1 Getting Started in Cybersecurity: How to Hone Your Hacking Skills Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach
2 What do you know about Cybersecurity?
3 The Net --- Eagle Eye
4 What is Cybersecurity? What is Information Assurance?
5 What Jobs/Careers are there in Cybersecurity?
8 Cyber Security Need: A National Growth Career Cybersecurity a Growing Field?
9 Cybersecurity: A National Growth Career Occupations Projected to Grow Fastest, Network Systems and Data Communications Analysts Personal and Home Care Aides Home Health Aides Computer Software Engineers, Applications Veterinary Technologists and Technicians Personal Finance Advisors Makeup Artists, Theatrical and Performance Medical A Veterinarians Substance Abuse and Behavioral Disorder Counselors Skin Care Specialists Financial Analysts Social and Human Service Assistants Gaming Surveillance Officers and Gaming Investigators Physical Therapist Assistants Pharmacy Technicians Forensic Science Technicians Dental Hygienists Mental Health Counselors Mental Health and Substance Abuse Social Workers US Dept of Labor
10 US Department of Labor: Bureau of Labor Statisticshttp:// Table 3. The 10 industries with the largest wage and salary employment growth, (1) (In thousands)
12 Computers & Information Technology Cybersecurity Specialist Source: Outlook & Growth 34 percent faster than normal An increase in computer security jobs is expected as technology continues to advance and become more affordable. More businesses will add computers and will need specialists to make their networks secure. In addition, use of the Internet by businesses should increase the demand for computer security specialists. Some specialists will work inside consulting firms dedicated exclusively to computer security issues. Salary & Wages Those in executive roles with titles such as chief information security officer, chief security officer or security manager earned $106,326 on average. Those in more technical roles (security engineer, security penetration tester or web security manager) earned an average of $75,275.
13 Computers & Information Technology Cybersecurity Specialist Source: What is a Cybersecurity Specialist? Work with companies to build secure computer systems. Question managers and staff about their current security methods. Find out what information the company wants to protect. Determine what information employees should be able to access. Plan the security system. Train staff on how to use security software and properly use computers to prevent any problems. Write rules and procedures for employees to follow. Evaluate security breaks and determine if there are problems or errors. Track where the break came from and shut off the access point. Education & Degree Path AS or AAS or BS degree in computer science, engineering, information systems information assurance Another route is to major in your area of interest and minor in one of these degrees. Many programs offered online
14 Cybersecurity: A National Growth Career A little background first Maryland wants to be cybersecurity epicenter By Ben Bain; Jan 12, Gov. O Malley s report, titled CyberMaryland Maryland is positioned to be the hub for federal, academic and private-sector cybersecurity efforts Maryland is already home to the National Institute of Standards and Technology, the National Security Agency, the Intelligence Advanced Research Projects Activity the soonto-be home of the Defense Information Systems Maryland s IT employment rate rose by 3.3 percent between 2001 and 2008, while nationwide it fell by 17.1 percent during that same time period
15 Cyber Security Need: A National Growth Career Tech Council of Maryland: Very interesting. but how does this apply to me? Ft Meade, Maryland US Cyber Command USCYBERCOM: is a sub-unified command, subordinate to U.S. Strategic Command protecting DoD networks from cyber attacks and will manage cyber warfare activity. The Defense Information Systems Agency (DISA) The Colocation of Defense/Military Adjudication Activities Defense Media Activity (DMA)
22 Careers in IS/IA & Digital Forensics Handout for Labor Stats and Career Paths
23 Computer Programmer/ Engineer/ Software Developer/ Web Designer Analyzes user needs to design, build, test, and maintain software applications and systems
24 Penetration Tester/Systems/Networks / Vulnerability Researcher/ Exploit Developer Think like a hacker to identify flaws and vulnerabilities which jeopardize the safety and security of the data and communications of businesses and organizations
25 Information Security Engineer / Architect / Analyst/ Compliance Manager Assists Information Security professionals in designing plans, evaluating organizational weaknesses, and implementing procedures to protect the information assets of an institution or company
26 Malware Analyst/ Expert Examines malicious code to understand the type of damage it can do and how it replicates and spreads. Determines methods for detecting and deleting malware from systems. These professionals also investigate the source of the malware.
27 Network Security/ Engineer Protects the data and information of an organization s information and communication technology from damage or unauthorized access.
28 Uses math, logic, and / or computer science to turn readable text into an unreadable form. Cryptographers also analyze encrypted (unreadable text) to turn it into a readable form. Cryptographer
29 Computer Forensics / InfoSec Crime Investigator/ Forensics Expert/Analyst / Computer Crime Investigator Investigates digital media for data stored or encrypted. Tests information security systems. Analyzes security breaches. These professionals often work in the law enforcement or military and defense fields.
30 Incident Responder/Disaster Recovery / Business Continuity Analyst/ Manager Recognizes, analyzes, and responds to incidents which have caused damage to information, data, and information and communication technologies. This includes recovering from all types of threats-- natural (tornados, hurricanes), human (hackers) and technical (malware, equipment failure) NOAA s Command Center
31 Defining CyberSecurity? CyberSecurity focuses on the technical aspects of computer defense the safety of computers and computer systems in a networked environment, while Information Assurance focuses on confidentiality, integrity, availability and validation of data, and therefore CyberSecurity is a subset of Information Assurance. Information Assurance (DOD) is a subset of CyberSecurity, and CyberSecurity includes management of the risks associated with computers and networks and mission assurance.
32 The Center for Strategic and International Studies (CSIS) Commission on CyberSecurity for the 44 th Presidency suggests the term cyber security services the development, implementation, operation and administration of measures and/or activities intended to prevent, detect, recover from and/or respond to intentional or inadvertent compromises of the confidentiality, integrity and availability of information technology including but not limited to intrusion detection, computer forensics, configuration management, and system development.
33 CyberSecurity involves protecting Preventing Detecting and Responding to attacks that information by In the fields of: management science systems engineering criminology security engineering computer science robotics In the fields of: data and communications accounting forensic science law enforcement bioengineering intelligence
34 Everything relies on computers and the internet now communication ( , cellphones) entertainment (digital cable, mp3s) transportation (car engine systems, airplane navigation) shopping (online stores, credit cards) medicine (equipment, medical records and the list goes on. How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system?
35 The Defense Information Systems Agency (DISA) DISA, is responsible for DoD computer and automated information systems and networks.
36 Defense Media Activity (DMA) DMA, is the Department of Defense's direct line of communication for news and information to U.S. forces worldwide. The agency presents news, information and entertainment on a variety of media platforms.
37 The Colocation of Defense/Military Adjudication Activities DoD s place for workers from three military services and other defense activities to adjudicate or determine who should receive security clearances after proper background investigations. More than 750 people from 10 different agencies will work in the new 150,000 square feet facility.
38 What is IA? CyberWATCH Video Fox Video Cyber challenge Sneakers The Net Staying Safe Online: The Need for Cybersecurity NATO Brief Obama Need for Cybersecurity National Collegiate Cyber Defense Competition The Duhs of Security Hacker NSA Commercial
39 What is IA (cont)? Theory and Practice of Cryptography There May be a Shortage of Cybersecurity Professionals Lockheed Martin HOW Cyber Security Whoa, That's Awkward (EDUCAUSE WINNER) Northrop Grumman Battlespace Command NSA spy techniques (good background--bias messaging) Lockheed Martin Security Intelligence Center United States Air Force-Cyberspace Domain
40 Other Videos Robotics Lockheed Martin HULC Exoskeleton Remove Cyber Security Removal Video How to remove bad videos/bots Humorous October is cybersecurity awareness month--good example of what to do Cyber Security Awareness - Missouri S&T CyberChallenge
41 Careers in IS/IA & Digital Forensics Handout for Labor Stats and Career Paths
43 Mapping Professional Specialist Groups to Career Levels Professional Specialist Group Model Management Technology Architecture Assurance Risk Management Senior Executive CISO CTO CIO COO CAO CRO Manager/Director Expert Sepecialist Managerial Specialist Technical ISM,ISD, Mgr Dir, Ops Mgr/Dir, Consulting Mgr/DIR Principal Consultant Security Consultant Business Analyst Senior Dev Engineer Security Product Manager Entrant Analyst Deverloper Development Manager Systems and Infrastructure Senior Architect Security Designer Senior Architect Security Designer Head of Internal Audit Senior Security Auditor Product/Program manager, Team Leaders, Account Sales managers Security Designer Trainee Security Designer Trainee Security Auditor Security Auditor Trainee Information Risk Mgr/Dir Consulting Mgr/Dir Principal Consultant Information Risk Consultant Information Risk Trainee
44 Career Levels and Traditional Paths Senior Executive CIO; CISO; CTO; CRO; COO Years of experience & ability EXPERT Principal Consultant; Senior/Chief Architect; Senior Security Auditor; Etc. Specialist (Technical/Business) Security Consultant; Security Designer/Architect; Security Auditor; Information Risk Consultant; Security Product Manager; Business Analyst MANAGER/DIRECTOR Consulting Manager/Director; Information Security Manager/Director; Head of Security Audit; Information Risk Manager/Director; Operations Manager/Director Specialist (Management) Project Manager; Program Manager; Team Leader; Account Manager; Sales Manager; Marketing Manager Adapted from AINSER ISPR Framework ENTRANT Security Analyst; Security Developer; Security Administrator; Trainee Information Risk Consultant; Security Product Sales; Etc.
Top Jobs and Fastest-Growing Careers from 2006 to 2016 Over next 10 years total employment is expected to increase by nearly 16 million jobs, according to the most recent projections provided by the Bureau
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 email@example.com Carrie Pifer
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and
Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College
Cisco Networking Academy Filling critical needs Certification and standards alignment Academy courses and content What is networking? Gathering and presenting data Analyzing and creating conclusions Creating
SCAC Annual Conference Cybersecurity Demystified Me Thomas Scott SC Deputy Chief Information Security Officer PMP, CISSP, CISA, GSLC, FEMA COOP Practitioner Tscott@admin.sc.gov 803-896-6395 What is Cyber
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
SO YOU WANT TO BE IN CYBER SECURITY? A boy comes to me with a spark of interest, I feed that spark and it becomes a flame, I feed the flame and it becomes a fire, I fed the fire and it becomes a roaring
Minnesota Job Outlook to 2016 Total employment in Minnesota is projected to increase by 291,000 jobs between 2006 and 2016 reaching almost 3.3 million jobs by 2016 according to recently released 2006 2016
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
July 2014 Program Drill-Downs Western New York Prepared for Hilbert College and St. Bonaventure University Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time
Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to
New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at firstname.lastname@example.org. To speak with a Help Desk
TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
Becoming a Cyber Professional: A Discussion with Recent Graduates Date: November 6, 2014 MICHAEL ROCHA Education B.S. Administration, Concentration in Cyber Security California State University, San Bernardino
MS in Information Systems & Assurance (MS-ISA) Stephen D. Burd Anderson School of Management & UNM Center for Information Assurance Research and Education email@example.com Last Revised: 9/24/2014 What is Information
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
Company Profile 1344 S Flores #205 San Antonio, TX 78204 210-694-2797 www.thomasontech.com Trusted Security Advisor For Industrial Control Systems Thomason Technologies provides world-class security solutions
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA firstname.lastname@example.org
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
February 8, 2011 Presented by: Kim Puhala Director, Institutional Research Goals Research data on job projections What are the available data sources? Local: Massachusetts Office of Labor and Workforce
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
Best Practices for Secure, Privacy, Preserving Mobile Networks: A NIST Perspective Donna F. Dodson Chief Cybersecurity Advisor National Institute of Standards and Technology email@example.com A Little
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
T H E U N I V E R S I T Y O F T E X A S A T E L P A S O College of Business Administration Information Systems What is Computer Information Systems? A field of studying computers and algorithmic processes.
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. A Brief History of IT Security Once upon a time, IT security was simple. Viruses were written to attack any system they came in contact with. As a result,
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
CYBERSECURITY PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS by Dr. Lawrence A. Gordon (Lgordon@rhsmith.umd.edu) EY Professor of Managerial Accounting and Information Assurance Affiliate
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!