SlideShare a Scribd company logo
SKILLS &
CAREERS IN
CYBERSECURITY
WE NEED MORE THAN HACKERS WITH LEET SKILZ)
Sandy Dunn, CISO BlueCross of Idaho
March 9, 2018 12:00 – 1:00 pm
Outline • Who am I
• What is my role in Cyber Security
• Career path / different perspective
provided value
• Diversity more than XY or XX
• Security roles at _________
• Finding opportunities
• Skills / Resumes / Interviews
Jobs I’ve had
• Waitress
• BarTender
• Pushed cows sales yard
• Filled doughnuts with jelly at bakery
• Rodeo crew
• Radio Sales
• Office Manager
• Software Sales
• Computer Sales
• HorseTrader
• Competitive Intelligence
• ACTTeam
• PSOTeam
• Information Security Officer
• Cybersecurity Product Security Strategist
• IT SecurityArchitect
• Chief Information Security Officer (CISO)
My best skill: saying “I don’t get it”
Goal of Diversity:
Build a culture that celebrates and encourages each employee to be open and bring their best selves and best ideas.
What is a CISO ?
• Senior executive responsible for establishing and
maintaining the enterprise vision, strategy, and program
to ensure information assets and technologies are
adequately protected.
• Identify, develop, implement, and maintain processes
across the enterprise to reduce information security risk
• Respond to incidents, establish standards and controls,
manage security technologies, and direct the
establishment and implementation of policies and
procedures.
Top Priorities
Top Challenges
My Perspective on
where the security
industry is going
• Ensure our organization is ready for Smart
Healthcare, protecting information, any
where, any time, on any device
• Technical debt, increased availability
expectations, increased threats
• Just like airplanes and cars it took us a long
time until we understood what safe is
What do
they need
to
protect?
Who do
they need
to protect
it from?
How do
they
protect it?
• What do they do?
• Who are their customers?
Questions
Compliance or
regulatory requirements
?
How is technology used
?
Where are their
customer’s located
How are transactions
made? Invoices, credit
card?
• How do they get paid
• Who pays the business, how?
Do they do
development? What do
they develop?
How do they engage
with 3rd parties?
• Supply chain
• Hosting / Cloud
CSO /
CISO
Security
Operations
Incidence
Response
IT Security
Architect
Developer /
Security
Quality /
Security
Risk
Management
IT Audit Compliance
Car
manufacturer
• PSIRT /
Bug
Bounty
• Network
• IP Leak
• Internal
domain
• Cars
Define Security
Requirements
• Security
functional &
non functional
Supply Chain
Software • Red team pen
test
• Red team pen
test
• Supply Chain
• Over seas
development
• ISO – manage
business vs
security
• Privacy
• GDPR
• Fraud
detection
• PCI
• Red team
pen test
Insurance • Respond
to board
• Budget
• Strategy
• Malware /
defense
• WAF
• Network
Firewall
• IAM / AD
PHI Data
Breach
• Application review
• Third party risk
• Security
Awareness
• Business
Continuity
• Disaster Recovery
• Control
review
• Validates
Operational
standards
• HIPAA
• DOI
• FEP
• Medicare
University • SEIM • Forensics • Secure configs • Policy
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf
Tasks
Knowledge
Skills
Ability
• Finding opportunities
• Skills
• Resumes
• Interviews
Caitlyn
• Figures out how she can add value
• Works HARD
• Super Positive
• Great Communicator
• Always FollowsThroughhttps://sites.google.com/view/thoughtsoncareerbuilding
BSIDES Idaho Falls
September 15, 2018
bsidesidahofalls.org
bsidesidahofalls@gmail.com
Summary
• Many different path to achieve your career goals
• Having different career experiences brings value
to each role
• Many different opportunities in Cyber Security
field where your strengths are a value
• Networking, networking, networking
Articles
The HPWeigh: Diversity and the Hardy-Weinberg Principle http://h20435.www2.hp.com/t5/HP-Labs-Blog/The-HP-Weigh-Diversity-and-the-Hardy-
Weinberg-Principle/ba-p/295220
TenThings toThink About ForYour Security Awareness Program https://www.sans.org/security-awareness-training/blog/ten-things-think-about-
your-security-awareness-program-guest-blog
Cyber Security AreWe Winning?
https://www.linkedin.com/pulse/cyber-security-we-winning-sandra-sandy-dunn/[linkedin.com]
Papers
The Scary andTerribleCode Signing ProblemYou Don’t KnowYou Have https://www.sans.org/reading-room/whitepapers/critical/scary-terrible-
code-signing-problem-you-36382
Defending Against theWeaponization ofTrust: Defense in Depth Assessment ofTLS https://www.giac.org/paper/gsna/4623/defending-
weaponization-trust-defense-in-depth-assessment-tls/116997
The BusinessCase forTLS Certificate Enterprise Key Management ofWeb Site Certificates: https://www.giac.org/paper/gccc/210/The-
Business-Case-for-TLS-Certificate-Enterprise-Key-Management-of-Web-Site-Certificates-Wrangling-TLS-Certificates-on-the-Wild-Web/116997
Superfish andTLS:A Case Study of BetrayedTrust and Legal Liability https://www.sans.org/reading-room/whitepapers/certificates/superfish-tls-
case-study-betrayed-trust-legal-liability-37532
Questions ?

More Related Content

Similar to Bsu skills and_careers_in_cybersecurity

Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
Security Innovation
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy Partnership
EC-Council
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
John D. Johnson
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke
 
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security GovernanceCNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
Sam Bowne
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
Aggregage
 
Navigate LLC Overview
Navigate LLC OverviewNavigate LLC Overview
Navigate LLC Overview
Sarah Carroll
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Concept Searching, Inc
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
SagarNegi10
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
Security Innovation
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
SagarNegi10
 
Cleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MD
Cleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MDCleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MD
Cleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MD
ClearedJobs.Net
 
How To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk Analyst
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
CI or FS Poly Cleared Job Fair Handbook | DC, MD, VA
CI or FS Poly Cleared Job Fair Handbook | DC, MD, VACI or FS Poly Cleared Job Fair Handbook | DC, MD, VA
CI or FS Poly Cleared Job Fair Handbook | DC, MD, VA
ClearedJobs.Net
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
PECB
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
Pete Nieminen
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
Patrick Florer
 

Similar to Bsu skills and_careers_in_cybersecurity (20)

Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy Partnership
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security GovernanceCNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
Navigate LLC Overview
Navigate LLC OverviewNavigate LLC Overview
Navigate LLC Overview
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
Cleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MD
Cleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MDCleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MD
Cleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MD
 
How To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk Analyst
 
CI or FS Poly Cleared Job Fair Handbook | DC, MD, VA
CI or FS Poly Cleared Job Fair Handbook | DC, MD, VACI or FS Poly Cleared Job Fair Handbook | DC, MD, VA
CI or FS Poly Cleared Job Fair Handbook | DC, MD, VA
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 

More from Sandra (Sandy) Dunn

Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
Sandra (Sandy) Dunn
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
Sandra (Sandy) Dunn
 
Your're Special (But Not That Special)
Your're Special (But Not That Special)Your're Special (But Not That Special)
Your're Special (But Not That Special)
Sandra (Sandy) Dunn
 
Step by-step-guide risk-security-dunn_firth_v.1.8
Step by-step-guide risk-security-dunn_firth_v.1.8Step by-step-guide risk-security-dunn_firth_v.1.8
Step by-step-guide risk-security-dunn_firth_v.1.8
Sandra (Sandy) Dunn
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Sandra (Sandy) Dunn
 
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Sandra (Sandy) Dunn
 
Presentation2 certificate farce
Presentation2 certificate farcePresentation2 certificate farce
Presentation2 certificate farce
Sandra (Sandy) Dunn
 

More from Sandra (Sandy) Dunn (7)

Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
 
Your're Special (But Not That Special)
Your're Special (But Not That Special)Your're Special (But Not That Special)
Your're Special (But Not That Special)
 
Step by-step-guide risk-security-dunn_firth_v.1.8
Step by-step-guide risk-security-dunn_firth_v.1.8Step by-step-guide risk-security-dunn_firth_v.1.8
Step by-step-guide risk-security-dunn_firth_v.1.8
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
 
Presentation2 certificate farce
Presentation2 certificate farcePresentation2 certificate farce
Presentation2 certificate farce
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Bsu skills and_careers_in_cybersecurity

  • 1. SKILLS & CAREERS IN CYBERSECURITY WE NEED MORE THAN HACKERS WITH LEET SKILZ) Sandy Dunn, CISO BlueCross of Idaho March 9, 2018 12:00 – 1:00 pm
  • 2. Outline • Who am I • What is my role in Cyber Security • Career path / different perspective provided value • Diversity more than XY or XX • Security roles at _________ • Finding opportunities • Skills / Resumes / Interviews
  • 3. Jobs I’ve had • Waitress • BarTender • Pushed cows sales yard • Filled doughnuts with jelly at bakery • Rodeo crew • Radio Sales • Office Manager • Software Sales • Computer Sales • HorseTrader • Competitive Intelligence • ACTTeam • PSOTeam • Information Security Officer • Cybersecurity Product Security Strategist • IT SecurityArchitect • Chief Information Security Officer (CISO) My best skill: saying “I don’t get it” Goal of Diversity: Build a culture that celebrates and encourages each employee to be open and bring their best selves and best ideas.
  • 4. What is a CISO ? • Senior executive responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. • Identify, develop, implement, and maintain processes across the enterprise to reduce information security risk • Respond to incidents, establish standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures.
  • 5. Top Priorities Top Challenges My Perspective on where the security industry is going • Ensure our organization is ready for Smart Healthcare, protecting information, any where, any time, on any device • Technical debt, increased availability expectations, increased threats • Just like airplanes and cars it took us a long time until we understood what safe is
  • 6. What do they need to protect? Who do they need to protect it from? How do they protect it? • What do they do? • Who are their customers?
  • 7. Questions Compliance or regulatory requirements ? How is technology used ? Where are their customer’s located How are transactions made? Invoices, credit card? • How do they get paid • Who pays the business, how? Do they do development? What do they develop? How do they engage with 3rd parties? • Supply chain • Hosting / Cloud
  • 8. CSO / CISO Security Operations Incidence Response IT Security Architect Developer / Security Quality / Security Risk Management IT Audit Compliance Car manufacturer • PSIRT / Bug Bounty • Network • IP Leak • Internal domain • Cars Define Security Requirements • Security functional & non functional Supply Chain Software • Red team pen test • Red team pen test • Supply Chain • Over seas development • ISO – manage business vs security • Privacy • GDPR • Fraud detection • PCI • Red team pen test Insurance • Respond to board • Budget • Strategy • Malware / defense • WAF • Network Firewall • IAM / AD PHI Data Breach • Application review • Third party risk • Security Awareness • Business Continuity • Disaster Recovery • Control review • Validates Operational standards • HIPAA • DOI • FEP • Medicare University • SEIM • Forensics • Secure configs • Policy
  • 11. • Finding opportunities • Skills • Resumes • Interviews Caitlyn • Figures out how she can add value • Works HARD • Super Positive • Great Communicator • Always FollowsThroughhttps://sites.google.com/view/thoughtsoncareerbuilding BSIDES Idaho Falls September 15, 2018 bsidesidahofalls.org bsidesidahofalls@gmail.com
  • 12. Summary • Many different path to achieve your career goals • Having different career experiences brings value to each role • Many different opportunities in Cyber Security field where your strengths are a value • Networking, networking, networking
  • 13. Articles The HPWeigh: Diversity and the Hardy-Weinberg Principle http://h20435.www2.hp.com/t5/HP-Labs-Blog/The-HP-Weigh-Diversity-and-the-Hardy- Weinberg-Principle/ba-p/295220 TenThings toThink About ForYour Security Awareness Program https://www.sans.org/security-awareness-training/blog/ten-things-think-about- your-security-awareness-program-guest-blog Cyber Security AreWe Winning? https://www.linkedin.com/pulse/cyber-security-we-winning-sandra-sandy-dunn/[linkedin.com] Papers The Scary andTerribleCode Signing ProblemYou Don’t KnowYou Have https://www.sans.org/reading-room/whitepapers/critical/scary-terrible- code-signing-problem-you-36382 Defending Against theWeaponization ofTrust: Defense in Depth Assessment ofTLS https://www.giac.org/paper/gsna/4623/defending- weaponization-trust-defense-in-depth-assessment-tls/116997 The BusinessCase forTLS Certificate Enterprise Key Management ofWeb Site Certificates: https://www.giac.org/paper/gccc/210/The- Business-Case-for-TLS-Certificate-Enterprise-Key-Management-of-Web-Site-Certificates-Wrangling-TLS-Certificates-on-the-Wild-Web/116997 Superfish andTLS:A Case Study of BetrayedTrust and Legal Liability https://www.sans.org/reading-room/whitepapers/certificates/superfish-tls- case-study-betrayed-trust-legal-liability-37532