Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Building Security Incident
Response Team and
Its Competency
Didik Partono Rudiarto
Traditional Security No Longer Works
PERSONAL SKILLS

TECHNOLOGY SKILLS
Personal Skills
Communication
Presentation Skill
Diplomacy
Ability to Follow Policies and Procedures
Team Skills
Integrity
Knowing One's L...
Technical Skills
Technical Foundation
Security Principles
Security Vulnerabilities/Weaknesses
Risk
Network Protocol
Network Application & Services
Network Secur...
Incident Handling
Local Team Policies and Procedures

Understanding/Identifying Intruder
Techniques

Communicating with Sites
Incident Analy...
Skills &
Competency
Requirements
Cyber Security Skills Framework

INTRUSION
ANALYSIS
FORENSIC

INCIDENT
HANDLING

NETWORK
SECURITY

APPLICATION
SECURITY

P...
IT Security Roadmap

Role-based
Specialist
IT Fundamentals

0 – 1 Years
Experience

IT Security
Fundamentals

1 – 2 Years
...
Standards
Information Security Certification
ORGANIZATION
CompTIA
EC-Council
GIAC
ISACA
(ISC)2
ISECOM
Offensive Security
Mile2
CREST...
Function vs Certification
Career Level
IT Executive

IT Manager

Required Skills

Security Design and
Compliance Skills
Ve...
THANK YOU
Upcoming SlideShare
Loading in …5
×

Building CSIRT and its competency

1,142 views

Published on

Published in: Business
  • Be the first to comment

Building CSIRT and its competency

  1. 1. Building Security Incident Response Team and Its Competency Didik Partono Rudiarto
  2. 2. Traditional Security No Longer Works
  3. 3. PERSONAL SKILLS TECHNOLOGY SKILLS
  4. 4. Personal Skills
  5. 5. Communication Presentation Skill Diplomacy Ability to Follow Policies and Procedures Team Skills Integrity Knowing One's Limits Coping with Stress Problem Solving Time Management
  6. 6. Technical Skills
  7. 7. Technical Foundation
  8. 8. Security Principles Security Vulnerabilities/Weaknesses Risk Network Protocol Network Application & Services Network Security Issues Host/System Security Issues Malicious Code Programming Skills
  9. 9. Incident Handling
  10. 10. Local Team Policies and Procedures Understanding/Identifying Intruder Techniques Communicating with Sites Incident Analysis Maintenance of Incident Records
  11. 11. Skills & Competency Requirements
  12. 12. Cyber Security Skills Framework INTRUSION ANALYSIS FORENSIC INCIDENT HANDLING NETWORK SECURITY APPLICATION SECURITY PENETRATION TESTING FOUNDATION AUDIT & RISK MANAGEMENT MANAGEMENT SYSTEM ADMINISTRATION LEGAL
  13. 13. IT Security Roadmap Role-based Specialist IT Fundamentals 0 – 1 Years Experience IT Security Fundamentals 1 – 2 Years Experience • Network Administrator • IT Security Specialist • IT Security Manager > 3 Years Experience
  14. 14. Standards
  15. 15. Information Security Certification ORGANIZATION CompTIA EC-Council GIAC ISACA (ISC)2 ISECOM Offensive Security Mile2 CREST IACRB eLearnSecurity Security Certified Brainbench CIW CWNP Cisco Systems Symantec CheckPoint Microsoft CERTIFICATION Security+ CEH, CHFI, ECSA, ECSP, ENSA, LPT GSIF, GSEC, GCIA, GCFW, GCFA, GCIH, GPEN, GCUX, GCWN, GWAPT, GAWN, GREM, GSE CISA, CISM, CGEIT, CRISC CAP, CISSP, CSSLP, ISSAP, ISSEP, ISSMP, SSCP OPST, OPSA, OPSE, OWSE OSCP, OSCE CPTE, CPT Consultant CREST Consultant CPT, CEPT eCPPT SCNS, SCNP, SCNA BITSF, BISA CWSA, CWSS, CWSP CWTS, CWNA, CWSP CCNA Security, CCSP, CCIE Security SCS CCSA, CCSE, CCMSE, CCSEPE, CCMA MCSA Security
  16. 16. Function vs Certification Career Level IT Executive IT Manager Required Skills Security Design and Compliance Skills Vendor Specific Specialized Security Skills Vendor Neutral IT Admin Network Security Skills IT Worker Information Worker Basic Security Concept Foundation Security Knowledge Certifications
  17. 17. THANK YOU

×