SlideShare a Scribd company logo
Dan Glass
Speaker
INFORMATION
SECURITY
SMS Career Day
About Me
Former CISO - American Airlines (AA)
Former Member of Technical Staff - AA
Co-Founder & Former Board Member - Aviation ISAC
Content Committee Member - Numerous Conferences
Advisory Board Member - Numerous Companies
Board Member - North Texas Performing Arts (NTPA)
Vice President, Chief Information Security Officer (CISO)
NTT DATA
Other Interesting Positions:
My Work History
Over 25 years professional experience
Over 20 years in cybersecurity field
Over 10 years as a CISO
Over 10 years in technical IT and security roles:
network engineering
system administration
email management
code development
Started professional career as a financial analyst
Education
Masters of Science - Information Management
Bachelors of Business Administration - Finance
Bachelors of Business Administration - Economics
Associate of Arts - Psychology
Certified Information Systems Security Professional
(CISSP)
Certified Information Systems Manager
Certifications
What is a CISO?
The CISO (chief information security officer) is a senior-
level executive responsible for developing and
implementing an information security program, which
includes procedures and policies designed to protect
employees, facilities, enterprise communications, systems,
and assets from both internal and external threats.
The CISO also procures cybersecurity products and
services and manages the enterprise disaster recovery
and business continuity plans.
What is a CISO? (take 2)
The CISO is responsible for managing a program and
teams that protect all the people, offices, computers,
applications, and information that a company uses.
Develop, implement and monitor a strategic security
and IT risk management program
Work directly with the business units to facilitate risk
assessment and risk management processes
Develop a security management framework
Interact with related disciplines to ensure the
consistent application of policies and standards
Provide leadership to the security organization
Partner with business leaders to raise awareness of risk
management concerns
Assist with business technology planning, providing
future vision of technology and systems
What does a CISO do?
CISO Qualifications
Advanced degree in business or a technology field
Minimum of 15 years of experience in a combination of
risk management, information security and IT jobs
Minimum of five years experience leading IT and
information security professionals
Excellent written and verbal communication skills and
high level of personal integrity
Innovative thinking and leadership with an ability to
lead and motivate cross-functional, interdisciplinary
teams
Experience with common information security
management frameworks
What's interesting?
I play "cat and mouse" with some of the smartest
people on the planet
I work with some of the brightest minds in the world
I think like a criminal in order to defend against them
I think through how protections impact the company
The environment is always changing due to technology
advancements and improved attacker techniques
Information security is the most intellectually
challenging and stimulating field in the world
What's uninteresting?
Meetings
Spreadsheets
Operational issues
So. Many. Meetings.
Budget cuts
Interpersonal conflicts
Did I mention meetings?
Security in a nutshell
Identify where security risk exists by ensuring the
company is adhering to security policies
Protect assets against attack and theft by deploying
security technologies that block bad stuff
Detect when security events occur by monitoring
events from every company system
Respond to security events by hiring a highly trained
team of experts that contain the event
Recover from security events by ensuring systems are
resilient and have backups
Jobs in security
Security Analyst: reviews information looking for
malicious activity
Security Consultant: reviews IT systems for security
design and adherence to policies
Security Engineer: builds and manages technical
security controls
Security Architect: design security technologies and
policies
Security Manager: manages security functional teams
Security Director: leads a functional area of the
security organization
CISO: sets strategy and leads the entire security
program
Firewalls block unwanted network connections
Antivirus detects and blocks malicious software from
running on a system
Scanners probe systems looking for software
weaknesses that hackers can attack
Identity & Access systems ensure authorized people
get access to things and unauthorized people do not
Proxies monitor internet usage for known bad websites
and malware from being downloaded to systems
Security event managers collect and analyze millions of
events that occur within a network each day
System management software configure computers to
policies and can update components as needed
Security technologies
Salary ranges in security
Information Security Analyst: $61K - $180K
Information Security Consultant: $60K - $168K
Information Security Engineer: $74K - $182K
Information Security Manager: $88K - $206K
Information Security Architect: $70K - $180K
Information Security Director: $123K - $237K
CISO: $125K - $324K
Security field outlook
By 2025, it's expected that there will be 3.5 million
unfilled security jobs
The expected growth rate for the information security
field between now and 2031 is 35%
There are not enough skilled security professionals to fill
the open security roles within the job market
Technology & Security
Security Analysts use software to help aggregate large
data sets and pull in information from various systems
Security Engineers use programming and scripting
languages to automate repeatable functions
Security Architects use design software to visually
depict complex concepts and systems
Security leadership use productivity tool suite apps
such as word processors, spreadsheets, and
presentation software
Of course, everyone uses email and chat
Technology usage for security professionals varies widely
based on their specific focus:
How to get a job in security
High school degree for entry level roles
College degree for more senior roles
Advanced college degree for leadership roles
Well rounded liberal arts knowledge (history, science,
art, etc.)
A keen analytical mind with the ability to solve complex
problems with unique approaches
Technical skill within and outside the role
There is no single or straightforward path to a job in
information security but there are things that are
considered prerequisites:
There are now degrees in cybersecurity, but it is not a
must have to get a job. Here are some traits I look for:
Quiz Time
www.kahoot.it
https://dan.glass/
Thank You!
mastodon:
@djglass@infosec.exchange
resume@hckd.me

More Related Content

What's hot

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
Slamet Ar Rokhim
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
Yash
 
Threat modelling with_sample_application
Threat modelling with_sample_applicationThreat modelling with_sample_application
Threat modelling with_sample_applicationUmut IŞIK
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
Manjushree Mashal
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
Chadni Islam
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Edureka!
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
TapOffice
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs
 

What's hot (20)

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Threat modelling with_sample_application
Threat modelling with_sample_applicationThreat modelling with_sample_application
Threat modelling with_sample_application
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 

Similar to Information Security Career Day Presentation

Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
InfosecTrain
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
Sprintzeal
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
Sprintzeal
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.it
SKIPS University
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Cyber security course in Kerala, Kochi
Cyber  security  course in Kerala, KochiCyber  security  course in Kerala, Kochi
Cyber security course in Kerala, Kochi
amallblitz0
 
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, KochiCyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
ananthakrishnansblit
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
Emma Thompson
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
Hamed Moghaddam
 
Top Trending Cybersecurity Jobs in 2023.pdf
Top Trending Cybersecurity Jobs in 2023.pdfTop Trending Cybersecurity Jobs in 2023.pdf
Top Trending Cybersecurity Jobs in 2023.pdf
infosec train
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
Timothy Warren
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
Merlin Florrence
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!Tammy Clark
 
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovation
Sonia Randhawa
 
Role management
Role managementRole management
Role management
Abidullah Zarghoon
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
Infosectrain3
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
DESTROYER39
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
360 BSI
 
CCA study group
CCA study groupCCA study group
CCA study group
IIBA UK Chapter
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
jkllee
 

Similar to Information Security Career Day Presentation (20)

Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.it
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Cyber security course in Kerala, Kochi
Cyber  security  course in Kerala, KochiCyber  security  course in Kerala, Kochi
Cyber security course in Kerala, Kochi
 
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, KochiCyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Top Trending Cybersecurity Jobs in 2023.pdf
Top Trending Cybersecurity Jobs in 2023.pdfTop Trending Cybersecurity Jobs in 2023.pdf
Top Trending Cybersecurity Jobs in 2023.pdf
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovation
 
Role management
Role managementRole management
Role management
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Information Security Career Day Presentation

  • 2. About Me Former CISO - American Airlines (AA) Former Member of Technical Staff - AA Co-Founder & Former Board Member - Aviation ISAC Content Committee Member - Numerous Conferences Advisory Board Member - Numerous Companies Board Member - North Texas Performing Arts (NTPA) Vice President, Chief Information Security Officer (CISO) NTT DATA Other Interesting Positions:
  • 3. My Work History Over 25 years professional experience Over 20 years in cybersecurity field Over 10 years as a CISO Over 10 years in technical IT and security roles: network engineering system administration email management code development Started professional career as a financial analyst
  • 4. Education Masters of Science - Information Management Bachelors of Business Administration - Finance Bachelors of Business Administration - Economics Associate of Arts - Psychology Certified Information Systems Security Professional (CISSP) Certified Information Systems Manager Certifications
  • 5. What is a CISO? The CISO (chief information security officer) is a senior- level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect employees, facilities, enterprise communications, systems, and assets from both internal and external threats. The CISO also procures cybersecurity products and services and manages the enterprise disaster recovery and business continuity plans.
  • 6.
  • 7. What is a CISO? (take 2) The CISO is responsible for managing a program and teams that protect all the people, offices, computers, applications, and information that a company uses.
  • 8. Develop, implement and monitor a strategic security and IT risk management program Work directly with the business units to facilitate risk assessment and risk management processes Develop a security management framework Interact with related disciplines to ensure the consistent application of policies and standards Provide leadership to the security organization Partner with business leaders to raise awareness of risk management concerns Assist with business technology planning, providing future vision of technology and systems What does a CISO do?
  • 9. CISO Qualifications Advanced degree in business or a technology field Minimum of 15 years of experience in a combination of risk management, information security and IT jobs Minimum of five years experience leading IT and information security professionals Excellent written and verbal communication skills and high level of personal integrity Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams Experience with common information security management frameworks
  • 10. What's interesting? I play "cat and mouse" with some of the smartest people on the planet I work with some of the brightest minds in the world I think like a criminal in order to defend against them I think through how protections impact the company The environment is always changing due to technology advancements and improved attacker techniques Information security is the most intellectually challenging and stimulating field in the world
  • 11. What's uninteresting? Meetings Spreadsheets Operational issues So. Many. Meetings. Budget cuts Interpersonal conflicts Did I mention meetings?
  • 12. Security in a nutshell Identify where security risk exists by ensuring the company is adhering to security policies Protect assets against attack and theft by deploying security technologies that block bad stuff Detect when security events occur by monitoring events from every company system Respond to security events by hiring a highly trained team of experts that contain the event Recover from security events by ensuring systems are resilient and have backups
  • 13. Jobs in security Security Analyst: reviews information looking for malicious activity Security Consultant: reviews IT systems for security design and adherence to policies Security Engineer: builds and manages technical security controls Security Architect: design security technologies and policies Security Manager: manages security functional teams Security Director: leads a functional area of the security organization CISO: sets strategy and leads the entire security program
  • 14. Firewalls block unwanted network connections Antivirus detects and blocks malicious software from running on a system Scanners probe systems looking for software weaknesses that hackers can attack Identity & Access systems ensure authorized people get access to things and unauthorized people do not Proxies monitor internet usage for known bad websites and malware from being downloaded to systems Security event managers collect and analyze millions of events that occur within a network each day System management software configure computers to policies and can update components as needed Security technologies
  • 15. Salary ranges in security Information Security Analyst: $61K - $180K Information Security Consultant: $60K - $168K Information Security Engineer: $74K - $182K Information Security Manager: $88K - $206K Information Security Architect: $70K - $180K Information Security Director: $123K - $237K CISO: $125K - $324K
  • 16. Security field outlook By 2025, it's expected that there will be 3.5 million unfilled security jobs The expected growth rate for the information security field between now and 2031 is 35% There are not enough skilled security professionals to fill the open security roles within the job market
  • 17. Technology & Security Security Analysts use software to help aggregate large data sets and pull in information from various systems Security Engineers use programming and scripting languages to automate repeatable functions Security Architects use design software to visually depict complex concepts and systems Security leadership use productivity tool suite apps such as word processors, spreadsheets, and presentation software Of course, everyone uses email and chat Technology usage for security professionals varies widely based on their specific focus:
  • 18. How to get a job in security High school degree for entry level roles College degree for more senior roles Advanced college degree for leadership roles Well rounded liberal arts knowledge (history, science, art, etc.) A keen analytical mind with the ability to solve complex problems with unique approaches Technical skill within and outside the role There is no single or straightforward path to a job in information security but there are things that are considered prerequisites: There are now degrees in cybersecurity, but it is not a must have to get a job. Here are some traits I look for: