CYBERSECURITY & ANALYTICS. How Both Will Change Your Career in e-discovery
|
|
|
- Reynold Flynn
- 10 years ago
- Views:
Transcription
1 CYBERSECURITY & ANALYTICS How Both Will Change Your Career in e-discovery
2 Jared Coseglia TRU Staffing Partners Founder & CEO Jared Michael Coseglia, founder and President of TRU Staffing Partners, has over twelve years of experience representing talent in e-discovery, Litigation Support, and broadly throughout legal technology staffing. He has successfully placed over 1800 professionals in full-time and temporary positions at the AmLaw 200, Fortune 1000, and within the consultancy and service provider community. His ability to identify, deliver, and help retain talent has allowed him the privilege of quickly becoming the globally recognized go-to individual for clients and candidates in need of staffing solutions or career guidance and management in ediscovery. Coseglia s unique style of representation, vast network of relationships, and subject matter expertise has helped earn TRU a host of awards including Top 3 Best National Legal Recruiter in Best of The National Law Journal Awards, 2012, 2013 & 2014, as well as a Top 3 Best Legal & Litigation Support Agency by the New York Law Journal 2013 & 2014, and #1 Litigation Support Staffing Agency in Chicago Mr. Coseglia is an active member of the Litigation Support community and frequently writes and speaks about the state of the legal technology job market with ACEDS, WiE, Peer-to-Peer, LTN, and other publications and organizations. Visit
3 Jeff Scarpitti TRU Cyber President Jeff Scarpitti is one of the premier recruiters in the Privacy and Cyber Security industries. Before becoming President of TRU Cyber, he was the Founder and Managing Principal of the Kennett Group. A former practicing attorney, Jeff has more than 20 years of experience in the forensics and legal technology industry. Jeff is a frequent moderator, speaker and author on hiring strategies and attorney development in the Privacy and Data Security space. He is an active member of ISACA, IAPP and ILTA.
4 Agenda Career Paths in Legal Technology e-discovery vs. Cybersecurity career origination Certifications: Vocational vs. Education Flipping Your edd House to Cyber Transitioning from Federal to Commercial Transition in-house corporate/corporate trends e-discovery becomes Legal Analytics Legal Analytics (a non-e-discovery career path)
5 Hands-on Technical CAREER PATHWAYS more less Computer Science Major Cybersecurity Major Legal IT Professional Attorney Paralegal Operations Manager Consultant Forensic Examiner Least advisory Entry Level Processing or Hosting Analyst Software Developer E-Discovery Project Manager Document Review Attorney Privacy/Security Attorney Cyber/InfoSec Analyst Processing Sales Engineer/Legal Solutions Advisor Legal Technology Sales Professional Most advisory Data Analytics Analyst Lit Support Analyst (firm) Lit Support Manager (firm) Cyber/Forensic Lab Manager Discovery Team Lead Client Services Manager InfoGov Analyst Partner/Director less Operational/Administrative more
6 e-discovery vs. Cybersecurity Similarities Response to urgent, time-sensitive client needs that have legal ramifications Binding skill: forensic collection of data Command a premium in compensation for services rendered Cyber positions take more than 25 percent longer to fill than traditional IT positions a la EDD circa 2005 Jobs are abundant in major cities Evolving technology landscape Certifications: Vocational vs. Educational divide Differences Cyber: social consciousness to corporate consciousness rapidly e-discovery professionals are not road warriors Bachelor s degree in cybersecurity, none in e-discovery Live data versus dead data Practice of law, Data Breach/Privacy group, few in EDD Consolidation vs. Fractured Market Certifications: RCA, CEDS vs CISSP, IAPP, IGP, CEH
7 Certifications - Vocational e-discovery: RCA, LAW, ipro, EnCase, FTK, Cellebrite, Paraben Cyber: Cisco, HP ArcSite, Apache, McAfee Institute, RSA (EMC) Practical, hands on, application-specific Can lead to immediate employment opportunities Limited, doesn t necessarily provide fundamentals Short term comp increases for newly-minted certs, long term less financial leverage/vertical mobility
8 Certifications - Educational e-discovery: ACEDS, Georgetown, LitWorks, PMP, Sedona* Cyber: CISSP, CISM, SANS Institute (numerous), GIAC, IAPP, IGP Broader knowledge but don t give you direct job access without relevant experience Newer, more specific certifications such as SANS on-going series, BarBri s CFCS, ISACA s CRISC (Risk Information Systems) Greater long term vertical mobility and comp increase
9 Flipping Your edd House to Cyber Managers must become technically hands on to be valuable Learn a programming language: Python, Java, C++, Ruby Conferences: Black Hat, ISACA, RSA, IAPP Own time, own dime; volunteer Certifications: CEH, CISSP, CompTia Security+, CPEN, CISM Practice principles at home: Home network security? How do you monitor and manage? Digital record keeping practices? Identity protection management? Private servers? Password protection and update methods? Monitoring reputational and social media scores? Relationships with Federal regulators and cyber-practitioners
10 Federal to Commercial Transition Why cyber talent will come from the government Why Federal talent will have challenges transitioning How to transition more effectively if you come from FED What to learn from those who come from the FED Value to go from commercial/legal to federal? Why?
11 Transition In-House Corporate/Corporate Trends What are the trends for e-discovery? More in? More out? Effect of the cloud on hiring? IG job growth (or lack of growth) in-house Practicing attorneys in-house: data governance, compliance, privacy Compensation comparison: IG to e-discovery, cyber to e-discovery
12 e-discovery becomes Legal Analytics Less than 10% of cases utilize analytics, 2015 By 2025, 90% of cases will use some form of analytics Legal vendors dominate the market, 2015 By 2020, outliers enter space creating fractured market Doc Review hourly wages remains largest cost in EDRM, 2015 By 2025, people replaced by machines and super reviewers 95% of reviewers have no programming skills, 2015 By 2020, Hadoop, NLP, Python, Java become critical to review
13 Outliers and Super Reviewers Big Data outliers enter space, creating fractured market Praescient, Palantir, RedOwl, Big 12 Will have big government contracts, experience, references Will have technology that surpasses traditional TAR legal tools (also more $) Will need legal expertise to enter and win legal analytics business Will need legal sales and relationship brokers to facilitate introductions Super Reviewers or Legal Analysts Programming: Hadoop, NLP, Python, Java become critical to review Experience: TAR, seed set creation, running iterations, precision recall Ride sidecar with partners, pilot the technology & elicit right questions Diving in to what you have available tool portfolio
14 Legal Analytics (non-ediscovery path) Analyzing legal spend Matter Management Prediction - large and small matter Monitoring of mail cache for predictive behavior IP usage and monitoring management Data Analysis of Jury Behavior- impact of the flu on decisions Data Analysis in Law Firm HR A way from law firm to corporate Smart jobs and not in abundance
15 TRU Scholarship Program 5 years partnering with leading educational institutions in the legal technology industry to bring needed training and education to the market Applications for the scholarships will be accepted in late January at The 2015 Program included the following scholarships: LitWorks, a DTI Company Georgetown University Paralegal Studies Program ACEDS Suffolk-Flaherty Legal Tech Audit (LTA)
16 Questions? Read our article Cybersecurity Jobs: It Feels Like ediscovery All Over Again! (Or Does It?) in BNA s Digital Discovery & e-evidence at Watch for upcoming cybersecurity articles in LawTech News and eforensics Magazine!
10 predictions for the legal technology job market in 2014
Association of Certified E-Discovery Specialists o 10 predictions for the legal technology job market in 2014 Jared Coseglia President Tru Staffing Partners January 9, 2014 Originally appeared on ACEDS.org
State of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
How To Become A Security Professional
Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided
Who s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World
Who s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World Our Speakers Michael Arnold is a Solutions Program Manager with UnitedLex, a legal
SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
About Inspired Review
About Inspired Review Inspired Review is a Managed Review firm launched to "disrupt" a marketplace that has been considered commoditized for a long time and has now seen a race to the bottom. We have launched
Selecting the Right ediscovery Solution for Your Company
Selecting the Right ediscovery Solution for Your Company Speakers: George Socha, Co-founder, Apersee, EDRM Johannes Scholtes, Chief Strategy Officer, ZyLAB Moderated by Mary Mack, Enterprise Technology
A Day in the Life of an Ediscovery Case Manager. June 4, 2014
A Day in the Life of an Ediscovery Case Manager June 4, 2014 ACEDS Membership Benefits Training, Resources and Networking for the E- Discovery Community! Exclusive News and Analysis! Weekly Web Seminars!
Streamlining the ediscovery
Streamlining the ediscovery Response Process Dean Gonsowski, Esq. Sr. ediscovery Counsel Streamlining the FOIA Process 1 Today s Speaker Dean Gonsowski, Esq. Sr. ediscovery Counsel Mr. Gonsowski is the
ISACA Tools Help Develop Cybersecurity Expertise
Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional
the growing demand for niche skills: HIGH TECH BY STEVEN SCOTT Vice President of Global Solutions
the growing demand for niche skills: HIGH TECH BY STEVEN SCOTT Vice President of Global Solutions 2 THE HIGH TECH INDUSTRY has remained remarkably resilient in riding the economic roller coaster of recent
Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares
Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market
Talent Management Leadership in Professional Services Firms
Talent Management Leadership in Professional Services Firms Published by KENNEDY KENNEDY Consulting Research Consulting Research & Advisory & Advisory Sponsored by Table of Contents Introduction.... 3
United States Market Analysis
salary study United States Market Analysis Electronic Discovery Litigation Support Digital Forensics Table of Contents Top Hiring Leading US Markets.....................................................................
JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
SANS CyberTalent VetSuccess Immersion Academy. VetSuccess
SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW
www.isaca.org/cyber THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW ROBERT E STROUD CGEIT CRISC INTERNATIONAL PRESIDENT ISACA & VP STRATEGY & INNOVATION CA TECHNOLOGIES February 2015 ISACA
ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE
create better trained employees. choose the best value in training. ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE PRODUCTIVE train your workforce on-site. save on employee downtime
Corporations Take Control of E-Discovery
Guidance Software Whitepaper Corporations Take Control of E-Discovery Chris Dale edisclosure Information Project What Does Your In-House E-Discovery Look Like? 53% indicate a GROWING CASE LOAD 55 % review
Running a Business. on the Cloud Management Strategies For The New IT
Running a Business on the Cloud Management Strategies For The New IT Through this year-long series of whitepapers and webinars, independent analyst Ben Kepes is creating a Cloud Computing curriculum designed
The Developer Hiring Landscape 2015
The Developer Hiring Landscape 2015 2 Introduction Our goal with Stack Overflow Careers is to build a system where developers can get jobs that really match their hearts a Joel Spolsky CEO & Co-founder
Hiring and Compensation
Hiring and Compensation What Litigation Support and Other Legal Professionals Need to Know ACEDS Webinar August 6, 2014 Sponsored by: 2014 Robert Half Legal. An Equal Opportunity Employer M/F/D/V. ACEDS
Trends in Information Technology (IT) Auditing
Trends in Information Technology (IT) Auditing Padma Kumar Audit Officer May 21, 2015 Discussion Topics Common and Emerging IT Risks Trends in IT Auditing IT Audit Frameworks & Standards IT Audit Plan
Cybersecurity Workforce Training Partnership
Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education
The Clearwell ediscovery Platform
The Clearwell ediscovery Platform Delivering Intelligent ediscovery Clearwell has been instrumental in helping us manage our in-house ediscovery practice, saving NBC Universal valuable resources in people
Legal Placements, Inc.
Legal Placements, Inc. 2015 Survey Contract Attorney Support Staff Accounting Information Technology Direct Hire and Temporary Placements www.legalplacements.com CONNECTING YOUR BUSINESS TO STAFFING RESOURCES
Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski
Freelance Lawyers The industry's best kept secret. Christopher Kozlowski About Me Co-founder and partner of Streamline Litigation, which I started while I was still in law school at Villanova University
Fully in Control. Management Information. Pomerantz can customize virtually any type of report to meet your productivity requirements.
Pomerantz Can Improve [ Productivity] To help improve your productivity, look to Pomerantz. The Productivity Analysis Report measures daily and weekly goals. The Daily Labor Productivity Report is a valuable
Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
FACULTY BIOGRAPHIES FOR ARMA/EDI EVENTS
FACULTY BIOGRAPHIES FOR ARMA/EDI EVENTS Seattle Faculty: Patrick Oot (lead faculty, moderator, and presenter for Session 5) Partner Shook, Hardy & Bacon Patrick is a partner in the firm s General Litigation
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.
ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,
KPMG Forensic Technology Services
KPMG Forensic Technology Services Managing Costs in e-discoverye October 14, 2010 1 Agenda: Strategies to Manage Costs in e-discovery Pre-collection Strategies Filtering Strategies Review and Production
Limited Resources. Michael Condé National Litigation Support Manager Borden Ladner Gervais LLP
Unlimited Litigation Support on Presented by: Limited Resources Michael Condé National Litigation Support Manager Borden Ladner Gervais LLP Ceyda Tocsoy Manager, Litigation Support & Technology Torys LLP
Key Market Trends, Drivers and Future Directions in the RPO Solutions Business
Wednesday, March 14 2:00 pm Veranda C Concurrent Session: Strategy & New Opportunities Key Market Trends, Drivers and Future Directions in the RPO Solutions Business Moderator: Stephen Clancy, Director,
Legal Technologies Considering Third Generation ediscovery?
Orange Legal Technologies Legal Technologies Considering Third Generation ediscovery? Third Generation ediscovery? ILTA Product Briefing of the OneO Discovery Platform Product Briefing of the OneO Discovery
of Highly Effective Security Professionals By Sondra Schneider CEO Security University [email protected] 203.357.7744
6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University [email protected] 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the
Information governance is old news at Nuix
Information governance is old news at Nuix Analyst: David Horrigan 18 Jul, 2014 Sydney-based software developer Nuix was one of the early tech proponents of information governance (IG), after being known
Implementing Security Education at a Small Community College
PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree
Measuring your most important Asset: Human Capital
Measuring your most important Asset: Human Capital Workforce Analytics Training We are all familiar with the conventional HR metrics that are frequently used in organizations today Turnover rate, time
B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.
This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should
PMO Director. PMO Director
PMO Director It s about you Are you curious about how individual projects further a company s strategy? Can you think at the macro level across broad groups of people and services? Do you have an eye for
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers
Career Analysis into Cyber Security: New & Evolving Occupations
Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
The Big Data Talent Shortage
The Big Data Talent Shortage Big data the massive amounts of information companies routinely collect through web crawlers, social media feeds, server logs, customer service databases, and other sources
Building Your Brand with LinkedIn
U N I V E R S I T Y C A R E E R S E R V I C E S Building Your Brand with LinkedIn LinkedIn LinkedIn is the largest professional social media site that enables you to connect with your classmates, faculty,
Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs
Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all
Technology Assisted Review of Documents
Ashish Prasad, Esq. Noah Miller, Esq. Joshua C. Garbarino, Esq. October 27, 2014 Table of Contents Introduction... 3 What is TAR?... 3 TAR Workflows and Roles... 3 Predictive Coding Workflows... 4 Conclusion...
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
2014 Human Capital Management Survey: HCM Buyer Actions and Plans
Survey 2014 Human Capital Management Survey: HCM Buyer Actions and Plans Lisa Rowan IDC OPINION This study provides human capital management (HCM) applications buying behavior findings drawn from an IDC
ETCIC Internships Open to Sophomores:
ETCIC Internships Open to Sophomores: If interested in applying for any of these positions, please email [email protected] with your resume (and cover letter if required) by Sunday, 9/20 at 11:59pm.
Information Governance: Where is ARMA International Headed? David M. Fleming, CRM, IGP, CIP ARMA Utah-Salt Lake Chapter Meeting September 18, 2014
Information Governance: Where is ARMA International Headed? David M. Fleming, CRM, IGP, CIP ARMA Utah-Salt Lake Chapter Meeting September 18, 2014 Discussion Points Defining Information Governance Defining
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
Big 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
Program Drill-Downs National
July 2014 Program Drill-Downs National Prepared for Hilbert College and St. Bonaventure University Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time Jobs Intelligence
InfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Meeting E-Discovery Challenges with Confidence
Meeting E-Discovery Challenges with Confidence Meeting today s e-discovery and information governance challenges while setting the foundation for tomorrow s requirements is the goal of every legal team.
An Overview of icims
An Overview of icims January 2015 FORWARD LOOKING INFORMATION This document contains statements that constitute forward- looking statements, including but not limited to icims outlook for icims financial
2014 CYBER INDUSTRY SURVEY
Maryland s Cyber Industry Maryland s dynamic community of cybersecurity entrepreneurs, academia, federal agencies, investors, technologists and seasoned industry leaders makes it the nation s epicenter
