Cybersecurity Supply-Chain

Size: px
Start display at page:

Download "Cybersecurity Supply-Chain"

Transcription

1 Cybersecurity Supply-Chain Workforce Management and Skills Gap Development TRANSFORMING THE NEXT GENERATION WORKFORCE Students learn the skills employers look for!

2 Global Problem - Critical Issues Winning the War-for-Talent All fishing in the same pond for the top 5% when there a thousands of good candidates outside of traditional hiring methods. Greater Scalability - Less Cost Wider/Global reach for candidates Students gain workplace skills while still at University. Workplace Skill Applied Project Based Learning Scaling a workforce of cyber skilled resources Accelerate training of students Winning the War for Talent Cut Cost And Time To Productivity New hires hit the ground running Hiring grads at $60K on 24 month development; leave in 9 months at $120K unsustainable NY Bank. Industry Recognised Transferable Skills Common taxonomy for job-role definitions agreed - and Certificates recognized by industry Enterprise Skills Inventory and Development Works for internal use cases too

3 Imbalance Too Many Threats External Threats 62% increase in breeches in On average, an advanced threat goes unnoticed on victim s network for 8 months 2 $3 trillion total global impact of cybercrime 1 1 in 5 organizations have experienced an advanced persistent threat (APT) attack billion exposed records as a result of a data breach in the past 5 years 1 Approx. 1 million new malware variants a day, for an overall total of 1.7 Billion 4 1 in 6 mobile applications are classified as malware 4 Too Few Professionals 62% of organizations did not increase security training in out of 3 security pros are not familiar with APT attacks 3 < 2.4% of graduating students hold computer science degrees 7 1 million unfilled security jobs worldwide 8 83% of enterprises currently lack the right skills and human resources to protect their assets 9 Insider Threats About 58% of data security threats originate from employees, ex-employees, and trusted partners 5 A single insider attack costs a company on average $412,000 5 Estimated 75% of all insider attacks go unnoticed 6 While enterprises are under siege from a rising volume of cyberattacks, the global demand for skilled professionals sharply outpaces supply. Unless this gap is closed, organizations will remain at risk. Comprehensive educational and networking resources are required for everyone from entry-level to experienced professionals to meet the needs of organizations. Sources: 1. Increased Cyber Security Can Save Global Economy Trillions, McKinsey/World Economic Forum, January 2014; 2. M-Trends 2013: Attack the Security Gap, Mandiant, March 2013; 3. ISACA s 2014 APT Study, ISACA, April 2014; 4. Symantec,2015; 5. C. Bunn, 'How IT Teams can Prevent Insider Threats from both Malicious and Careless Activity. - Enterprise Network Security Blog from ISDecisions', 2013; 6. SpectorSoft 2014 Insider Threat Survey, 1st ed. 2015, pp. 1-2; 7. Code.org, February 2014; Cisco Annual Security Report; 9. Cybersecurity Skills Haves and Have Nots, ESG, March 2014

4 Mind the gap! Cybersecurity Workforce Alliance (CWA) 1. Standards, Approach and Engagement NICE Taxonomy, Role Profiles, Assessments 2. Aligning Education with Industry Awareness, Experience, Workforce Ready Supply 3. Human Capital Supply Chain Workforce Management and Skills Development

5 Passport Trusted Data User Experience Skills & Work Product Role Profiles Competencies & KSAs Matching Library Projects Real-World Challenges Assessments Lesson Plans Resources

6 Cybersecurity Workforce Alliance (CWA) Original Founders Federal Reserve Bank NY Bank NY Mellon Morgan Stanley Goldman Sachs Fidelity Investments Capgemini JPMorgan Chase Express Scripts Standard Chartered Bank FCC Perkins Coie RANE Network

7 CWA Mission Purpose Improve the cyber security skills and scale the college student and employee workforce, so they are more attractive to hire and can provide almost immediate value to the public & private sector by improving a company s Cyber Security capabilities. Reduce the amount of training for college hires Focus Create the perfect student candidate profile Real-World Experience - the "Epic Challenge" Increase Awareness and Experience Align Professional Certificates to Role Profiles

8 CWA Members/Momentum Jan 15 SIFMA & CUNY (Securities Ind. Financial Markets Assn 480 members) supports Launch at City University of New York April NICE asks iq4 to lead Workgroup for Private Sector July FSSCC (Coordinating Council 10k members) launches Workforce Workgroup August Internal Adoption large FS institutions begins September SUNY launches University at Albany October Federal Communication Commission discuss alignment October Utilities Telecoms Council discuss alignment October CWA EMEA Launch in London November 2015 NICE presentation!

9 Education and Industry - Standards Role Profiles Professional Certificates CWA Extensions Private Sector TECH-RISK Interesting, highly paid, front end challenging Business Resilience Needs sector and employer s business awareness and time on the job Gov, Risk, Compliance Needs GRC understanding, Jurisdiction Examiners/Regulators Not enough skills and people in GRC as they are all moving to the front line

10 Competency Based Real-World Challenges Connecting Education And Industry s Via Epic Challenges. Learned Knowledge Applied Knowledge Education Virtual Epic Challenges Industry Professional Certificates Competency Alignment Job Roles. Workforce Ready Candidates

11 People Not Aware Of Need Or Opportunity 79% Never spoken to a cybersecurity professional. This affects how much millennials know about the types of work involved in the field

12 Epic Challenges Accelerate Training While Students in School Having the poise, confidence and knowledge equal to someone with 12 months experience (Federal Reserve Industry Mentor) Academia 2-3 hours per week. Credited Course / Project Industry Mentors Industry team mentors 2-3 hours per week. Assessments Defines Challenges Students hours per week Awareness Experience U.S. Employee Training $590 Billion Savings $30 Billion CWA FUNDING 1% $590 Million 1.5 million $20k industry cost savings per position with iq4. Currently running The Threat Within designed by the CWA to develop the skills they for priority next-hires.

13 SUNY & University at Albany & CUNY & John Jay College of Criminal Justice Connecting Industry and Education TRANSFORMING THE NEXT GENERATION WORKFORCE Students learn the skills employers look for!

14 Student Demographics 17 Students Selected 4 Role Profiles (Governance, Risk, Behavioral, IT) None with prior applied learning experience Only a few had Cybersecurity experience The students presented with the poise, confidence and knowledge of a newly hired student completing one year of training Industry Mentor

15 Epic Challenge Statistics 40 Students 30% of students participating switched concentrations to Cybersecurity 34,545 Page Views 2x 2,853 Sessions 30% Avg Pages / Session 12:11 Mins / Session 50%+ NOW YOU CAN JUDGE THE RESULTS 6 WEEKS IMAGINE WHAT WE CAN DO?

16 Human Capital The Next Supply Chain Job-Roles On A Common Taxonomy Next Generation (CWA) Sourcing Student Supply Alignment of Education with Industry, connecting students with Real-World projects SCALING Virtual Internships Project-based team learning experience; industry mentored, stackable credentials Productivity Cut Time and Cost 6-12 week virtual-internships = 12 months of work experience (Industry Mentor). Saves $10 - $30K per month Internal Use Case Resilience/Agility Skills Gap Closed Human Capital Supply Chain Management take care of our greatest assets Career Pathways Progression mapping Personal and team, retention, retirement / succession planning, Inventory Skills Profile Passports Critical Roles, Staffing and Proficiency Levels, Career Trajectory Skills-Gap Development

17 Life Cycle of Learning Common Standards/ Frameworks Job Roles, Taxonomy And Platform Nullam eu tempor purus. Nunc a leo magna, sit amet consequat risus. Etiam faucibus tortor a ipsum vehicula sed suscipit. Verified Data Student Employee Resource Inventory Stackable Credentials Skills Gaps Dashboard Industry Curricula Career Development Scalable Virtual Reach Productivity Agility Assurance

18 CWA - Alliance Objectives Standards / Frameworks NICE - CWA defines extensions for Industry Taxonomy: Competencies, KSAs Role Profiles Professional Certificates Epic - Challenges Cyber-Internships Industry greatest challenges Awareness Experience Workplan: Syllabus, Curriculum, Role Profiles, Assessments Accelerates Training Slash cost and time to productivity Level the Playing Field Broaden reach Cast a wider net Tooling (iq4 Platform) Workforce Management and Skills Development Role Based Critical Staffing and Gaps Career Pathways Progression Mapping

19 CWA A Global Response To Cyber Threat CWA Agreed Extensions To NICE BY MEMBERS, FOR MEMBERS CWA -USA New York City & State Includes: SIFMA, FSCC, FCC, UTC, Banks, Healthcare, City Uni NY, State Uni NY Capgemini, Universities, Community Colleges Global Promotion & Adoption CWA -EMEA London/EMEA Includes: Lloyds Banking Group, BNY Mellon, Morgan Stanley, Goldman Sachs, Police Cybercrime Unit, Emergency Planning Centre, Capgemini, Universities, Community Colleges Future CWA-APAC (Future) India/APAC In discussion CWA Member s Offshore workforce USA & EMEA members with APAC Operations or Offshoring

20 Digital Badge CWA Certified Graduate Hire

21

22 Role Profile

23 Career Pathways

24 Competencies And Gaps Dashboard Analytics And Dashboard

25 A N A L Y T I C S Competencies And Gaps Dashboard

26 Summary NICE Framework is Systemized Now CWA extensions supported by DHS/NICE for all Public Sector Growing adoption by industry and industry bodies: SIFMA, FSSCC, NCC, UTC.. It works! The students presented with the poise, confidence and knowledge of a newly hired student completing one year of training Industry Mentor

27 Contact Frank Cicio, Founder and CEO, iq4 e [email protected] m Peter Meehan, SVP International, London e [email protected] m

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW www.isaca.org/cyber THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW ROBERT E STROUD CGEIT CRISC INTERNATIONAL PRESIDENT ISACA & VP STRATEGY & INNOVATION CA TECHNOLOGIES February 2015 ISACA

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of (DHS) National Cybersecurity Education & Awareness Branch (CE&A) October 2014 Mid-South

More information

Human Capital and Long-Term Growth in Houston. Carolyn Watson, VP Corporate Responsibility [email protected]

Human Capital and Long-Term Growth in Houston. Carolyn Watson, VP Corporate Responsibility Carolyn.L.Watson@jpmchase.com Human Capital and Long-Term Growth in Houston Carolyn Watson, VP Corporate Responsibility [email protected] Workforce development should be thought of as more than just a short-term treatment

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Winning the Cyber Security Small-Medium Business Opportunity. Steve Pataky VP, WW Channels & Alliances

Winning the Cyber Security Small-Medium Business Opportunity. Steve Pataky VP, WW Channels & Alliances Winning the Cyber Security Small-Medium Business Opportunity Steve Pataky VP, WW Channels & Alliances Current State of Cyber Security Innovation Creates Perfect Platform of Evil Cyber Threats More Advanced

More information

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015 The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

More information

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily

More information

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org October 2015 Collaboration Members Certification Matters The Cybersecurity Credentials Collaborative (C3) was formed in 2011 to provide

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar April 25, 2013 Welcome to the NICCS Webinar! Thank you for joining us today. During this presentation, you will: Learn about the

More information

the growing demand for niche skills: HIGH TECH BY STEVEN SCOTT Vice President of Global Solutions

the growing demand for niche skills: HIGH TECH BY STEVEN SCOTT Vice President of Global Solutions the growing demand for niche skills: HIGH TECH BY STEVEN SCOTT Vice President of Global Solutions 2 THE HIGH TECH INDUSTRY has remained remarkably resilient in riding the economic roller coaster of recent

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide Overview During this presentation, you will: Learn about

More information

How To Be A Successful Health Care Security Consultant

How To Be A Successful Health Care Security Consultant Cybersecurity and Interoperability: Working together for Patient Safety Sponsored by In his current role, Bill provides executive leadership and oversight to Information Security programs and to the Governance,

More information

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies

More information

Securing the Nation: Creating cyber security, resilience and readiness

Securing the Nation: Creating cyber security, resilience and readiness NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Succession Management/Planning Talent Management

Succession Management/Planning Talent Management Succession Management/Planning Talent Management Objectives Upon completing this workshop you will be able to: Utilize a basic framework for building a comprehensive succession plan. Understand the need

More information

Re-Imagining the Cyber Warrior of the Future

Re-Imagining the Cyber Warrior of the Future CSO Vantage Point : Re-Imagining the Cyber Warrior of the Future Close The Gap Today, Win the Fight Tomorrow Jeff Schilling Chief Security Officer FireHost The War is Real Perhaps James R. Clapper, U.S.

More information

Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard

Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard Challenges in Cybersecurity Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard Agenda National Perspectives & Background WA State Cyber Planning Steady State/Significant

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Cyber Risk Management with COBIT 5

Cyber Risk Management with COBIT 5 Cyber Risk Management with COBIT 5 Marco Salvato CISA, CISM, CGEIT, CRISC, COBIT 5 Approved Trainer 1 Agenda Common definition of Cyber Risk and related topics Differences between Cyber Security and IS

More information

Introduction to Facebook Ads for Recruiting. Brought to you by

Introduction to Facebook Ads for Recruiting. Brought to you by Introduction to Facebook Ads for Recruiting Brought to you by Introduction Did you know that 1 out of every 7 minutes spent on the Internet is spent on Facebook? With over 1.3 billion members and 802 million

More information

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends Quarterly Cybersecurity BILT Meeting October 10, 2012 Meeting Minutes ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends Stephen

More information

December 13, 2013. Submitted via email to [email protected]

December 13, 2013. Submitted via email to csfcomments@nist.gov December 13, 2013 Submitted via email to [email protected] National Institute of Standards and Technology Information Technology Laboratory ATTN: Adam Sedgewick 100 Bureau Drive, Stop 8930 Gaithersburg,

More information

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan

More information

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many

More information

innovative solutions

innovative solutions Finding the best talent is humanly possible Recruitment Process Outsourcing Looking for talent? the best Having the best talent is a competitive advantage in today s demanding and complex world. Because

More information

Developing Secure Software in the Age of Advanced Persistent Threats

Developing Secure Software in the Age of Advanced Persistent Threats Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer

More information

Graduate Employment Report. MBA and MS Graduates 2013-2014 Academic Year

Graduate Employment Report. MBA and MS Graduates 2013-2014 Academic Year Graduate Employment Report MBA and MS Graduates 2013-2014 Academic Year WELCOME The Graduate Career Management Center of Baruch College s Zicklin School of Business is thrilled to share its 2013-2014 post-graduate

More information

Cyber Risk Reduction: Why Automated Threat Verification is key

Cyber Risk Reduction: Why Automated Threat Verification is key Cyber Risk Reduction: Why Automated Threat Verification is key Automated threat verification: The new stage between detection and resolution Alarmingly, recent findings indicate that organisations are

More information

Common Data Breach Threats Facing Financial Institutions

Common Data Breach Threats Facing Financial Institutions Last Updated: February 25, 2015 Common Data Breach Threats Facing Financial s Although exact figures are elusive, there is no question that the number of data security breaches both reported and unreported

More information

Securing Our Future: Closing the Cybersecurity Talent Gap

Securing Our Future: Closing the Cybersecurity Talent Gap Securing Our Future: Closing the Cybersecurity Talent Gap October 2015 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness Overview

More information

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report 2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report March 14, 2013 TABLE OF CONTENTS List of Tables... iii List of Figures... iv Executive Summary... v 1. INTRODUCTION...

More information

How To Protect Your Organisation From A Phishing Attack

How To Protect Your Organisation From A Phishing Attack PRESENTED BY Ray Dalgarno Empowering the Human Element within the Security Eco-system Agenda Phishing General Background Why Phish5 Phish5 Service - Features & Functionalities Q&A Live demonstration (post

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Transformational Smart Cities: cyber security and resilience

Transformational Smart Cities: cyber security and resilience We protect the world s people and information Transformational Smart Cities: cyber security and resilience Towards the century of smart cities Executive Report Overview Giampiero Nanni Public Sector Strategy

More information

CYBER-RISK MANAGEMENT WHY HACKERS COULD CAUSE THE NEXT GLOBAL CRISIS RAJ BECTOR CLAUS HERBOLZHEIMER SANDRO MELIS ROBERT PARISI

CYBER-RISK MANAGEMENT WHY HACKERS COULD CAUSE THE NEXT GLOBAL CRISIS RAJ BECTOR CLAUS HERBOLZHEIMER SANDRO MELIS ROBERT PARISI CYBER-RISK MANAGEMENT WHY HACKERS COULD CAUSE THE NEXT GLOBAL CRISIS RAJ BECTOR CLAUS HERBOLZHEIMER SANDRO MELIS ROBERT PARISI In recent months, cyber terrorists have accessed the records of 21.5 million

More information

EY Cyber Security Hacktics Center of Excellence

EY Cyber Security Hacktics Center of Excellence EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find

More information

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors Microsoft Confidential for internal use only Wall Street Journal, JP Morgan, Lockheed, Bushehr nuclear

More information

STEM Skills for All: Designing Data Science Programs through Business and Higher Education Collaboration. SENCER 2015 Summer Institute

STEM Skills for All: Designing Data Science Programs through Business and Higher Education Collaboration. SENCER 2015 Summer Institute STEM Skills for All: Designing Data Science Programs through Business and Higher Education Collaboration SENCER 2015 Summer Institute Worcester Polytechnic Institute 2015 BHEF Overview The session will

More information

best practices Social recruiting: Five tips to improve efficiency and get better results

best practices Social recruiting: Five tips to improve efficiency and get better results best practices Social recruiting: Five tips to improve efficiency and get better results Social recruiting is just one aspect of a multi-channel recruiting strategy, but it s one you can t afford to overlook.

More information

September 24, 2015. Mr. Hogan and Ms. Newton:

September 24, 2015. Mr. Hogan and Ms. Newton: Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930

More information

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE

More information

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE

More information

Freelance Partnerships That Work. Online freelancing marketplace Professional freelancing network Collaboration platform

Freelance Partnerships That Work. Online freelancing marketplace Professional freelancing network Collaboration platform Freelance Partnerships That Work Online freelancing marketplace Professional freelancing network Collaboration platform More than 80% of large corporations say they are planning to substantially increase

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

HUMAN RESOURCES IN PUBLIC EDUCATION Where are we? Where should we be? Where HR Divisions should be. Where most HR Divisions are

HUMAN RESOURCES IN PUBLIC EDUCATION Where are we? Where should we be? Where HR Divisions should be. Where most HR Divisions are HUMAN RESOURCES IN PUBLIC EDUCATION Where are we? Where should we be? Human Capital Management Human Resources Department Personnel Department Levers: Differentiated Pay Career Ladders Distribution of

More information

lloyd s coverholders brand GUIDELINES

lloyd s coverholders brand GUIDELINES lloyd s coverholders brand GUIDELINES contents Introduction Quick questions Part One: How may I describe my relationship with Lloyd s? Part Two: How may I use the Coverholder at Lloyd s logo? Further information

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical

More information

Beyond Succession Planning The Explosive Rush to Talent Readiness

Beyond Succession Planning The Explosive Rush to Talent Readiness HCI #HCIwebcast Beyond Succession Planning The Explosive Rush to Talent Readiness HCI #HCIwebcast Today s Moderator Andrew Bateman @AndyWebcast HCI #HCIwebcast T H A N K Y O U www.harrisonassessmentsna.com

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Preparing Millennials to Lead in Cyberspace

Preparing Millennials to Lead in Cyberspace Preparing Millennials to Lead in Cyberspace A Raytheon-commissioned study of attitudes, behaviors and career aspirations among young American adults online Overview Today s Highly Connected and networked

More information

Trends in Information Technology (IT) Auditing

Trends in Information Technology (IT) Auditing Trends in Information Technology (IT) Auditing Padma Kumar Audit Officer May 21, 2015 Discussion Topics Common and Emerging IT Risks Trends in IT Auditing IT Audit Frameworks & Standards IT Audit Plan

More information

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity

More information

Examining the Evolving Cyber Insurance Marketplace

Examining the Evolving Cyber Insurance Marketplace Prepared Testimony and Statement for the Record of Ola Sage Founder and CEO e-management Hearing on Examining the Evolving Cyber Insurance Marketplace Before the Senate Committee on Commerce, Science,

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Preparing Millennials to Lead in Cyberspace October 2014

Preparing Millennials to Lead in Cyberspace October 2014 Preparing Millennials to Lead in Cyberspace October 2014 Results from the Raytheon-NCSA Millennial Survey of career aspirations, attitudes and behaviors of young American adults online Overview In this

More information

Cyber Risk to Help Shape Industry Trends in 2014

Cyber Risk to Help Shape Industry Trends in 2014 Cyber Risk to Help Shape Industry Trends in 2014 Rigzone Staff 12/18/2013 URL: http://www.rigzone.com/news/oil_gas/a/130621/cyber_risk_to_help_shape_industry_trends_i n_2014 The oil and gas industry s

More information

Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015

Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015 Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

THE COLLEGE STUDENT INDSET FOR CAREER PREPARATION & SUCCESS

THE COLLEGE STUDENT INDSET FOR CAREER PREPARATION & SUCCESS THE COLLEGE STUDENT INDSET FOR CAREER PREPARATION & SUCCESS WHY IT MATTERS Already the core of the U.S. student population, Millennials those born between 1980 and 2000 are becoming the predominant force

More information

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

THE FUTURE OF HUMAN RESOURCES. Ceree Eberly Chief People Officer The Coca-Cola Company

THE FUTURE OF HUMAN RESOURCES. Ceree Eberly Chief People Officer The Coca-Cola Company THE FUTURE OF HUMAN RESOURCES Ceree Eberly Chief People Officer The Coca-Cola Company OUR MISSION refresh the world, inspire moments of optimism and happiness, create value and make a difference 2 BEFORE

More information

CYBERSECURITY HOT TOPICS

CYBERSECURITY HOT TOPICS 1 CYBERSECURITY HOT TOPICS Secure Banking Solutions 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance CISSP, CISA, CRISC www.protectmybank.com

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Talent Needs for the Energy and Technology Industry

Talent Needs for the Energy and Technology Industry Talent Needs for the Energy and Technology Industry Final Summary Report Prepared for the Research Triangle Cleantech Cluster, August 2015 Prepared by Sara Lawrence and Michael Hogan 1 RTI International

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Career proposition for software developers and web operations engineers

Career proposition for software developers and web operations engineers Career proposition for software developers and web operations engineers Introduction The Government Digital Service is at the centre of the digital transformation of government, making information and

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information