SlideShare a Scribd company logo
SO YOU WANT TO BE IN CYBER SECURITY? 
A boy comes to me with a spark of interest, 
I feed that spark and it becomes a flame, 
I feed the flame and it becomes a fire, 
I feed the fire and it becomes a roaring blaze. 
~Cus D’Amato
//CYBER SECURITY 
The interconnection and reliance of physical lifeline functions 
over the Internet (cyberspace) that impacts our: 
• National Security 
• Public Health and Safety 
• Economic well-being 
2
WHY CYBER SECURITY IS A GOOD FIELD 
The cyber security industry is booming 
• 0% unemployment rate for qualified cyber security professionals 
~Phil Agcaoili 
• Information security jobs are expected to grow by 53% through 2018 
• Bureau of Labor Statistics 
• Average annual salary is $116,000 a year for a cyber security worker 
• Semper Secure survey 
• 25% of all organizations claim to have a “problematic shortage” of information security skills 
• Network World, 2014 
• Among the most sought-after professionals in the tech sector, with demand for workers in cyber 
security field outpacing other IT jobs by a wide margin. 
• CIO Magazine 2014 
• Demand for cybersecurity profs has grown more than 3.5x faster than the demand for other IT jobs 
over the past 5 years and more than 12x faster than the demand for all other non-IT jobs. Current 
staffing shortages are estimated between 20,000 and 40,000 and are expected to continue for years 
to come. 
• Burning Glass International 
• Critical need to fill 50,000 cyber security jobs in the near future in the federal government and private 
industry 
• Washington Post 2012 
3
CYBER SECURITY CAREER OPTIONS 
Security is a field of Service, Ethics, and Integrity 
4 
CEO 
CIO 
CSO 
CTO 
Product Leader 
Service Leader 
Board of Directors 
Corporate Governance Leader 
Internal Audit Leader 
CFO COO GC 
CISO 
Product Management 
Services Management 
Physical Security Management 
Information Security Management 
Risk Management 
Fraud Management 
Program Management 
Project Management 
Audit Management 
Risk Management 
Compliance Management 
Technologist Analyst 
Strategist 
Officer 
Investigator 
Loss Prevention 
Fraud Analyst 
Security Strategist/Principle 
Security Architect 
Security Engineer 
Security Analyst 
Security Administrator 
Auditor 
Governance Analyst 
Risk Analyst 
Compliance Analyst 
Specialty Roles 
Security Assurance – Penetration Tester 
eForensics and Litigation Support 
Threat Intelligence 
Application Security – Security Software Developer 
Identity Management 
Cryptographer 
Founder 
IT Roles 
Network Administrator 
System Administrator 
Network Management 
Database Administrator 
Developer and QA 
Operations Leader 
Managing Consultant 
Consultant
*TOP 10 CYBER SECURITY JOB TITLES 
• Security Engineer 
• Security Analyst 
• Information Security Analyst 
• Information Security Engineer 
• Network Security Engineer 
• Information Technology Security Analyst 
• Information Security Manager 
• Information Assurance Engineer 
• Senior IT Auditor 
• Security Administrator 
5 
*UMUC.edu study
*IN-DEMAND SKILLS FOR CYBER SECURITY 
JOBS 
Employers are seeking to hire employees with proficiency in: 
• Firewalls 
• Network Security 
• LINUX 
• UNIX 
• CISA 
• Cryptography 
• Cisco 
• Transmission Control Protocol/Internet Protocol (TCP/IP) 
• System and Network Configuration 
• Scanners 
4 out of 5 Cyber Security Jobs Require a Degree 
• Burning Glass International 2013 
6 
*UMUC.edu study
*TOP 5 REGIONS FOR CYBER SECURITY 
JOBS 
• Palo Alto, California 
• San Francisco, California 
• Baltimore, Maryland 
• Boston, Massachusetts 
• Denver, Colorado 
• Metropolitan areas 
7 
*UMUC.edu study
8 
Information Security Certifications
HOW I GOT HERE 
Our bravest and best lessons are not learned through 
success, but through misadventure. 
~Amos Bronson Alcott 
I have no special talent. I am only passionately curious. 
~Albert Einstein 
9
HOW DO I GET STARTED? 
Experience. Experience. Experience. 
• Systems administrator 
• Network administrator 
• Database administrator 
• Software development 
• Quality Assurance 
• Project management 
• Audit 
• Penetration testing 
• Ask…Gain experience. 
10
Hope is not a plan. 
11
Mythical Career Trajectory 
• Excel in high school 
science 
• Major in science in 
college and excel 
• Go to grad school, get 
Ph.D. in 4 years 
• Do a postdoc for 2 years 
• Publish 5-7 papers 
• Decide which tenure-track 
offer to accept at age 28 
• Rise through the faculty 
ranks, tenure by 38 
Typical Career Trajectory 
• Excel in high school 
science 
• Major in science in 
college and excel 
• Go to grad school 
because that’s what 
excellent students do 
• Hang on for six years or 
more, get PhD 
• Do a postdoc 
• Hit the wall 
• Scramble to find any job 
you can 
• Hope to someday be 
happy 
versus 
12
TYPICAL CAREER TRAJECTORY 
Cyber security has been like this for me and many others. 
13
BETTER CAREER TRAJECTORY 
• Excel in school, maybe get a Ph.D. and then start a 
postdoc because it furthers your career 
• Explore a variety of career options 
• Decide what fits your personality best 
• Set goals. Work hard and smart 
• Find a job that is challenging, rewarding and satisfying to 
YOU 
14
SOME THOUGHTS ON WHAT DRIVES US 
Autonomy 
Mastery 
Purpose 
Independence 
Purpose - Service 
Happiness 
Thanks, Mom and Dad! 
15
16
WHY PLAN YOUR CAREER? 
• You are responsible for your own career. 
• Jobs are not permanent. 
• Increase your chances of job satisfaction. 
17
WHY IS CAREER PLANNING HARD? 
• No sense of urgency 
• Leads to difficult life questions 
• Sets goals and increases stress 
• Uncovers unexamined career assumptions 
18
TWO HABITS OF HIGHLY EFFECTIVE CAREER PLANNING 
• Begin With the End in Mind 
– If you can’t see yourself as successful, you have already 
failed. 
– Where do you want to be 1, 3, 5, and 10 years from now? 
What experiences do you want? 
• Put First Things First 
– You can’t do everything, prioritize your goals. 
– Begin where you are right now. 
– Consider assignments or projects that you would like, as 
well as jobs or positions. 
– Include opportunities where you can contribute and learn. 
An essential aspect of creativity is not being afraid to fail. 
~Edwin Land, Founder of Polaroid 
19
CLOSING THOUGHTS 
Your time is limited, so don't waste it living someone else's life. 
Don't be trapped by dogma - which is living with the results of other 
people's thinking. 
Don't let the noise of others' opinions drown out your own inner voice. 
And most important, have the courage to follow your heart and intuition. 
Steve Jobs 
20
21 
Thanks 
Phil Agcaoili 
Contributor, NIST Cybersecurity Framework version 1 
Co-Founder & Board Member, Southern CISO Security Council 
Distinguished Fellow and Fellows Chairman, Ponemon Institute 
Founding Member, Cloud Security Alliance (CSA) 
Inventor & Co-Author, CSA Cloud Controls Matrix, 
GRC Stack, Security, Trust and Assurance Registry (STAR), and 
CSA Open Certification Framework (OCF) 
@hacksec 
https://www.linkedin.com/in/philA

More Related Content

What's hot

2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
APNIC
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
EC-Council
 
CNCERT International Partnership in Emergency Response Conference: Cooperatio...
CNCERT International Partnership in Emergency Response Conference: Cooperatio...CNCERT International Partnership in Emergency Response Conference: Cooperatio...
CNCERT International Partnership in Emergency Response Conference: Cooperatio...
APNIC
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Joe Bartolo
 
Ncc hackers session 4
Ncc hackers session 4Ncc hackers session 4
Ncc hackers session 4
Jemma Davis
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
Hacking Portugal v1.1
Hacking Portugal  v1.1Hacking Portugal  v1.1
Hacking Portugal v1.1
Dinis Cruz
 

What's hot (7)

2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
 
CNCERT International Partnership in Emergency Response Conference: Cooperatio...
CNCERT International Partnership in Emergency Response Conference: Cooperatio...CNCERT International Partnership in Emergency Response Conference: Cooperatio...
CNCERT International Partnership in Emergency Response Conference: Cooperatio...
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Ncc hackers session 4
Ncc hackers session 4Ncc hackers session 4
Ncc hackers session 4
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Hacking Portugal v1.1
Hacking Portugal  v1.1Hacking Portugal  v1.1
Hacking Portugal v1.1
 

Viewers also liked

Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Raleigh ISSA
 
Speak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in TechSpeak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in Tech
aubrey bach
 
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
CODECNetworks
 
Using Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary NegotiationsUsing Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary Negotiations
PayScale, Inc.
 
Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...
Christopher Clark
 
WE16 - Go for the Hot Career Field - Cybersecurity
WE16 - Go for the Hot Career Field - CybersecurityWE16 - Go for the Hot Career Field - Cybersecurity
WE16 - Go for the Hot Career Field - Cybersecurity
Society of Women Engineers
 
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew FearsonNavigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Christopher Clark
 
BSides Manchester
BSides ManchesterBSides Manchester
BSides Manchester
Jane Frankland
 
WE16 - How to Lead a Double Life
WE16 - How to Lead a Double LifeWE16 - How to Lead a Double Life
WE16 - How to Lead a Double Life
Society of Women Engineers
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
ITpreneurs
 
WE16 - The State of Women in Engineering
WE16 - The State of Women in EngineeringWE16 - The State of Women in Engineering
WE16 - The State of Women in Engineering
Society of Women Engineers
 
Fti trends 2017_final.compressed5
Fti trends 2017_final.compressed5Fti trends 2017_final.compressed5
Fti trends 2017_final.compressed5
InfoShell
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
Amazon Web Services
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
Den Reymer
 

Viewers also liked (14)

Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Speak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in TechSpeak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in Tech
 
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
 
Using Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary NegotiationsUsing Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary Negotiations
 
Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...
 
WE16 - Go for the Hot Career Field - Cybersecurity
WE16 - Go for the Hot Career Field - CybersecurityWE16 - Go for the Hot Career Field - Cybersecurity
WE16 - Go for the Hot Career Field - Cybersecurity
 
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew FearsonNavigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
 
BSides Manchester
BSides ManchesterBSides Manchester
BSides Manchester
 
WE16 - How to Lead a Double Life
WE16 - How to Lead a Double LifeWE16 - How to Lead a Double Life
WE16 - How to Lead a Double Life
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
 
WE16 - The State of Women in Engineering
WE16 - The State of Women in EngineeringWE16 - The State of Women in Engineering
WE16 - The State of Women in Engineering
 
Fti trends 2017_final.compressed5
Fti trends 2017_final.compressed5Fti trends 2017_final.compressed5
Fti trends 2017_final.compressed5
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 

Similar to 2014 - KSU - So You Want to Be in Cyber Security?

Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyberskills shortage:Where is the cyber workforce of tomorrowCyberskills shortage:Where is the cyber workforce of tomorrow
Cyberskills shortage: Where is the cyber workforce of tomorrow
Stephen Cobb
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Kimberley Dray
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
FRSecure
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222
KevinAlt1
 
Computer science Engineering
Computer science EngineeringComputer science Engineering
Computer science Engineering
M. Raja Reddy
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
FRSecure
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
Security Innovation
 
Carrier guidance for tech
Carrier guidance for techCarrier guidance for tech
Carrier guidance for tech
Mahesh Arali
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity Program
Tyrone Grandison
 
Hack the hustle!
Hack the hustle!Hack the hustle!
Hack the hustle!Eve Adams
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke
 
Engage Talent April 2018 Webinar - Major LinkedIn Changes Ahead!
Engage Talent April 2018 Webinar  - Major LinkedIn Changes Ahead! Engage Talent April 2018 Webinar  - Major LinkedIn Changes Ahead!
Engage Talent April 2018 Webinar - Major LinkedIn Changes Ahead!
Robby Gulri
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
Christopher Beiring
 
Apprenticeships - the Jisc experience
Apprenticeships - the Jisc experienceApprenticeships - the Jisc experience
Apprenticeships - the Jisc experience
Jisc
 
Stop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiserStop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiser
bhagyasri patel
 
Testing in the Year 2020: The Erosion of Governance, Management, and Excellence
Testing in the Year 2020: The Erosion of Governance, Management, and ExcellenceTesting in the Year 2020: The Erosion of Governance, Management, and Excellence
Testing in the Year 2020: The Erosion of Governance, Management, and Excellence
TechWell
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
FRSecure
 
Summer of Code 09 and How to have a kick ass ICT career
Summer of Code 09 and How to have a kick ass ICT careerSummer of Code 09 and How to have a kick ass ICT career
Summer of Code 09 and How to have a kick ass ICT career
summerofcode
 
Example of Irish Recruiters Tuesday Club 2009 Content e twitter to recruit tu...
Example of Irish Recruiters Tuesday Club 2009 Content e twitter to recruit tu...Example of Irish Recruiters Tuesday Club 2009 Content e twitter to recruit tu...
Example of Irish Recruiters Tuesday Club 2009 Content e twitter to recruit tu...
Declan Fitzgerald
 

Similar to 2014 - KSU - So You Want to Be in Cyber Security? (20)

Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyberskills shortage:Where is the cyber workforce of tomorrowCyberskills shortage:Where is the cyber workforce of tomorrow
Cyberskills shortage: Where is the cyber workforce of tomorrow
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222
 
Computer science Engineering
Computer science EngineeringComputer science Engineering
Computer science Engineering
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
Carrier guidance for tech
Carrier guidance for techCarrier guidance for tech
Carrier guidance for tech
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity Program
 
Hack the hustle!
Hack the hustle!Hack the hustle!
Hack the hustle!
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Engage Talent April 2018 Webinar - Major LinkedIn Changes Ahead!
Engage Talent April 2018 Webinar  - Major LinkedIn Changes Ahead! Engage Talent April 2018 Webinar  - Major LinkedIn Changes Ahead!
Engage Talent April 2018 Webinar - Major LinkedIn Changes Ahead!
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
 
Apprenticeships - the Jisc experience
Apprenticeships - the Jisc experienceApprenticeships - the Jisc experience
Apprenticeships - the Jisc experience
 
Stop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiserStop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiser
 
Testing in the Year 2020: The Erosion of Governance, Management, and Excellence
Testing in the Year 2020: The Erosion of Governance, Management, and ExcellenceTesting in the Year 2020: The Erosion of Governance, Management, and Excellence
Testing in the Year 2020: The Erosion of Governance, Management, and Excellence
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
Summer of Code 09 and How to have a kick ass ICT career
Summer of Code 09 and How to have a kick ass ICT careerSummer of Code 09 and How to have a kick ass ICT career
Summer of Code 09 and How to have a kick ass ICT career
 
Example of Irish Recruiters Tuesday Club 2009 Content e twitter to recruit tu...
Example of Irish Recruiters Tuesday Club 2009 Content e twitter to recruit tu...Example of Irish Recruiters Tuesday Club 2009 Content e twitter to recruit tu...
Example of Irish Recruiters Tuesday Club 2009 Content e twitter to recruit tu...
 

More from Phil Agcaoili

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
Phil Agcaoili
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
Phil Agcaoili
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
Phil Agcaoili
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Phil Agcaoili
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Phil Agcaoili
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
Phil Agcaoili
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Phil Agcaoili
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Phil Agcaoili
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
Phil Agcaoili
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
Phil Agcaoili
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
Phil Agcaoili
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
Phil Agcaoili
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
Phil Agcaoili
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for Security
Phil Agcaoili
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
Phil Agcaoili
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Phil Agcaoili
 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
Phil Agcaoili
 

More from Phil Agcaoili (20)

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for Security
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
 

Recently uploaded

Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
nidm599
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
taqyed
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
AlessandroMartins454470
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
Ben Woelk, CISSP, CPTC
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
yuhofha
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
thomasaolson2000
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
2zjra9bn
 
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
PaviBangera
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
Hector Del Castillo, CPM, CPMM
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
kakomaeric00
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
yuhofha
 
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
pxyhy
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 

Recently uploaded (20)

Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
 
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
 
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 

2014 - KSU - So You Want to Be in Cyber Security?

  • 1. SO YOU WANT TO BE IN CYBER SECURITY? A boy comes to me with a spark of interest, I feed that spark and it becomes a flame, I feed the flame and it becomes a fire, I feed the fire and it becomes a roaring blaze. ~Cus D’Amato
  • 2. //CYBER SECURITY The interconnection and reliance of physical lifeline functions over the Internet (cyberspace) that impacts our: • National Security • Public Health and Safety • Economic well-being 2
  • 3. WHY CYBER SECURITY IS A GOOD FIELD The cyber security industry is booming • 0% unemployment rate for qualified cyber security professionals ~Phil Agcaoili • Information security jobs are expected to grow by 53% through 2018 • Bureau of Labor Statistics • Average annual salary is $116,000 a year for a cyber security worker • Semper Secure survey • 25% of all organizations claim to have a “problematic shortage” of information security skills • Network World, 2014 • Among the most sought-after professionals in the tech sector, with demand for workers in cyber security field outpacing other IT jobs by a wide margin. • CIO Magazine 2014 • Demand for cybersecurity profs has grown more than 3.5x faster than the demand for other IT jobs over the past 5 years and more than 12x faster than the demand for all other non-IT jobs. Current staffing shortages are estimated between 20,000 and 40,000 and are expected to continue for years to come. • Burning Glass International • Critical need to fill 50,000 cyber security jobs in the near future in the federal government and private industry • Washington Post 2012 3
  • 4. CYBER SECURITY CAREER OPTIONS Security is a field of Service, Ethics, and Integrity 4 CEO CIO CSO CTO Product Leader Service Leader Board of Directors Corporate Governance Leader Internal Audit Leader CFO COO GC CISO Product Management Services Management Physical Security Management Information Security Management Risk Management Fraud Management Program Management Project Management Audit Management Risk Management Compliance Management Technologist Analyst Strategist Officer Investigator Loss Prevention Fraud Analyst Security Strategist/Principle Security Architect Security Engineer Security Analyst Security Administrator Auditor Governance Analyst Risk Analyst Compliance Analyst Specialty Roles Security Assurance – Penetration Tester eForensics and Litigation Support Threat Intelligence Application Security – Security Software Developer Identity Management Cryptographer Founder IT Roles Network Administrator System Administrator Network Management Database Administrator Developer and QA Operations Leader Managing Consultant Consultant
  • 5. *TOP 10 CYBER SECURITY JOB TITLES • Security Engineer • Security Analyst • Information Security Analyst • Information Security Engineer • Network Security Engineer • Information Technology Security Analyst • Information Security Manager • Information Assurance Engineer • Senior IT Auditor • Security Administrator 5 *UMUC.edu study
  • 6. *IN-DEMAND SKILLS FOR CYBER SECURITY JOBS Employers are seeking to hire employees with proficiency in: • Firewalls • Network Security • LINUX • UNIX • CISA • Cryptography • Cisco • Transmission Control Protocol/Internet Protocol (TCP/IP) • System and Network Configuration • Scanners 4 out of 5 Cyber Security Jobs Require a Degree • Burning Glass International 2013 6 *UMUC.edu study
  • 7. *TOP 5 REGIONS FOR CYBER SECURITY JOBS • Palo Alto, California • San Francisco, California • Baltimore, Maryland • Boston, Massachusetts • Denver, Colorado • Metropolitan areas 7 *UMUC.edu study
  • 8. 8 Information Security Certifications
  • 9. HOW I GOT HERE Our bravest and best lessons are not learned through success, but through misadventure. ~Amos Bronson Alcott I have no special talent. I am only passionately curious. ~Albert Einstein 9
  • 10. HOW DO I GET STARTED? Experience. Experience. Experience. • Systems administrator • Network administrator • Database administrator • Software development • Quality Assurance • Project management • Audit • Penetration testing • Ask…Gain experience. 10
  • 11. Hope is not a plan. 11
  • 12. Mythical Career Trajectory • Excel in high school science • Major in science in college and excel • Go to grad school, get Ph.D. in 4 years • Do a postdoc for 2 years • Publish 5-7 papers • Decide which tenure-track offer to accept at age 28 • Rise through the faculty ranks, tenure by 38 Typical Career Trajectory • Excel in high school science • Major in science in college and excel • Go to grad school because that’s what excellent students do • Hang on for six years or more, get PhD • Do a postdoc • Hit the wall • Scramble to find any job you can • Hope to someday be happy versus 12
  • 13. TYPICAL CAREER TRAJECTORY Cyber security has been like this for me and many others. 13
  • 14. BETTER CAREER TRAJECTORY • Excel in school, maybe get a Ph.D. and then start a postdoc because it furthers your career • Explore a variety of career options • Decide what fits your personality best • Set goals. Work hard and smart • Find a job that is challenging, rewarding and satisfying to YOU 14
  • 15. SOME THOUGHTS ON WHAT DRIVES US Autonomy Mastery Purpose Independence Purpose - Service Happiness Thanks, Mom and Dad! 15
  • 16. 16
  • 17. WHY PLAN YOUR CAREER? • You are responsible for your own career. • Jobs are not permanent. • Increase your chances of job satisfaction. 17
  • 18. WHY IS CAREER PLANNING HARD? • No sense of urgency • Leads to difficult life questions • Sets goals and increases stress • Uncovers unexamined career assumptions 18
  • 19. TWO HABITS OF HIGHLY EFFECTIVE CAREER PLANNING • Begin With the End in Mind – If you can’t see yourself as successful, you have already failed. – Where do you want to be 1, 3, 5, and 10 years from now? What experiences do you want? • Put First Things First – You can’t do everything, prioritize your goals. – Begin where you are right now. – Consider assignments or projects that you would like, as well as jobs or positions. – Include opportunities where you can contribute and learn. An essential aspect of creativity is not being afraid to fail. ~Edwin Land, Founder of Polaroid 19
  • 20. CLOSING THOUGHTS Your time is limited, so don't waste it living someone else's life. Don't be trapped by dogma - which is living with the results of other people's thinking. Don't let the noise of others' opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. Steve Jobs 20
  • 21. 21 Thanks Phil Agcaoili Contributor, NIST Cybersecurity Framework version 1 Co-Founder & Board Member, Southern CISO Security Council Distinguished Fellow and Fellows Chairman, Ponemon Institute Founding Member, Cloud Security Alliance (CSA) Inventor & Co-Author, CSA Cloud Controls Matrix, GRC Stack, Security, Trust and Assurance Registry (STAR), and CSA Open Certification Framework (OCF) @hacksec https://www.linkedin.com/in/philA

Editor's Notes

  1. Infosec will be here forever – Good guys and bad guys have always existed and this is just a new medium