SlideShare a Scribd company logo
Ed Adams
Opening the Talent Spigot
Securing our Digital Future
About Me
• Director, ICMCP
• CEO, Security Innovation Inc.
• Mechanical Engineer, Software Engineer
• Research Fellow, Ponemon Institute
• Privacy by Design Ambassador
• In younger days, built non-lethal weapons
systems for government & law enforcement
Agenda
 Cybersecurity Skills Shortage & Diversity Imbalance
• PCI Impact on Cybersecurity
• Lessons Learned, Tips and References
Cybersecurity Skills Shortage
* Cybersecurity Jobs Report, Cybersecurity Ventures, sponsored by Herjavec Group
# The National Association of Software and Services Companies (NASSCOM)
“Until we can
rectify the quality
of education and
training that our
new cyber experts
receive, we will
continue to be
outpaced by the
Black Hats.”
- Robert Herjavec
• 3,500,000 million unfilled cybersecurity positions by 2021*
• India alone will need 1 million cybersecurity professionals by 2020#
• Israel (2nd largest exporter of cybersecurity tech after USA) leads
employer demand for cybersecurity talent by a wide margin
• “The Cybersecurity Talent Gap Is An Industry Crisis” – Forbes
• Cybercrime to cost the world $6 trillion annually by 2021*
No wonder the PCI DSS is so Necessary!
Cybersecurity Diversity Imbalance
by the numbers
Sources: Europa Eurostat May 2019; Center for Cyber Safety and Education;
https://www.catalyst.org; www.icmcp.org
“The under-
participation by large
segments of our
society represents a
loss of opportunity for
individuals, a loss of
talent in the workforce,
and a loss of creativity
in shaping the future of
cybersecurity.”
- Aric Perminter
• EU-28 Female workforce = 45%; Cybersecurity = 7%
• US Workforce
• Black/AA = 12%; STEM = 6%
• Hispanic = 15%; STEM = 7%
Cybersecurity Diversity Imbalance
by the numbers
Cybersecurity Diversity Imbalance
by the numbers
“Measures that can
be taken by
organizations to
help foster,
promote and
nurture the
success of this
group include
mentorship and
training
programs.”
Agenda
• Cybersecurity Skills Shortage & Diversity Imbalance
 PCI Impact on Cybersecurity
• Lessons learned, Tips and References
PCI DSS
“Arguably the most
influential, widely-
adopted non-
government/regula
tory standards ever
created for
cybersecurity”
- Ed Adams
• Since December 2004:
• Number of PCI certifications available 0  10+
• Introduced AppSec requirements in June 2006
• Full-stack coverage: network & systems, encryption, access controls,
identity management, staff training, etc.
• New PCI SSF addressing biggest threat to cybersecurity: software
• Cross-referenced and mapped to other standards
o e.g., NIST Cybersecurity Framework
• No breach of a fully PCI-DSS compliant organization in 14 years*
Always ahead of threat and attack landscape
* 2018 Verizon Data Breach Investigation Report (DBIR)
PCI DSS compliance
Worldwide
Overall compliance increasing but…
• Small dip in 2017
• GDPR pre-occupation?
• Not equal across industries
• IT services 77.8%
• Retail 56.3%
• Financial Services 47.9%
• Hospitality organizations 38.5%
• Is customer accountability a driver?
*Verizon 2018 Payment Security Report
PCI Training & Qualification Programs
Talk about Specialization
3.5M
Jobs
PCI
Standards
Large
Body of
Keen
Talent
The easiest puzzle we’ll ever do!
• Supply: Those looking for cybersecurity jobs
o Master a PCI domain and be in demand
• Demand: Those looking to hire cybersecurity talent
o Consider developing via PCI/cybersecurity training
o Partner with minority groups for mentorship, recruitment,
train-to-hire paths, etc.
• Motivation: Get involved, personal or corporate
• ICMCP: https://www.icmcp.org
• WISP: https://www.wisporg.com/
3 highly complementary pieces
PCI Related Careers
Technical or Business
Sample Titles
• PCI Consultant
• PCI Analyst
• Project Manager – PCI
• InfoSec Manager
• PCI DSS Auditor
• Data Architect
• Compliance Officer
• Information Risk Manager
Jobs can focus
directly on PCI DSS,
have it as a subset,
be technical, or
more business
focused
Cybersecurity & PCI Education Resources
Many excellent free (and paid) options
PCI SSC
• https://www.pcisecuritystandards.org/program_training_and_qualification/webinars
• https://www.pcisecuritystandards.org/program_training_and_qualification/
US FTC
• https://www.ftc.gov/tips-advice/business-center/small-businesses/cybersecurity
NIST National Initiative for Cybersecurity Education (NICE)
• https://niccs.us-cert.gov/training
• https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework
OWASP Academy:
• https://owasp-academy.teachable.com/
Security Innovation CBT and Cyber Range:
• https://www.securityinnovation.com/training/
• https://www.securityinnovation.com/about/community/
Benefits of Workplace Diversity
Diversity means
varying gender, age,
religion, race,
ethnicity, cultural
background, sexual
orientation,
language, education,
abilities, etc.
The Proof is in the Pudding
Diversity has positive cultural AND business benefit
• Harvard Business Review
 Diverse teams are able to solve problems faster than cognitively similar people.
• McKinsey’s research
 Gender-diverse companies are 15% more likely to outperform their peers
 Ethnically-diverse companies are 35% more likely to do the same
• Catalyst research
 Companies with more women on the board statistically outperform peers
• Deloitte research
 Inclusive teams outperform their peers by 80% in team-based assessments
 Engagement is an outcome of diversity and inclusion.
Agenda
• Cybersecurity Skills Shortage & Diversity Imbalance
• PCI Impact on Cybersecurity
 Less Learned, Tips and References
Edna Conway, CSO
Global Value Chain, Cisco
• Need for education at multiple levels
• Pre-college STEM program, e.g., middle school digital natives
• Girl scouts cyber badge
• Embed security into existing (and excellent) programs
• e.g. FIRST https://www.firstinspires.org/
• Mission: position security as not just for engineers and scientists
• Her path: English Literature undergraduate degree then law school
• Invest in diversity groups at enterprises
• Many grass roots efforts; combine to gain economies of scale
• Men for Women / Him for Her
• “Do it with love. Do it because you care.”
• “Choose to help just 1 person and watch the ripples.”
Julian Waits
GM Cyber BU, Devo
• Frequent speaker at colleges, universities, and tech conferences
• What works well
• Must have commitment and passion from the people at the top of the organization
• Must fund initiatives for diversity & inclusion (D&I) … build a program
• Community of people with one voice, willing to push comfort boundaries on D&I issue
• Pick your area of focus: women, minorities, LGBTQ, whatever
• What doesn’t work
• D&I initiative that alienates others
• Others outside of your group aren’t the enemy
• Cybersecurity mentor was Caucasian
• Passion without a realistic strategy for success… treat your D&I program like a business
• PCI standards represents hugely important component of cybersecurity
• Only part of the security equation
Marybeth Westmoreland
CTO, Blackbaud
• What worked well
• Partnering with local universities through sponsoring equipment, clubs, etc.
• Cross functional Executive Women’s Leadership Council
• Spreads the “why”?
• Form allies with other internal groups: veterans, LGBT, etc.
• Make sure people feel secure in participating, promoting, etc.
• Challenges faced
• Minorities felt isolation in Scrum chain (worked hard to correct)
• Women/minorities went into product management & marketing instead of tech
• Career pathing was unclear; engaged HR to help
• Disparity widens as one elevates up the seniority ranks (sensitize C-suite)
• Unconscious biased training – must match to corporate culture
Vandana Varma
Security Solutions Architect, IBM Software Labs
Women in Cybersecurity Advocate
• Initiated InfoSec Girls in India to remove intimidation barrier
• Delivers free OWASP training to all diversity groups (3rd gender, any religion, whatever)
• Personal and professional impact
• Encourages continual dialogue
• Focuses on removing obstacles, primarily knowledge ones
• Had a mentor (male) who exposed her to InfoSec
• Thoughts on PCI Standards
• Has been a great door opener for women & minorities, especially in audit
• Mandatory gives it teeth and keeps security top of mind
• HUGE opportunity for minorities to get into Cybersecurity
• Advice
• Need for differentiation; focus on niche sectors (e.g. law and psychology)
• “Remove group think.” Go beyond “xyz for xyz”
Partnered with SI for D&I
Me
• Motivation
• Wife’s personal and professional experiences
• Tired of seeing ”myself” at CEO roundtables, board meetings, etc.
• Professional and personal initiatives
• Participate in Glassdoor Equal Pay Day
• Lean In member: practice tips as CEO of Security Innovation
• Run regular hacking events for LGBT, Women, Minorities
• DEFCON and ICMCP scholarship programs
• 13-week child leave policy
• Staff sensitivity training for transgender employees
• Impact I’ve seen
• Employees “coming out of shells”
• Employees getting involved
• Career changes
Conclusion
• Perfect storm to address multiple industry problems
 PCI standards + Keen, Capable Minority Population + Training  Fill millions of cybersecurity jobs
• Rising tides lifts all boats
• Cybersecurity is a business problem, not technical problem
 “Getting into security” doesn’t mean you have to be a hacker or coder
• Start early
 Promote STEM programs; encourage girls and minorities to stick with it
• Start small
 One mentorship, one program, one person
Good social, cultural, and business reasons to build diverse workforce
Ed Adams
Opening the Talent Spigot
Securing our Digital Future
@AppSec linkedin.com/in/edadamsboston/

More Related Content

Similar to Opening the Talent Spigot to Securing our Digital Future

Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurity
Sandra (Sandy) Dunn
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
FRSecure
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity Program
Tyrone Grandison
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
hdicapitalarea
 
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyberskills shortage:Where is the cyber workforce of tomorrowCyberskills shortage:Where is the cyber workforce of tomorrow
Cyberskills shortage: Where is the cyber workforce of tomorrow
Stephen Cobb
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Murray Security Services
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
David Germain
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
Boni Yeamin
 
Networked Business Initiative partner presentation 2014
Networked Business Initiative partner presentation 2014Networked Business Initiative partner presentation 2014
Networked Business Initiative partner presentation 2014
Networked Busniess Initiative
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1
FRSecure
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
SagarNegi10
 
Hacking hired [Forecasting 2021] Jan 2021
Hacking hired [Forecasting 2021] Jan 2021Hacking hired [Forecasting 2021] Jan 2021
Hacking hired [Forecasting 2021] Jan 2021
Rachel Harpley
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
Universitas Bina Darma Palembang
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
SagarNegi10
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
centralohioissa
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
Courtney King
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
Dinesh O Bareja
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke
 

Similar to Opening the Talent Spigot to Securing our Digital Future (20)

Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurity
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity Program
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyberskills shortage:Where is the cyber workforce of tomorrowCyberskills shortage:Where is the cyber workforce of tomorrow
Cyberskills shortage: Where is the cyber workforce of tomorrow
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 
Networked Business Initiative partner presentation 2014
Networked Business Initiative partner presentation 2014Networked Business Initiative partner presentation 2014
Networked Business Initiative partner presentation 2014
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
Hacking hired [Forecasting 2021] Jan 2021
Hacking hired [Forecasting 2021] Jan 2021Hacking hired [Forecasting 2021] Jan 2021
Hacking hired [Forecasting 2021] Jan 2021
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 

More from Security Innovation

Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
Security Innovation
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Security Innovation
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Security Innovation
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
Security Innovation
 
5 Ways To Train Security Champions
5 Ways To Train Security Champions5 Ways To Train Security Champions
5 Ways To Train Security Champions
Security Innovation
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
Security Innovation
 
How to Hijack a Pizza Delivery Robot with Injection Flaws
How to Hijack a Pizza Delivery Robot with Injection FlawsHow to Hijack a Pizza Delivery Robot with Injection Flaws
How to Hijack a Pizza Delivery Robot with Injection Flaws
Security Innovation
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software Systems
Security Innovation
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
Security Innovation
 
Slashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do'sSlashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do's
Security Innovation
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
Security Innovation
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
 
Cyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecurityCyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to Security
Security Innovation
 
Is Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionIs Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar Question
Security Innovation
 
Privacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaPrivacy: The New Software Development Dilemma
Privacy: The New Software Development Dilemma
Security Innovation
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Security Innovation
 
Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?
Security Innovation
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to Vulnerabilities
Security Innovation
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
Security Innovation
 

More from Security Innovation (20)

Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
5 Ways To Train Security Champions
5 Ways To Train Security Champions5 Ways To Train Security Champions
5 Ways To Train Security Champions
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
How to Hijack a Pizza Delivery Robot with Injection Flaws
How to Hijack a Pizza Delivery Robot with Injection FlawsHow to Hijack a Pizza Delivery Robot with Injection Flaws
How to Hijack a Pizza Delivery Robot with Injection Flaws
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software Systems
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Slashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do'sSlashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do's
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Cyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecurityCyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to Security
 
Is Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionIs Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar Question
 
Privacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaPrivacy: The New Software Development Dilemma
Privacy: The New Software Development Dilemma
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to Vulnerabilities
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
 

Recently uploaded

Why you need to recognize your employees? (15 reasons + tips)
Why you need to recognize your employees? (15 reasons + tips)Why you need to recognize your employees? (15 reasons + tips)
Why you need to recognize your employees? (15 reasons + tips)
Vantage Circle
 
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
akhxc
 
The Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR ComplianceThe Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR Compliance
Aggregage
 
HRMantra: AI-Powered HR Automation for the Modern Workplace
HRMantra: AI-Powered HR Automation for the Modern WorkplaceHRMantra: AI-Powered HR Automation for the Modern Workplace
HRMantra: AI-Powered HR Automation for the Modern Workplace
HRMantra Software Pvt. Ltd
 
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
mshd9m30
 
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
mshd9m30
 
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
mshd9m30
 
Case Study : Mentoring at Roscoe Property Management
Case Study : Mentoring at Roscoe Property ManagementCase Study : Mentoring at Roscoe Property Management
Case Study : Mentoring at Roscoe Property Management
jesikacherry1993
 
How to write job description to attract talents
How to write job description to attract talentsHow to write job description to attract talents
How to write job description to attract talents
recruitment2015
 
Webinar - How to Craft a Winning Compensation Strategy
Webinar - How to Craft a Winning Compensation StrategyWebinar - How to Craft a Winning Compensation Strategy
Webinar - How to Craft a Winning Compensation Strategy
PayScale, Inc.
 
GUIA_LEGAL_CHAPTER_5_LABORAL_REGIMEN.pdf
GUIA_LEGAL_CHAPTER_5_LABORAL_REGIMEN.pdfGUIA_LEGAL_CHAPTER_5_LABORAL_REGIMEN.pdf
GUIA_LEGAL_CHAPTER_5_LABORAL_REGIMEN.pdf
ProexportColombia1
 
Rhavi santosa Portfolio until june 2024 .pptx
Rhavi santosa Portfolio until june 2024 .pptxRhavi santosa Portfolio until june 2024 .pptx
Rhavi santosa Portfolio until june 2024 .pptx
RhaviSantosa
 

Recently uploaded (12)

Why you need to recognize your employees? (15 reasons + tips)
Why you need to recognize your employees? (15 reasons + tips)Why you need to recognize your employees? (15 reasons + tips)
Why you need to recognize your employees? (15 reasons + tips)
 
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
 
The Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR ComplianceThe Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR Compliance
 
HRMantra: AI-Powered HR Automation for the Modern Workplace
HRMantra: AI-Powered HR Automation for the Modern WorkplaceHRMantra: AI-Powered HR Automation for the Modern Workplace
HRMantra: AI-Powered HR Automation for the Modern Workplace
 
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
 
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
 
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
 
Case Study : Mentoring at Roscoe Property Management
Case Study : Mentoring at Roscoe Property ManagementCase Study : Mentoring at Roscoe Property Management
Case Study : Mentoring at Roscoe Property Management
 
How to write job description to attract talents
How to write job description to attract talentsHow to write job description to attract talents
How to write job description to attract talents
 
Webinar - How to Craft a Winning Compensation Strategy
Webinar - How to Craft a Winning Compensation StrategyWebinar - How to Craft a Winning Compensation Strategy
Webinar - How to Craft a Winning Compensation Strategy
 
GUIA_LEGAL_CHAPTER_5_LABORAL_REGIMEN.pdf
GUIA_LEGAL_CHAPTER_5_LABORAL_REGIMEN.pdfGUIA_LEGAL_CHAPTER_5_LABORAL_REGIMEN.pdf
GUIA_LEGAL_CHAPTER_5_LABORAL_REGIMEN.pdf
 
Rhavi santosa Portfolio until june 2024 .pptx
Rhavi santosa Portfolio until june 2024 .pptxRhavi santosa Portfolio until june 2024 .pptx
Rhavi santosa Portfolio until june 2024 .pptx
 

Opening the Talent Spigot to Securing our Digital Future

  • 1. Ed Adams Opening the Talent Spigot Securing our Digital Future
  • 2. About Me • Director, ICMCP • CEO, Security Innovation Inc. • Mechanical Engineer, Software Engineer • Research Fellow, Ponemon Institute • Privacy by Design Ambassador • In younger days, built non-lethal weapons systems for government & law enforcement
  • 3. Agenda  Cybersecurity Skills Shortage & Diversity Imbalance • PCI Impact on Cybersecurity • Lessons Learned, Tips and References
  • 4. Cybersecurity Skills Shortage * Cybersecurity Jobs Report, Cybersecurity Ventures, sponsored by Herjavec Group # The National Association of Software and Services Companies (NASSCOM) “Until we can rectify the quality of education and training that our new cyber experts receive, we will continue to be outpaced by the Black Hats.” - Robert Herjavec • 3,500,000 million unfilled cybersecurity positions by 2021* • India alone will need 1 million cybersecurity professionals by 2020# • Israel (2nd largest exporter of cybersecurity tech after USA) leads employer demand for cybersecurity talent by a wide margin • “The Cybersecurity Talent Gap Is An Industry Crisis” – Forbes • Cybercrime to cost the world $6 trillion annually by 2021* No wonder the PCI DSS is so Necessary!
  • 5. Cybersecurity Diversity Imbalance by the numbers Sources: Europa Eurostat May 2019; Center for Cyber Safety and Education; https://www.catalyst.org; www.icmcp.org “The under- participation by large segments of our society represents a loss of opportunity for individuals, a loss of talent in the workforce, and a loss of creativity in shaping the future of cybersecurity.” - Aric Perminter • EU-28 Female workforce = 45%; Cybersecurity = 7% • US Workforce • Black/AA = 12%; STEM = 6% • Hispanic = 15%; STEM = 7%
  • 7. Cybersecurity Diversity Imbalance by the numbers “Measures that can be taken by organizations to help foster, promote and nurture the success of this group include mentorship and training programs.”
  • 8. Agenda • Cybersecurity Skills Shortage & Diversity Imbalance  PCI Impact on Cybersecurity • Lessons learned, Tips and References
  • 9. PCI DSS “Arguably the most influential, widely- adopted non- government/regula tory standards ever created for cybersecurity” - Ed Adams • Since December 2004: • Number of PCI certifications available 0  10+ • Introduced AppSec requirements in June 2006 • Full-stack coverage: network & systems, encryption, access controls, identity management, staff training, etc. • New PCI SSF addressing biggest threat to cybersecurity: software • Cross-referenced and mapped to other standards o e.g., NIST Cybersecurity Framework • No breach of a fully PCI-DSS compliant organization in 14 years* Always ahead of threat and attack landscape * 2018 Verizon Data Breach Investigation Report (DBIR)
  • 10. PCI DSS compliance Worldwide Overall compliance increasing but… • Small dip in 2017 • GDPR pre-occupation? • Not equal across industries • IT services 77.8% • Retail 56.3% • Financial Services 47.9% • Hospitality organizations 38.5% • Is customer accountability a driver? *Verizon 2018 Payment Security Report
  • 11. PCI Training & Qualification Programs Talk about Specialization
  • 12. 3.5M Jobs PCI Standards Large Body of Keen Talent The easiest puzzle we’ll ever do! • Supply: Those looking for cybersecurity jobs o Master a PCI domain and be in demand • Demand: Those looking to hire cybersecurity talent o Consider developing via PCI/cybersecurity training o Partner with minority groups for mentorship, recruitment, train-to-hire paths, etc. • Motivation: Get involved, personal or corporate • ICMCP: https://www.icmcp.org • WISP: https://www.wisporg.com/ 3 highly complementary pieces
  • 13. PCI Related Careers Technical or Business Sample Titles • PCI Consultant • PCI Analyst • Project Manager – PCI • InfoSec Manager • PCI DSS Auditor • Data Architect • Compliance Officer • Information Risk Manager Jobs can focus directly on PCI DSS, have it as a subset, be technical, or more business focused
  • 14. Cybersecurity & PCI Education Resources Many excellent free (and paid) options PCI SSC • https://www.pcisecuritystandards.org/program_training_and_qualification/webinars • https://www.pcisecuritystandards.org/program_training_and_qualification/ US FTC • https://www.ftc.gov/tips-advice/business-center/small-businesses/cybersecurity NIST National Initiative for Cybersecurity Education (NICE) • https://niccs.us-cert.gov/training • https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework OWASP Academy: • https://owasp-academy.teachable.com/ Security Innovation CBT and Cyber Range: • https://www.securityinnovation.com/training/ • https://www.securityinnovation.com/about/community/
  • 15. Benefits of Workplace Diversity Diversity means varying gender, age, religion, race, ethnicity, cultural background, sexual orientation, language, education, abilities, etc.
  • 16. The Proof is in the Pudding Diversity has positive cultural AND business benefit • Harvard Business Review  Diverse teams are able to solve problems faster than cognitively similar people. • McKinsey’s research  Gender-diverse companies are 15% more likely to outperform their peers  Ethnically-diverse companies are 35% more likely to do the same • Catalyst research  Companies with more women on the board statistically outperform peers • Deloitte research  Inclusive teams outperform their peers by 80% in team-based assessments  Engagement is an outcome of diversity and inclusion.
  • 17. Agenda • Cybersecurity Skills Shortage & Diversity Imbalance • PCI Impact on Cybersecurity  Less Learned, Tips and References
  • 18. Edna Conway, CSO Global Value Chain, Cisco • Need for education at multiple levels • Pre-college STEM program, e.g., middle school digital natives • Girl scouts cyber badge • Embed security into existing (and excellent) programs • e.g. FIRST https://www.firstinspires.org/ • Mission: position security as not just for engineers and scientists • Her path: English Literature undergraduate degree then law school • Invest in diversity groups at enterprises • Many grass roots efforts; combine to gain economies of scale • Men for Women / Him for Her • “Do it with love. Do it because you care.” • “Choose to help just 1 person and watch the ripples.”
  • 19. Julian Waits GM Cyber BU, Devo • Frequent speaker at colleges, universities, and tech conferences • What works well • Must have commitment and passion from the people at the top of the organization • Must fund initiatives for diversity & inclusion (D&I) … build a program • Community of people with one voice, willing to push comfort boundaries on D&I issue • Pick your area of focus: women, minorities, LGBTQ, whatever • What doesn’t work • D&I initiative that alienates others • Others outside of your group aren’t the enemy • Cybersecurity mentor was Caucasian • Passion without a realistic strategy for success… treat your D&I program like a business • PCI standards represents hugely important component of cybersecurity • Only part of the security equation
  • 20. Marybeth Westmoreland CTO, Blackbaud • What worked well • Partnering with local universities through sponsoring equipment, clubs, etc. • Cross functional Executive Women’s Leadership Council • Spreads the “why”? • Form allies with other internal groups: veterans, LGBT, etc. • Make sure people feel secure in participating, promoting, etc. • Challenges faced • Minorities felt isolation in Scrum chain (worked hard to correct) • Women/minorities went into product management & marketing instead of tech • Career pathing was unclear; engaged HR to help • Disparity widens as one elevates up the seniority ranks (sensitize C-suite) • Unconscious biased training – must match to corporate culture
  • 21. Vandana Varma Security Solutions Architect, IBM Software Labs Women in Cybersecurity Advocate • Initiated InfoSec Girls in India to remove intimidation barrier • Delivers free OWASP training to all diversity groups (3rd gender, any religion, whatever) • Personal and professional impact • Encourages continual dialogue • Focuses on removing obstacles, primarily knowledge ones • Had a mentor (male) who exposed her to InfoSec • Thoughts on PCI Standards • Has been a great door opener for women & minorities, especially in audit • Mandatory gives it teeth and keeps security top of mind • HUGE opportunity for minorities to get into Cybersecurity • Advice • Need for differentiation; focus on niche sectors (e.g. law and psychology) • “Remove group think.” Go beyond “xyz for xyz”
  • 22. Partnered with SI for D&I Me • Motivation • Wife’s personal and professional experiences • Tired of seeing ”myself” at CEO roundtables, board meetings, etc. • Professional and personal initiatives • Participate in Glassdoor Equal Pay Day • Lean In member: practice tips as CEO of Security Innovation • Run regular hacking events for LGBT, Women, Minorities • DEFCON and ICMCP scholarship programs • 13-week child leave policy • Staff sensitivity training for transgender employees • Impact I’ve seen • Employees “coming out of shells” • Employees getting involved • Career changes
  • 23. Conclusion • Perfect storm to address multiple industry problems  PCI standards + Keen, Capable Minority Population + Training  Fill millions of cybersecurity jobs • Rising tides lifts all boats • Cybersecurity is a business problem, not technical problem  “Getting into security” doesn’t mean you have to be a hacker or coder • Start early  Promote STEM programs; encourage girls and minorities to stick with it • Start small  One mentorship, one program, one person Good social, cultural, and business reasons to build diverse workforce
  • 24. Ed Adams Opening the Talent Spigot Securing our Digital Future @AppSec linkedin.com/in/edadamsboston/

Editor's Notes

  1. In Israel, 80 percent of those interviewed reported a shortage of workers
  2. Aric Perminter, co-founder and President of ICMCP
  3. For 6 years SI partnered with PCI SSC to build and host all online PCI-sanctioned CBT and we put hundreds of thousands of people thorough those courses.
  4. Here’s an example, when ICMCP had it’s West Coast Summit several months ago, an African-American male participant informed me that he was having a hard time finding a Black mentor and did not know what to do. My response, find a white, Asian, or something else mentor. I explained to him that I started my IT career in the ‘80s when there were no other people who looked like me there to mentor me. If it had not been for my white manager, a guy from Mississippi, who saw something of interest in me, I most probably would have chosen another discipline for my occupation. Before joining the effort to create ICMCP, I had been approached by several organizations that had been around for years, but had no real impact. When I dug into why this was the case, I learned that while several of these organizations had passionate leadership, that leadership never looked at its weaknesses from the lens of how to successfully execute a plan to fulfill their vision. I feel that PCI, while hugely important, only represents a component of the security equation. Many organizations only commit to the minimum as it relates to PCI, so they can check the box. The problem is attackers change their tactics incessantly and the standard will never have the capacity to keep up with the velocity of attacks that enter the market seemingly daily.