SlideShare a Scribd company logo
Spy vs Spy:
Protecting Secrets
A Career in Information Security is a Career in Protecting Secrets
Michael Scheidell, CCISO, Security Privateers
http://slidesha.re/T00Kq7
Information Techology: Road to the Future
Hardware
Management
.
Software
• Computer Research
• Info Systems Managers
• Hardware Engineers
• Computer Programmers
• Support Specialists
• Systems Analysts
• Data Base Administrator
• Web Developers
• Network Architechs
World Wide Jobs
Example text
Chief Information
Security Officer
• MIS Degree
• Internship
• ISACA CSX Cert
• Security Engineer
• CISSP, CRISK
• Sr. Security
Architech
• MBA Degree
• VP/Dir of IT
Security
• CCISO Cert
Like Working with People?
Look into Management
 Started doing database programming
 Moved into Real time/Control Systems
 1994, helped Government adjust to ‘the net’
 Invented and Patented Security Appliance
 Traveled to Costa Rica, Panama, Jamaica, Canada
 Got to play with Trains (Risk Assessment, DHS contract)
 Invited to speak at security conferences, including Cairo
 Trained FBI agents, worked with Secret Service
 On TV and quoted by Sun Sentinel
 Get paid to break into banks!
Michael Scheidell
Chief Information Security Officer
Programming
• Web Applications
• E-Commerce Systems
• Mobile Applications
Hardware Engineer
• Computer Science
• Firewalls
• IDS/IPS/Patents
Security Architect
• Design company’s network
• Security is top priority
• Privacy matters
Your own footer Your Logo
Bits and Bytes Your thing?
Top 10 jobs in Information Security
1. Information Security Crime / Forensics Expert
2. Web Application/ Penetration Testing
3. Forensic Analyst
4. Incident Responder
5. Security Architect
6. Malware Analyst
7. Network Security Engineer
8. Security Analyst
9. Computer Crime Investigator
10. Chief Information Security Officer/CISO/ISO/VP
Information Security Crime Investigator
 Investigation of computer crimes
 Driven by Curiosity
 Expert witness testimony in court
 Consulting firms, PwC, IBM
 Private Eye, Law Enforcement: FBI, Secret Service
 Knowledge of Pen Testing, Computer
Forensics, Reverse Engineering
 BS:CS, MS:LE, 3+ years, CEH, CPT
 22% Growth, $50K to 100K (gvmt or private)
Web Application / Penetration Testing
 Computer Games: Red Team, Black Team
 Get paid to break into Banks
 Part of an IT Audit or Assessment Team
 Opportunity for Travel
 Consulting firms, PwC, IBM
 Direct Hire for Business or Government
 Stepping stone to IT Auditor
 BS/4+ years experience, CEH, CISSP
 Growth 15%, $55-88K a year
Forensic Analyst
 Information Systems Analyst
 Network Security Engineer
 Computer Forensics Consultant/Engineer
 Programming, Reverse Engineering
 Experience in Malware, APT, Windows, Linux
 Works with Law Enforcement
 MS/6+ years experience, CEH, CISSP
 $50K to 100K, Mgmt $200K
Incident Responder
 Prep for Forensic Analyst/ Investigator/ Manager
 On the Firing line
 Work in real time to stop and document attacks
 Knowledge of Networking, Firewalls
 Experience in Malware, APT, Windows, Linux
 BS/3+
 $65k to 83K
Security Architect
 Prep for Forensic Analyst/ Investigator/ Manager
 On the Firing line
 Work in real time to stop and document attacks
 Knowledge of Networking, Firewalls
 Experience in Malware, APT, Windows, Linux
 BS/3+, Certs: CEH, CompTia Network, CPT, CISSP
 $55K to 90K
Malware Analyst
 Examine, identify, and understand
viruses, worms, Trojans, bots, rootkits
 Knowledge of reverse engineering and software
development
 Programming, C, Perl, PHP, assembler.
 Experience in Malware, APT, Windows, Linux
 Government, Business, AV companies
 BS/3+, Certs: CEH, CPT, CISSP
 $50 to 100K
Network Security Engineer
 Work with Security Architect
 Build, monitor and maintain secure network
 Knowledge of TCP/IP
 Understand IDS/Firewalls/DMZ/VPN’s
 Understand test and analysis tools (sniffers, snort)
 Some Programming or scripting (C, Perl, Java)
 BS/3+, Certs: CISSP, CCNA/CCIE
 $DOE: $70K to 130K (Sr, 5+years, MS Degree)
Security Analyst
 Planning and implementing security measures
 Stay up to date with latest intelligence
 Anticipate Security Breaches
 Prevent loss and service interruptions
 Perform Risk Assessments
 Install Firewalls, Data Encryption
 Security Awareness Training
 MS/5+, CISSP, CISM, CISA, CRISK
 $80K Average to $125K, 22% Job Growth
Computer Crime Investigator
 Recovery of hidden, encrypted or deleted files
 Investigates computer crime, fraud and hacking
 Gather evidence
 Reconstruct damaged computer systems
 Testify in court
 Train Law enforcement on computer related issues
 MS/4+, CISSP, CEH, CPT
 $50K to $100K (or more for consultants)
 22% Growth
Chief Information Security Officer/CISO
 Top Dog in Information Security
 Knows Everything
 forensics, pen testing, auditing, incident response, web app
testing, programming, accounting, business
 Speaking, Training, Mentoring
 Works with CEO/CIO/CTO/CFO/COO
 Only works half days (7am to 7pm)
 <10ys $125 to 150K, > 10yrs $180K to 225K
 Fortune 100 companies, could be in millions
 MIS degree, MBA Degree
 Certs: CISSP, CCISO, CISM, CISA, CRISK
Education:
 NAF: Academy of Information Technology (AOIT)
 Nova Southeast University
 Florida International University
 Florida Atlantic University
 Master of Science in Management Information
Systems (MMIS)
 Master of Science in Information Systems (MSIS)
with security focus
 Master of Business Administration (MBA)
 CISO: Chief Information Security Officer
Certifications:
 ISACA: Cybersecurity Fundamentals
 Students and Interns
 EC-Council: Certified Ethical Hacker (CEH)
 (ISC)2: Certified Information Systems Security
Professional (CISSP)
 4 years professional experience + degree or 5 years
 Associate for Students without the required experience
 ISACA: Certified Information Security Manager
(CISM)
 EC-Council: Certified Chief Information Security
Officer (CCISO)
Self Study
 Free Trials, Amazon/Microsoft Azure
 Boot and Install Linux/FreeBSD
 Put a server together with VMWare/Zen
 Install and Learn Nessus, Snort, Wireshark
 Practice penetration testing, detection, patching
 Attend local meetings
 Information Systems Security Association (ISSA)
 Information Systems Audit and Control Association
(ISACA)
 International Information System Security Certification
Consortium(ISC)2

More Related Content

What's hot

The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
Benoit Callebaut
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
North Texas Chapter of the ISSA
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Edureka!
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
William McBorrough
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Edureka!
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
SaeelRelekar
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation Approaches
Priyanka Aash
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your business
AnkitaKale12
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Edureka!
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
SagarNegi10
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI Certification
SagarNegi10
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
Firojali Laskar
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
SagarNegi10
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012Tjylen Veselyj
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
Veriato
 

What's hot (20)

The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation Approaches
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your business
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Malcolm Boston Resume
Malcolm Boston ResumeMalcolm Boston Resume
Malcolm Boston Resume
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI Certification
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 

Viewers also liked

Proprietary Information
Proprietary InformationProprietary Information
Proprietary Informationhypknight
 
Spec Ops Service Overview
Spec Ops Service OverviewSpec Ops Service Overview
Spec Ops Service Overview
Spec Ops Service
 
Executive Protection Focus - D&O and EPLI - Private Company
Executive Protection Focus - D&O and EPLI - Private CompanyExecutive Protection Focus - D&O and EPLI - Private Company
Executive Protection Focus - D&O and EPLI - Private CompanyChris Moody
 
Open Options Evolutionary Trends
Open  Options    Evolutionary  TrendsOpen  Options    Evolutionary  Trends
Open Options Evolutionary Trendshypknight
 
AOC Threat Assessment
AOC Threat Assessment AOC Threat Assessment
AOC Threat Assessment Fabian Zhilla
 
God's Bride
God's BrideGod's Bride
God's BrideBee Ling
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
wbesse
 
Pacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment PowerpointPacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment Powerpoint
PacificBulletproof
 
AS Solution Capabilities Brief 2017
AS Solution Capabilities Brief 2017AS Solution Capabilities Brief 2017
AS Solution Capabilities Brief 2017
AS Solution
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSEC
Rmd Frg
 
Threat Assessment: The New Normal
Threat Assessment: The New NormalThreat Assessment: The New Normal
Threat Assessment: The New Normal
Curtis A. Carver Jr.
 
International Executive Protection Services | Protective Security
International Executive Protection Services | Protective SecurityInternational Executive Protection Services | Protective Security
International Executive Protection Services | Protective Security
CASS Global Security
 
Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities  Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities
Lawrence Medical Managers
 
Security of important peoples
Security of important peoplesSecurity of important peoples
Security of important peoples
Trupesh Upadhyay
 

Viewers also liked (16)

Proprietary Information
Proprietary InformationProprietary Information
Proprietary Information
 
Spec Ops Service Overview
Spec Ops Service OverviewSpec Ops Service Overview
Spec Ops Service Overview
 
Executive Protection Focus - D&O and EPLI - Private Company
Executive Protection Focus - D&O and EPLI - Private CompanyExecutive Protection Focus - D&O and EPLI - Private Company
Executive Protection Focus - D&O and EPLI - Private Company
 
Open Options Evolutionary Trends
Open  Options    Evolutionary  TrendsOpen  Options    Evolutionary  Trends
Open Options Evolutionary Trends
 
THREAT ASSESSMENT IN SCHOOLS
THREAT ASSESSMENT IN SCHOOLSTHREAT ASSESSMENT IN SCHOOLS
THREAT ASSESSMENT IN SCHOOLS
 
AOC Threat Assessment
AOC Threat Assessment AOC Threat Assessment
AOC Threat Assessment
 
God's Bride
God's BrideGod's Bride
God's Bride
 
Study security-abroad
Study security-abroadStudy security-abroad
Study security-abroad
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Pacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment PowerpointPacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment Powerpoint
 
AS Solution Capabilities Brief 2017
AS Solution Capabilities Brief 2017AS Solution Capabilities Brief 2017
AS Solution Capabilities Brief 2017
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSEC
 
Threat Assessment: The New Normal
Threat Assessment: The New NormalThreat Assessment: The New Normal
Threat Assessment: The New Normal
 
International Executive Protection Services | Protective Security
International Executive Protection Services | Protective SecurityInternational Executive Protection Services | Protective Security
International Executive Protection Services | Protective Security
 
Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities  Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities
 
Security of important peoples
Security of important peoplesSecurity of important peoples
Security of important peoples
 

Similar to Spy vs Spy: Protecting Secrets

Sherry d bailey resume
Sherry d bailey resumeSherry d bailey resume
Sherry d bailey resume
Sherry D. Bailey
 
S bailey resume
S bailey resumeS bailey resume
S bailey resume
Sherry D. Bailey
 
Information Security Career Day Presentation
Information Security Career Day PresentationInformation Security Career Day Presentation
Information Security Career Day Presentation
djglass
 
APT &amp; What we can do TODAY
APT &amp; What we can do TODAYAPT &amp; What we can do TODAY
APT &amp; What we can do TODAY
James Ryan, CSyP, EA, PMP
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Symptai Consulting Limited
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
Moshiul Islam, CISSP, CISA, CFE
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
TechBiz Forense Digital
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
Jorge Sebastiao
 
Brian m cv
Brian m cvBrian m cv
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0James Perry, Jr.
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Ulf Mattsson
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
Srivatsan Desikan
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
Securelogy
 
Main Menu
Main MenuMain Menu
Main Menu
Securelogy
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
Sprintzeal
 

Similar to Spy vs Spy: Protecting Secrets (20)

Sherry d bailey resume
Sherry d bailey resumeSherry d bailey resume
Sherry d bailey resume
 
S bailey resume
S bailey resumeS bailey resume
S bailey resume
 
CEH
CEHCEH
CEH
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
Information Security Career Day Presentation
Information Security Career Day PresentationInformation Security Career Day Presentation
Information Security Career Day Presentation
 
APT &amp; What we can do TODAY
APT &amp; What we can do TODAYAPT &amp; What we can do TODAY
APT &amp; What we can do TODAY
 
Mohammed Alghenaim CV
Mohammed Alghenaim CVMohammed Alghenaim CV
Mohammed Alghenaim CV
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Brian m cv
Brian m cvBrian m cv
Brian m cv
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Main Menu
Main MenuMain Menu
Main Menu
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 

More from Michael Scheidell

Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Michael Scheidell
 
Risky Business
Risky BusinessRisky Business
Risky Business
Michael Scheidell
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needs
Michael Scheidell
 
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
Bring Your Own Policy:  Internet Use/BYOD Policy by consensus Bring Your Own Policy:  Internet Use/BYOD Policy by consensus
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
Michael Scheidell
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
Michael Scheidell
 

More from Michael Scheidell (6)

Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needs
 
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
Bring Your Own Policy:  Internet Use/BYOD Policy by consensus Bring Your Own Policy:  Internet Use/BYOD Policy by consensus
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 

Recently uploaded

Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
thomasaolson2000
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
GokulnathMbbs
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
Manu Mitra
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
foismail170
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
harikrishnahari6276
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
Hector Del Castillo, CPM, CPMM
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
foismail170
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
Manu Mitra
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
Dr. Mary Askew
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Dirk Spencer Corporate Recruiter LION
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
FarzanaRbcomcs
 
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR GeneralistHeidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
HeidiLivengood
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
IrlanMalik
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
LukeRoyak
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
ragingokie
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
Manu Mitra
 

Recently uploaded (20)

Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
 
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR GeneralistHeidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
 

Spy vs Spy: Protecting Secrets

  • 1. Spy vs Spy: Protecting Secrets A Career in Information Security is a Career in Protecting Secrets Michael Scheidell, CCISO, Security Privateers http://slidesha.re/T00Kq7
  • 2. Information Techology: Road to the Future Hardware Management . Software • Computer Research • Info Systems Managers • Hardware Engineers • Computer Programmers • Support Specialists • Systems Analysts • Data Base Administrator • Web Developers • Network Architechs World Wide Jobs Example text
  • 3.
  • 4. Chief Information Security Officer • MIS Degree • Internship • ISACA CSX Cert • Security Engineer • CISSP, CRISK • Sr. Security Architech • MBA Degree • VP/Dir of IT Security • CCISO Cert Like Working with People? Look into Management
  • 5.  Started doing database programming  Moved into Real time/Control Systems  1994, helped Government adjust to ‘the net’  Invented and Patented Security Appliance  Traveled to Costa Rica, Panama, Jamaica, Canada  Got to play with Trains (Risk Assessment, DHS contract)  Invited to speak at security conferences, including Cairo  Trained FBI agents, worked with Secret Service  On TV and quoted by Sun Sentinel  Get paid to break into banks! Michael Scheidell Chief Information Security Officer
  • 6. Programming • Web Applications • E-Commerce Systems • Mobile Applications Hardware Engineer • Computer Science • Firewalls • IDS/IPS/Patents Security Architect • Design company’s network • Security is top priority • Privacy matters Your own footer Your Logo Bits and Bytes Your thing?
  • 7. Top 10 jobs in Information Security 1. Information Security Crime / Forensics Expert 2. Web Application/ Penetration Testing 3. Forensic Analyst 4. Incident Responder 5. Security Architect 6. Malware Analyst 7. Network Security Engineer 8. Security Analyst 9. Computer Crime Investigator 10. Chief Information Security Officer/CISO/ISO/VP
  • 8. Information Security Crime Investigator  Investigation of computer crimes  Driven by Curiosity  Expert witness testimony in court  Consulting firms, PwC, IBM  Private Eye, Law Enforcement: FBI, Secret Service  Knowledge of Pen Testing, Computer Forensics, Reverse Engineering  BS:CS, MS:LE, 3+ years, CEH, CPT  22% Growth, $50K to 100K (gvmt or private)
  • 9. Web Application / Penetration Testing  Computer Games: Red Team, Black Team  Get paid to break into Banks  Part of an IT Audit or Assessment Team  Opportunity for Travel  Consulting firms, PwC, IBM  Direct Hire for Business or Government  Stepping stone to IT Auditor  BS/4+ years experience, CEH, CISSP  Growth 15%, $55-88K a year
  • 10. Forensic Analyst  Information Systems Analyst  Network Security Engineer  Computer Forensics Consultant/Engineer  Programming, Reverse Engineering  Experience in Malware, APT, Windows, Linux  Works with Law Enforcement  MS/6+ years experience, CEH, CISSP  $50K to 100K, Mgmt $200K
  • 11. Incident Responder  Prep for Forensic Analyst/ Investigator/ Manager  On the Firing line  Work in real time to stop and document attacks  Knowledge of Networking, Firewalls  Experience in Malware, APT, Windows, Linux  BS/3+  $65k to 83K
  • 12. Security Architect  Prep for Forensic Analyst/ Investigator/ Manager  On the Firing line  Work in real time to stop and document attacks  Knowledge of Networking, Firewalls  Experience in Malware, APT, Windows, Linux  BS/3+, Certs: CEH, CompTia Network, CPT, CISSP  $55K to 90K
  • 13. Malware Analyst  Examine, identify, and understand viruses, worms, Trojans, bots, rootkits  Knowledge of reverse engineering and software development  Programming, C, Perl, PHP, assembler.  Experience in Malware, APT, Windows, Linux  Government, Business, AV companies  BS/3+, Certs: CEH, CPT, CISSP  $50 to 100K
  • 14. Network Security Engineer  Work with Security Architect  Build, monitor and maintain secure network  Knowledge of TCP/IP  Understand IDS/Firewalls/DMZ/VPN’s  Understand test and analysis tools (sniffers, snort)  Some Programming or scripting (C, Perl, Java)  BS/3+, Certs: CISSP, CCNA/CCIE  $DOE: $70K to 130K (Sr, 5+years, MS Degree)
  • 15. Security Analyst  Planning and implementing security measures  Stay up to date with latest intelligence  Anticipate Security Breaches  Prevent loss and service interruptions  Perform Risk Assessments  Install Firewalls, Data Encryption  Security Awareness Training  MS/5+, CISSP, CISM, CISA, CRISK  $80K Average to $125K, 22% Job Growth
  • 16. Computer Crime Investigator  Recovery of hidden, encrypted or deleted files  Investigates computer crime, fraud and hacking  Gather evidence  Reconstruct damaged computer systems  Testify in court  Train Law enforcement on computer related issues  MS/4+, CISSP, CEH, CPT  $50K to $100K (or more for consultants)  22% Growth
  • 17. Chief Information Security Officer/CISO  Top Dog in Information Security  Knows Everything  forensics, pen testing, auditing, incident response, web app testing, programming, accounting, business  Speaking, Training, Mentoring  Works with CEO/CIO/CTO/CFO/COO  Only works half days (7am to 7pm)  <10ys $125 to 150K, > 10yrs $180K to 225K  Fortune 100 companies, could be in millions  MIS degree, MBA Degree  Certs: CISSP, CCISO, CISM, CISA, CRISK
  • 18. Education:  NAF: Academy of Information Technology (AOIT)  Nova Southeast University  Florida International University  Florida Atlantic University  Master of Science in Management Information Systems (MMIS)  Master of Science in Information Systems (MSIS) with security focus  Master of Business Administration (MBA)  CISO: Chief Information Security Officer
  • 19. Certifications:  ISACA: Cybersecurity Fundamentals  Students and Interns  EC-Council: Certified Ethical Hacker (CEH)  (ISC)2: Certified Information Systems Security Professional (CISSP)  4 years professional experience + degree or 5 years  Associate for Students without the required experience  ISACA: Certified Information Security Manager (CISM)  EC-Council: Certified Chief Information Security Officer (CCISO)
  • 20. Self Study  Free Trials, Amazon/Microsoft Azure  Boot and Install Linux/FreeBSD  Put a server together with VMWare/Zen  Install and Learn Nessus, Snort, Wireshark  Practice penetration testing, detection, patching  Attend local meetings  Information Systems Security Association (ISSA)  Information Systems Audit and Control Association (ISACA)  International Information System Security Certification Consortium(ISC)2