufek - chapter three - sabsa(SACON) Wayne Tufek - chapter three - sabsa
(SACON) Wayne Tufek - chapter three - sabsa
 
CISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportCISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event Report
 
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
Ericsson Technology Review: Securing the cloud with compliance auditing
Ericsson Technology Review: Securing the cloud with compliance auditingEricsson Technology Review: Securing the cloud with compliance auditing
Ericsson Technology Review: Securing the cloud with compliance auditing
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of Security
 
Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016
 
Trade Surveillance and data capture for MiFID II compliance
Trade Surveillance and data capture for MiFID II complianceTrade Surveillance and data capture for MiFID II compliance
Trade Surveillance and data capture for MiFID II compliance
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
FST_2017_MediaKit
FST_2017_MediaKitFST_2017_MediaKit
FST_2017_MediaKit
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

ISSA Perspectives on Dependable Security

  • 1. Perspectives from ISSA International One guy’s ideas about dependable security
  • 2. Agenda 1.Where does dependable security come from? 2.What is the ISSA doing to make security more dependable? 3.Discussion Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 2
  • 3. Speaker Keyaan Williams President, ISSA International CEO, The Cyber BEAR Group, Inc. www.linkedin.com/in/keyaan @KeyaanWilliams Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 3 Image courtesy of Bitmoji
  • 4. dependable adjective capable of being trusted or depended on; reliable Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 4
  • 5. Where does dependable security come from? Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 5
  • 6. Vendors? Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 6
  • 7. Vendors? “The cybersecurity market size is expected to grow from USD 137.85 Billion in 2017 to USD 231.94 Billion by 2022.” MarketsandMarkets Research Infrastructure Security Endpoint Security Application Security Managed Security Service Provider Messaging Security Web Security IoT Security Security Operations and Incident Response Threat Intelligence Data Security Mobile Security Transaction Security Risk and Compliance Specialized Threat Analysis and Protection Cloud Security IAM Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 7
  • 8. Standards and Frameworks? ISO 9000 SP 800-30SP 800-37 SP 800-39 ISO 27001 ISO 27002ISO 27005 SP 800-61 Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 8
  • 9. Consultants? Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 9
  • 10. Dependable security comes from dependable people!!! Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 10
  • 11. Cybersecurity Domains 2.0 By: Henry Jiang, CISO, CISSP Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 11
  • 12. Career Development Security Architecture Risk Assessment User Education Threat Intelligence Governance Cybersecurity Domains Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 12
  • 13. www.issa.orgwww.issa.orgwww.issa.orgwww.issa.org How is ISSA making security people more dependable? Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 13
  • 14. How is ISSA making security people more dependable? Focusing on education and professional development. Delivering real value members, partners, and communities. Expanding influence by strengthening ISSA chapters globally. Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 14
  • 15. Discussion Metro Atlanta ISSA Conference | Paradigm of Dependable Security | 15 November 2017 15 ? ☺☺☺☺ X ? !!!