SlideShare a Scribd company logo
1 of 26
Download to read offline
Assessing the skill requirements and
industry expectations for cyber security
Copyright© 2024 CompTIA, Inc. All Rights Reserved. | CompTIA.org
In 15 minutes…and 27
slides!
▪ About CompTIA
▪ State of Cybersecurity
2024 Research
▪ CompTIA Career
Pathways and
Certifications
Copyright© 2024 CompTIA, Inc. All Rights Reserved. | CompTIA.org
WIN+R > cmd > whoami
https://www.linkedin.com/in/zeshandotcom/
2004
• BSc Cybernetics & Virtual Worlds
• IT Support Tech, UK & Japan
2007
• Systems Administrator
• Technical Trainer, Europe
2013
• Technical Consultant, Worldwide
• Head of Curriculum
2015
• CompTIA EMEA
• Evangelism | Skills | Industry Relations
…
1. Founded in 1982
2. The World’s Largest Non-Profit IT Association
3. Provider of Globally Recognised Vendor Neutral Tech Certifications
4. Over 4 million people worldwide are CompTIA certified
/pronounce/{Comp-TEE-Ah}
{noun}
Our Mission is to Become the Most Respected Place to
Acquire Tech Skills from Digital Fluency to Expert
Competency
Copyright (c) 2024 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Worldwide Leading Provider of
Vendor-Neutral IT Certifications
6
Created by Industry for Industry
▪ Relevant
▪ Regularly updated
▪ Internationally Recognised
Job Role Led
▪ Span entry level roles – to help entrants to the
their first job – through to more advanced roles
Vendor Neutral / Inclusive
▪ Independent of any particular technology,
product or platform
▪ Reflect the diverse technologies deployed in
today’s organisation
Industry Expectations
State of Cybersecurity 2024
7
Full Report:
https://www.comptia.org/content/research/cybersecurity-trends-research
Objectives for Cybersecurity
Source: CompTIA 2024 State of Cybersecurity | n=1156 technical and business professionals
Aggregated priority of objectives across ASEAN, ANZ, Benelux, DACH, North America and UK/Ireland
Many Issues Drive Cybersecurity Concerns
26%
32%
33%
37%
38%
41%
41%
41%
45%
Quantifying cybersecurity issues
Variety of attacks
Breadth of cybersecurity skills needed
Growing number of hackers/cybercriminals
Increased reliance on data
Generative AI
Compliance with regulations
Privacy concerns handling other people’s data
Scale of potential attacks/overall threat to business
Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
Cybersecurity Changes In the Past Year
25%
29%
31%
32%
35%
36%
38%
42%
45%
Shift to proactive assessment/evaluation measures
Exploration/implementation of cybersecurity insurance
Use of new metrics to track success of security efforts
Creation of dedicated cybersecurity resources/team
More diverse set of technology tools
Greater use of third parties for cybersecurity strategy
Greater focus on employee education
Higher priority on determining proper response to incidents
Greater focus on process improvement
Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
Mitigating Cybersecurity Incidents in the Past Year
18% 47%
20%
14%
Low
Severe
None
Moderate
Estimated Impact of Incidents Common Mitigation Steps
1
2
3
4
5
Technical staff working overtime
Purchase new software
Technical staff diverted from routine
Outside specialist brought in
Purchase new hardware
6
7
Buy identity fraud service for customers
New PR campaign to improve reputation
Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
Elements of Organizational Cybersecurity Strategy
23%
28%
30%
32%
33%
34%
37%
38%
40%
46%
Threat intelligence
Zero trust framework
Threat modeling
Vulnerability assessment/penetration testing
Cybersecurity monitoring and analytics
Tabletop exercises
Workforce assessment/education
Governance, risk, and compliance
Business continuity/disaster recovery
Incident detection/response
Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
Challenges to Cybersecurity Initiatives
28%
29%
32%
35%
35%
36%
38%
39%
Lack of metrics to demonstrate security effectiveness
Low understanding of current cybersecurity technology trends
Lack of budget dedicated to security
Cybersecurity skill gaps among internal employees
Uncertainty around contracting security work to a third party
Belief that current security is “good enough”
Prioritization of other technology
Low understanding of new cybersecurity threats
Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
Potential Uses of AI in Cybersecurity
41%
42%
44%
44%
47%
54%
Automating response to
cybersecurity incidents
Predicting areas where future
breaches may occur
Generating tests of cybersecurity
defenses
Analyzing user behavior patterns
Automating configuration of
cybersecurity infrastructure
Monitoring network traffic and
detecting malware
Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
51% of organizations
surveyed view generative AI
as a step forward in existing
AI/ML practices. Another 42%
say that generative AI is
driving first-time exploration
of AI adoption.
Skill Requirements
1
Pathways for Dedicated Cybersecurity Personnel
20%
32%
30%
30%
38%
41%
24%
46%
24%
27%
27%
27%
31%
34%
35%
41%
College hire with general technical degree
College hire with cybersecurity focus
Hire with 10+ years' experience
Non-college hire with demonstration of knowledge
Hire with less than five years' experience
Hire with 5-10 years' experience
Promoted from business unit to cybersecurity role
Promoted from IT infrastructure to cybersecurity role
2023
2022
Source: CompTIA 2024 State of Cybersecurity | n=68 UK&I technical and business professionals with hiring plans
CompTIA 2022 State of Cybersecurity | n=66 UK&I technical and business professionals with hiring plans
Areas of Improvement for Cybersecurity Personnel
34%
36%
37%
38%
38%
39%
39%
41%
42%
59%
54%
53%
53%
56%
51%
53%
54%
42%
7%
10%
10%
8%
7%
10%
7%
5%
16%
Regulatory landscape
Access control/identity management
Endpoint security
Data security
Knowledge of threat landscape
Data analysis
Application security
Network/infrastructure security
Cryptography
Significant Improvement Needed Moderate Improvement Needed Don't Know
Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
The CompTIA Solution
1
Enter where it makes sense for your team!
https://www.comptia.org/certifications
CompTIA Security+ is the global benchmark for best practices in IT security.
Over 750,000 Security+ certified professionals worldwide
Copyright© 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org
Organizations that helped update SY0-701
Subject matter experts (SMEs) from the following organizations assisted with the development of
SY0-701. Some of the biggest contributors are listed below.
• Five9
• Fidelity Investments
• Zoom
• Microsoft
• SenseOn
• U.S. Navy Center for Information
Dominance
• L3Harris
• SecureWorks
• General Dynamics IT (GDIT)
• Washington State Patrol
• Contentful
• Deloitte
• Wells Fargo
• Nationwide
• Johns Hopkins University Applied Physics
Laboratory
• Fidelis Risk Advisory
• Lippert Components
• Cyber Warfare Tactics LLC
• Organon
• Blue Chip Talent
• Deakin University
• Growth Arbor
• Linford and Company LLC
• MindPoint Group
• Brotherhood Mutual
• SS&C Technologies
Copyright© 2024 CompTIA, Inc. All Rights Reserved. | CompTIA.org
5 Skills Mastered with CompTIA Security+
22
# 2 T H R E A T S ,
V U L N E R A B I L I T I E S ,
& M I T I G A T I O N
# 4 S E C U R I T Y
O P E R A T I O N S
# 1 S E C U R I T Y
C O N C E P T S
# 3 S E C U R I T Y
A R C H I T E C T U R E
# 5 M A N A G E M E N T &
O V E R S I G H T
https://www.comptia.org
/certifications/security
Certifications linked to Job Roles
Certification Job Role(s)
A+ IT Support Specialist, Helpdesk Technician
Network+ Network Admin, Junior Systems Engineer
Security+ Security Administrator, Cyber Specialist
Server+ Data Centre Technician, Server Admin
CySA+ Cyber Security Analyst, Threat Hunter
PenTest+ Penetration Tester, Vulnerability Analyst
Cloud+ Cloud Engineer, Systems Administrator
Data+ Data Analyst, Marketing Analyst
Discover More:
https://www.comptia.org/content/lp/it-certifications-job-match
CompTIA certifications are ISO 17024 Compliant
and have Global Recognition
US Department of Defence Mandate UK Government Security Profession
2
CompTIA Security+
CompTIA CySA+
CompTIA PenTest+
CASP+
Get Certified for Success!
KNOWLEDGE
ACQUISITION
PRACTICAL
APPLICATION
CertMaster
Learn
1 2 CONFIRM
MASTERY
3 CERTIFY
4
CertMaster
Labs
CertMaster
Practice
Certification
Free 30 day trials
https://www.comptia.org/training/certmaster-learn/trial-sign-up
https://www.comptia.org/training/certmaster-practice/trial-sign-up
Thank You!

More Related Content

Similar to Zeshan Sattar- Assessing the skill requirements and industry expectations for cyber security

The Ultimate Roadmap For CompTIA Training & Certifications
 The Ultimate Roadmap For CompTIA Training & Certifications The Ultimate Roadmap For CompTIA Training & Certifications
The Ultimate Roadmap For CompTIA Training & Certifications
Calvin Sam
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)
Jason Chapman
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 

Similar to Zeshan Sattar- Assessing the skill requirements and industry expectations for cyber security (20)

Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
The Ultimate Roadmap For CompTIA Training & Certifications
 The Ultimate Roadmap For CompTIA Training & Certifications The Ultimate Roadmap For CompTIA Training & Certifications
The Ultimate Roadmap For CompTIA Training & Certifications
 
CompTIA's 5 Trends Shaping the Tech-Driven Workforce
CompTIA's 5 Trends Shaping the Tech-Driven WorkforceCompTIA's 5 Trends Shaping the Tech-Driven Workforce
CompTIA's 5 Trends Shaping the Tech-Driven Workforce
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in Review
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
Value of IT Certifications for Your Next Job
Value of IT Certifications for Your Next JobValue of IT Certifications for Your Next Job
Value of IT Certifications for Your Next Job
 
2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker
 
Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
State of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryState of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 Summary
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
CodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free WorldCodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free World
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?
 
EMEA10: IT Training and Certification: Value to Employers
EMEA10: IT Training and Certification: Value to EmployersEMEA10: IT Training and Certification: Value to Employers
EMEA10: IT Training and Certification: Value to Employers
 
Level Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyLevel Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects Successfully
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 

More from itnewsafrica

More from itnewsafrica (20)

Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 
Tanya Muller- Improving Healthcare Delivery Through The Use Of AI
Tanya Muller- Improving Healthcare Delivery Through The Use Of AITanya Muller- Improving Healthcare Delivery Through The Use Of AI
Tanya Muller- Improving Healthcare Delivery Through The Use Of AI
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 

Zeshan Sattar- Assessing the skill requirements and industry expectations for cyber security

  • 1. Assessing the skill requirements and industry expectations for cyber security
  • 2. Copyright© 2024 CompTIA, Inc. All Rights Reserved. | CompTIA.org In 15 minutes…and 27 slides! ▪ About CompTIA ▪ State of Cybersecurity 2024 Research ▪ CompTIA Career Pathways and Certifications
  • 3. Copyright© 2024 CompTIA, Inc. All Rights Reserved. | CompTIA.org WIN+R > cmd > whoami https://www.linkedin.com/in/zeshandotcom/ 2004 • BSc Cybernetics & Virtual Worlds • IT Support Tech, UK & Japan 2007 • Systems Administrator • Technical Trainer, Europe 2013 • Technical Consultant, Worldwide • Head of Curriculum 2015 • CompTIA EMEA • Evangelism | Skills | Industry Relations …
  • 4. 1. Founded in 1982 2. The World’s Largest Non-Profit IT Association 3. Provider of Globally Recognised Vendor Neutral Tech Certifications 4. Over 4 million people worldwide are CompTIA certified /pronounce/{Comp-TEE-Ah} {noun}
  • 5. Our Mission is to Become the Most Respected Place to Acquire Tech Skills from Digital Fluency to Expert Competency
  • 6. Copyright (c) 2024 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Worldwide Leading Provider of Vendor-Neutral IT Certifications 6 Created by Industry for Industry ▪ Relevant ▪ Regularly updated ▪ Internationally Recognised Job Role Led ▪ Span entry level roles – to help entrants to the their first job – through to more advanced roles Vendor Neutral / Inclusive ▪ Independent of any particular technology, product or platform ▪ Reflect the diverse technologies deployed in today’s organisation
  • 7. Industry Expectations State of Cybersecurity 2024 7 Full Report: https://www.comptia.org/content/research/cybersecurity-trends-research
  • 8. Objectives for Cybersecurity Source: CompTIA 2024 State of Cybersecurity | n=1156 technical and business professionals Aggregated priority of objectives across ASEAN, ANZ, Benelux, DACH, North America and UK/Ireland
  • 9. Many Issues Drive Cybersecurity Concerns 26% 32% 33% 37% 38% 41% 41% 41% 45% Quantifying cybersecurity issues Variety of attacks Breadth of cybersecurity skills needed Growing number of hackers/cybercriminals Increased reliance on data Generative AI Compliance with regulations Privacy concerns handling other people’s data Scale of potential attacks/overall threat to business Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
  • 10. Cybersecurity Changes In the Past Year 25% 29% 31% 32% 35% 36% 38% 42% 45% Shift to proactive assessment/evaluation measures Exploration/implementation of cybersecurity insurance Use of new metrics to track success of security efforts Creation of dedicated cybersecurity resources/team More diverse set of technology tools Greater use of third parties for cybersecurity strategy Greater focus on employee education Higher priority on determining proper response to incidents Greater focus on process improvement Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
  • 11. Mitigating Cybersecurity Incidents in the Past Year 18% 47% 20% 14% Low Severe None Moderate Estimated Impact of Incidents Common Mitigation Steps 1 2 3 4 5 Technical staff working overtime Purchase new software Technical staff diverted from routine Outside specialist brought in Purchase new hardware 6 7 Buy identity fraud service for customers New PR campaign to improve reputation Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
  • 12. Elements of Organizational Cybersecurity Strategy 23% 28% 30% 32% 33% 34% 37% 38% 40% 46% Threat intelligence Zero trust framework Threat modeling Vulnerability assessment/penetration testing Cybersecurity monitoring and analytics Tabletop exercises Workforce assessment/education Governance, risk, and compliance Business continuity/disaster recovery Incident detection/response Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
  • 13. Challenges to Cybersecurity Initiatives 28% 29% 32% 35% 35% 36% 38% 39% Lack of metrics to demonstrate security effectiveness Low understanding of current cybersecurity technology trends Lack of budget dedicated to security Cybersecurity skill gaps among internal employees Uncertainty around contracting security work to a third party Belief that current security is “good enough” Prioritization of other technology Low understanding of new cybersecurity threats Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
  • 14. Potential Uses of AI in Cybersecurity 41% 42% 44% 44% 47% 54% Automating response to cybersecurity incidents Predicting areas where future breaches may occur Generating tests of cybersecurity defenses Analyzing user behavior patterns Automating configuration of cybersecurity infrastructure Monitoring network traffic and detecting malware Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals 51% of organizations surveyed view generative AI as a step forward in existing AI/ML practices. Another 42% say that generative AI is driving first-time exploration of AI adoption.
  • 16. Pathways for Dedicated Cybersecurity Personnel 20% 32% 30% 30% 38% 41% 24% 46% 24% 27% 27% 27% 31% 34% 35% 41% College hire with general technical degree College hire with cybersecurity focus Hire with 10+ years' experience Non-college hire with demonstration of knowledge Hire with less than five years' experience Hire with 5-10 years' experience Promoted from business unit to cybersecurity role Promoted from IT infrastructure to cybersecurity role 2023 2022 Source: CompTIA 2024 State of Cybersecurity | n=68 UK&I technical and business professionals with hiring plans CompTIA 2022 State of Cybersecurity | n=66 UK&I technical and business professionals with hiring plans
  • 17. Areas of Improvement for Cybersecurity Personnel 34% 36% 37% 38% 38% 39% 39% 41% 42% 59% 54% 53% 53% 56% 51% 53% 54% 42% 7% 10% 10% 8% 7% 10% 7% 5% 16% Regulatory landscape Access control/identity management Endpoint security Data security Knowledge of threat landscape Data analysis Application security Network/infrastructure security Cryptography Significant Improvement Needed Moderate Improvement Needed Don't Know Source: CompTIA 2024 State of Cybersecurity | n=133 UK&I technical and business professionals
  • 19. Enter where it makes sense for your team! https://www.comptia.org/certifications
  • 20. CompTIA Security+ is the global benchmark for best practices in IT security. Over 750,000 Security+ certified professionals worldwide
  • 21. Copyright© 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org Organizations that helped update SY0-701 Subject matter experts (SMEs) from the following organizations assisted with the development of SY0-701. Some of the biggest contributors are listed below. • Five9 • Fidelity Investments • Zoom • Microsoft • SenseOn • U.S. Navy Center for Information Dominance • L3Harris • SecureWorks • General Dynamics IT (GDIT) • Washington State Patrol • Contentful • Deloitte • Wells Fargo • Nationwide • Johns Hopkins University Applied Physics Laboratory • Fidelis Risk Advisory • Lippert Components • Cyber Warfare Tactics LLC • Organon • Blue Chip Talent • Deakin University • Growth Arbor • Linford and Company LLC • MindPoint Group • Brotherhood Mutual • SS&C Technologies
  • 22. Copyright© 2024 CompTIA, Inc. All Rights Reserved. | CompTIA.org 5 Skills Mastered with CompTIA Security+ 22 # 2 T H R E A T S , V U L N E R A B I L I T I E S , & M I T I G A T I O N # 4 S E C U R I T Y O P E R A T I O N S # 1 S E C U R I T Y C O N C E P T S # 3 S E C U R I T Y A R C H I T E C T U R E # 5 M A N A G E M E N T & O V E R S I G H T https://www.comptia.org /certifications/security
  • 23. Certifications linked to Job Roles Certification Job Role(s) A+ IT Support Specialist, Helpdesk Technician Network+ Network Admin, Junior Systems Engineer Security+ Security Administrator, Cyber Specialist Server+ Data Centre Technician, Server Admin CySA+ Cyber Security Analyst, Threat Hunter PenTest+ Penetration Tester, Vulnerability Analyst Cloud+ Cloud Engineer, Systems Administrator Data+ Data Analyst, Marketing Analyst Discover More: https://www.comptia.org/content/lp/it-certifications-job-match
  • 24. CompTIA certifications are ISO 17024 Compliant and have Global Recognition US Department of Defence Mandate UK Government Security Profession 2 CompTIA Security+ CompTIA CySA+ CompTIA PenTest+ CASP+
  • 25. Get Certified for Success! KNOWLEDGE ACQUISITION PRACTICAL APPLICATION CertMaster Learn 1 2 CONFIRM MASTERY 3 CERTIFY 4 CertMaster Labs CertMaster Practice Certification Free 30 day trials https://www.comptia.org/training/certmaster-learn/trial-sign-up https://www.comptia.org/training/certmaster-practice/trial-sign-up