State of South Carolina InfoSec and Privacy Career Path Model
|
|
|
- Archibald Carpenter
- 10 years ago
- Views:
Transcription
1 State of South Carolina InfoSec and Privacy Career Path Model Start
2 Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available to the State s Information Security (InfoSec) and Privacy workforce. This model can be used by HR and Agency leadership for InfoSec and Privacy workforce development planning, evaluating personnel strengths and areas for improvement, and informing conversations between supervisors and employees. End users can also use the model to view possible career moves within the InfoSec and Privacy workforce. Within the model, you will find: An overview of the InfoSec and Privacy Career Model that includes both Technical Expert and Management career paths An outline of the Technical Expert and Management career paths and possible moves between them An overview of suggested competencies and trainings associated with each InfoSec and Privacy role Guidelines The Career Path Model does not provide an exhaustive list of possible career moves, but rather represents a snapshot of possible career moves within the InfoSec and Privacy workforce When using the Career Path Model, InfoSec and Privacy personnel should plan for career advancement in the context of long-term career goals, beyond the next immediate assignment or position Career movement is based on a combination of individual career aspiration, demonstrated proficiency of expected competencies, and organization needs necessary by DIS, EPO, and DSHR. These certifications and courses will be reviewed by the PDP Manager on an annual basis Continue to InfoSec and Privacy Career Model
3 InfoSec and Privacy Career Path Model The Career Path Model is composed of four components which help standardize and formalize the InfoSec and Privacy workforce. Additionally, this model supports personnel in their professional development by highlighting career paths available to the State s InfoSec and Privacy workforce. Defines the knowledge and skills required for successful performance within specific InfoSec and Privacy focus areas Competencies Position Descriptions Articulates expected requirements, activities, and duties to be performed within each position Suggests career pathways to move vertically, laterally, or diagonally by selecting the development opportunities that build the skills needed Career Paths InfoSec and Privacy Career Path Model Provides development opportunities to increase skills proficiency through: Formal learning (e.g., certifications) Experiences (e.g., onthe-job) Working with others (e.g., mentors) Continue to InfoSec and Privacy Career Model Overview
4 Hybrid* Core InfoSec and Privacy Career Path Model Overview The InfoSec and Privacy Career Path Model offers multidirectional career paths, enabling InfoSec and Privacy personnel to progress along both technical and management career paths. Click on the links below to explore the career paths. Career Progression InfoSec and Privacy Position InfoSec InfoSec Analyst InfoSec Architect InfoSec Engineer Privacy Privacy Analyst Cross-Division InfoSec & Privacy Auditor Management Career Path Responsible for governance and oversight of people, projects, and programs Inclusive of following positions: InfoSec Manager / Chief Information Security Officer (CISO) Privacy Manager / Agency Privacy Officer (APO) Governance, Risk, and Compliance (GRC) Manager Information Technology Director Network Administrator Program Manager Privacy Program Manager Security Technical Expert Career Path Subject Matter Experts (SMEs) in area of functional expertise May have management responsibilities related to projects and programs *Career level determination in hybrid to core position transfers will be handled on a case-by-case basis with consideration to experience, training, competency-level, and current Agency s needs. Many agencies may not have a need for InfoSec or Privacy roles beyond the hybrid position, therefore progression from hybrid to core may necessitate transfers between agencies, if approved Progression Transfer Continue to InfoSec and Privacy Management Career Path Continue to InfoSec Technical Expert Career Path
5 Privacy InfoSec InfoSec and Privacy Management Career Path The InfoSec and Privacy Management career path produces managers responsible for oversight of InfoSec or Privacy personnel, programs, and projects. Click on the following roles to explore further opportunities. Career Progression Staff Management Senior Leadership InfoSec Analyst I - III InfoSec Architect I InfoSec Manager I - II InfoSec Manager III / CISO* InfoSec Engineer I II InfoSec & Privacy Auditor I - III GRC Manager I - II GRC Manager III Privacy Analyst I - III Privacy Manager I - II Privacy Manager III / APO* *There are limited CISO and APO positions in the State. InfoSec and Privacy Managers will generally fill these roles within State Agencies. Please contact the InfoSec & Privacy PDP Manager or your HR Consultant for more information **Career level determination in lateral transfers will be handled on a case-by-case basis with consideration to experience, training, and competency-level Progression Transfer**
6 InfoSec InfoSec Technical Expert Career Path The InfoSec Technical Expert career path produces subject matter experts (SMEs) in their area of InfoSec functional expertise*. Resources may have management responsibilities related to certain projects or programs but will not oversee personnel. Click on the following roles to explore further opportunities. Career Progression Staff Expert** InfoSec Architect I Architect II - III InfoSec Analyst I - III InfoSec Engineer I - II Engineer III *Technical Expert career path opportunities apply only to the InfoSec workforce based on technical knowledge, skills, and abilities; Privacy workforce progress in the management career path **For further opportunities beyond Expert, please contact the InfoSec & Privacy PDP Manager or your HR Consultant ***Career level determination in lateral transfers will be handled on a case-by-case basis with consideration to experience, training, and competency-level Progression Transfer***
7 InfoSec and Privacy Position Description: InfoSec Analyst necessary by DIS, EPO, and DSHR. These certifications and courses will be reviewed by the InfoSec & Privacy PDP SANS SEC301: Intro to Information Security GISF x x x SANS SEC401: Security Essentials Bootcamp Style GSEC x x x ISACA: Certified Information Security Manager (CISM) CISM x ISACA: Certified in Risk and Information Systems Control (CRISC) CRISC x x ISC2: Certified Information Systems Security Professional (CISSP) CISSP x x CompTIA: Network+ N Network+ x x x CompTIA: Security+ SYO-401 Security+ x x x EC Council: Certified Ethical Hacker (CEH) CEH x Go back to InfoSec Technical Expert Career Path
8 InfoSec and Privacy Position Description: GRC Manager necessary by DIS, EPO, and DSHR. It is established that these certifications and courses are reviewed by the PDP SANS SEC401: Security Essentials Bootcamp Style GSEC x x x ISACA: Certified in Risk and Information Systems Control (CRISC) CRISC x ISACA: Certified Information Security Manager (CISM) CISM x x ISACA: Certified Information Systems Auditor (CISA) CISA x x ISACA: Certified in the Governance of Enterprise IT (CGEIT) CGEIT x InfoSec Institute: Certified in the Governance of Enterprise IT (CGEIT) CGEIT x
9 InfoSec and Privacy Position Description: Privacy Analyst necessary by DIS, EPO, and DSHR. These certifications and courses will be reviewed by the InfoSec & Privacy PDP IAPP: Foundation * N/A x x x IAPP: Certified Information Privacy Professional / U.S. Private-Sector (CIPP/US) IAPP: Certified Information Privacy Professional / U.S. Government (CIPP/G) CIPP/US x x CIPP/G x x IAPP: Certified Information Privacy Technologist (CIPT) CIPT x ISACA: An Introduction to Privacy and Data Protection N/A x x x * This course will be retired on July 1st, 2015
10 InfoSec and Privacy Position Description: Privacy Manager I - II and Privacy Manager III / APO necessary by DIS, EPO, and DSHR. These certifications and courses will be reviewed by the InfoSec & Privacy PDP IAPP: Foundation * N/A x x x IAPP: Certified Information Privacy Professional / U.S. Private-Sector (CIPP/US) IAPP: Certified Information Privacy Professional / U.S. Government (CIPP/G) CIPP/US x x x CIPP/G x x x IAPP: Certified Information Privacy Technologist (CIPT) CIPT x x x IAPP: Certified Information Privacy Manager (CIPM) CIPM x x Privacy Professor Privacy Impact Assessment Tool Kit N/A x x x * This course will be retired on July 1st, 2015
11 InfoSec and Privacy Position Description: InfoSec and Privacy Auditor necessary by DIS, EPO, and DSHR. These certifications and courses will be reviewed by the InfoSec & Privacy PDP SANS SEC401: Security Essentials Bootcamp Style GSEC x x x SANS SEC566: Implementing and Auditing the Critical Security Controls - In- Depth N/A x x SANS LEG523: Law of Data Security and Investigations GLEG x x x IAPP: Certified Information Privacy Professional / U.S. Private-Sector (CIPP/US) IAPP: Certified Information Privacy Professional / U.S. Government (CIPP/G) CIPP/US x x x CIPP/G x x x IAPP: Certified Information Privacy Technologist (CIPT) CIPT x x ISACA: Certified Information Systems Auditor (CISA) CISA x x
12 InfoSec and Privacy Position Description: InfoSec Architect necessary by DIS, EPO, and DSHR. These certifications and courses will be reviewed by the InfoSec & Privacy PDP SANS - MGT305: Technical Communication and Presentation Skills for Security Professionals SANS SEC504: Hacker Techniques, Exploits & Incident Handling (GCIH) N/A x x x GCIH x x ISACA: Certified Information Security Manager (CISM) CISM x ISC2: Certified Information Systems Security Professional (CISSP) CISSP x x ISC2: Information Systems Security Architecture Professional (ISSAP) ISSAP x x x InfoSec Institute: Enterprise Security Architecture and Design Online (ONL-212) N/A x x x InfoSec Institute: Intrusion Prevention Online (SEC 204) N/A x x EC Council: Certified Network Defense Architect (CNDA) CNDA x x Go back to InfoSec Technical Expert Career Path
13 InfoSec and Privacy Position Description: InfoSec Engineer necessary by DIS, EPO, and DSHR. These certifications and courses will be reviewed by the InfoSec & Privacy PDP SANS SEC566: Implementing and Auditing the Critical Security Controls - In- Depth GCCC x x x SANS SEC504: Hacker Techniques, Exploits & Incident Handling GCIH x x ISACA: Certified Information Security Manager (CISM) CISM x x ISC2: Certified Information Systems Security Professional (CISSP) CISSP x x ISC2: Information Systems Security Engineering Professional (ISSEP) ISSEP x x x Defense Cyber Investigation Academy: Introduction to Log Analysis N/A x EC Council: Licensed Penetration Tester (LPT) LPT x x EC Council: Certified Security Analyst (ECSA) ECSA x x x Global Knowledge: Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analyzing Suspicious Network Traffic N/A x x Go back to InfoSec Technical Expert Career Path
14 InfoSec and Privacy Position Description: InfoSec Manager I - II and InfoSec Manager III / CISO necessary by DIS, EPO, and DSHR. These certifications and courses will be reviewed by the InfoSec & Privacy PDP SANS MGT512: Security Leadership Essentials for Manager with Knowledge Compression GSLC x x x SANS MGT514: IT Security Strategic Planning, Policy and Leadership N/A x x x SANS MGT305: Technical Communication and Presentation Skills for Security Professionals N/A x x x SANS SEC504: Hacker Techniques, Exploits & Incident Handling GCIGH x x ISACA: Certified Information Security Manager (CISM) CISM x x x ISACA: Certified in Risk and Information Systems Control (CRISC) CRISC x x ISACA: Certified in the Governance of Enterprise IT (CGEIT) CGEIT x x ISC2: Certified Information Systems Security Professional (CISSP) CISSP x x x
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
DoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
Information Security Principles and Practices
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,
Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications
SearchSecurity.com's IT security certifications guide 1 of 18 Check out the other guides in this series: Guide to information security certifications SearchSecurity.com's guide to vendor-neutral security
All about CPEs. David Gittens CISA CISM CISSP CRISC HISP
All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance
SANS CyberTalent VetSuccess Immersion Academy. VetSuccess
SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many
CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)
CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training
ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE
create better trained employees. choose the best value in training. ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE PRODUCTIVE train your workforce on-site. save on employee downtime
Understanding the Federal IT Security Professional (FITSP) Certification
Understanding the Federal IT Security Professional (FITSP) Certification Jim Wiggins Executive Director Federal IT Security Institute ISACA NCAC Conference Certification and Emerging Standards Holiday
GIAC Program Overview 2015 Q4 Version
GIAC Program Overview 2015 Q4 Version Program Overview - GIAC Certification 2015 1 What is GIAC? GIAC is the Global Information Assurance Certification program GIAC assesses candidate knowledge in specific
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
Terms of Reference for an IT Audit of
National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor
How To Become A Security Professional
Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided
Tom VAN DEN EYNDE CISSP, CISA, CISM
Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde E-mail: [email protected] Phone: +32 - (0)495 91 20 62 Address: Meerminnenstraat 34, 2800 Birthday: May
Field of Study Area of Expertise Certification Vendor Course
Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner
MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS
OVERVIEW MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS 2016 Coursework to Meet Real World Demands The best. Made better. SANS graduate programs are the ultimate expression
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
So Why on Earth Would You WANT To be a CISO?
So Why on Earth Would You WANT To be a CISO? SESSION ID: PROF-M05A Todd Fitzgerald CISSP, CISA, CISM, CRISC, CGEIT, PMP, ISO27000, CIPP, CIPP/US, ITILV3f Global Director of Information Security Grant Thornton
The enemies ashore Vulnerabilities & hackers: A relationship that works
The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively
Career Analysis into Cyber Security: New & Evolving Occupations
Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills
CompTIA Certification Renewal Policy and Continuing Education (CE) Program. Kyle Gingrich Senior Director, Product Management kgingrich@comptia.
CompTIA Certification Renewal Policy and Continuing Education (CE) Program Kyle Gingrich Senior Director, Product Management [email protected] CompTIA s Mission Our Mission Educate The IT Community
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
TOPSECRETPROTECTION.COM (TSP)
TOPSECRETPROTECTION.COM (TSP) OVERVIEW OF CYBER SECURITY-INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT TRAINING COURSE CYBER SECURITY-ISSPM PROFESSIONAL CERTIFICATION Introduction To TSP TSP has over
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
InfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
Renewing CompTIA Certifications With Achieving Other Vendor Certifications
Renewing CompTIA Certifications With Achieving Other Vendor Certifications Overview You may earn Continuing Education Units (CEUs) toward your certification renewal by earning other industry certifications.
Director, IT Security District Office Kern Community College District JOB DESCRIPTION
Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,
Information Security Engineering
Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information
GIAC Certification. Enterprise Solution
E- Business & Web Solutions IT Solutions (Hardware, Software, Services) Business Process & Technology Outsourcing Enterprise Solution Professionals on Information and Network Global Information Assurance
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
The fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn
SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Course Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
Peregrine Technical Solutions, LLC
GENERAL SERVICES ADMINISTRATION Federal Supply Service Authorized Federal Supply Schedule Price List On-line access to contract ordering information, terms and conditions, up-to- date pricing, and the
Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP
Security Certifications Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Wie ben ik? Jordy Kersten 26 jaar Communicatie Systemen HAN Arhnem Informatiekunde RU Nijmegen Security Consultant
SECURING PAYMENTS IN THE CYBER WORLD
The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages
Information Security Training & Awareness
Online Training & Project Briefing Expectations & Responsibilities Information Security Manager s Forum, March 4, 2008 Revised September 20, 2010 (1) Why is awareness important? Obligation to protect private
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
Career Opportunities and Development for Asia Information Security Professional with the
IT & Information Security Professional Career Opportunities and Development www.tisa.or.th December 2009 Career Opportunities and Development for Asia Information Security Professional with the IT Security
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003
The Certified Information Security Manager (CISM) certification is a unique management-focused certification that has been earned by more than 16,000 professionals since its introduction in 2003. Unlike
InfoSec Academy Pen Testing & Hacking Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
FedVTE Course Library
FedVTE Course Library Advanced PCAP Analysis and Signature Dev 1 Hour... 3 Artifact Analysis 1 Hour... 3 Basic Network Traffic Analysis 5 Hours... 3 CCNA Security 34 Hours... 4 Centaur SiLK Traffic Analysis
North Texas ISSA CISO Roundtable
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
CYBERSECURITY & ANALYTICS. How Both Will Change Your Career in e-discovery
CYBERSECURITY & ANALYTICS How Both Will Change Your Career in e-discovery Jared Coseglia TRU Staffing Partners Founder & CEO Jared Michael Coseglia, founder and President of TRU Staffing Partners, has
Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
Job Market Intelligence: Cybersecurity Jobs, 2015. 2015 Burning Glass Technologies
Job Market Intelligence: Cybersecurity Jobs, 2015 Introduction: Cybersecurity and the Job Market American employers have realized the vital importance of cybersecurity but that realization has created
Chayuth Singtongthumrongkul
IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
MANAGEMENT DEVELOPMENT COURSES
(FULL VIEW) MANAGEMENT DEVELOPMENT COURSES MANAGEMENT DEVELOPMENT COURSES LEADERSHIP DEVELOPMENT Developing Leadership Competencies 4 4 days 230,000 1-4 13-16 26-29 6-9 Critical Thinking: Tools for Problem
Forensic Certifications
Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice
FedVTE Course Library
FedVTE Course Library Advanced PCAP Analysis and Signature Dev 1 Hour... 3 Artifact Analysis 1 Hour... 3 Basic Network Traffic Analysis 5 Hours... 3 CCNA Security 34 Hours... 4 Centaur SiLK Traffic Analysis
EVOLUTION OF THE CISO
EVOLUTION OF THE CISO And the Confluence of IT Security & Audit Thomas Borton, MBA, CISA, CISM, CRISC, CISSP Director, IT Security & Compliance 13 March 2014 AGENDA 1. Introduction 2. Evolution of the
Securing your Corporate Infrastructure What is really needed to keep your assets protected
Securing your Corporate Infrastructure What is really needed to keep your assets protected Joseph Burkard CISA, CISSP October 3, 2002 1 Securing your Corporate Infrastructure Management Dilemma or Technical
Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )
10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Experience with the Framework for Improving Critical Infrastructure
Designing & Building an Information Security Program. To protect our critical assets
Designing & Building an Information Security Program To protect our critical assets Larry Wilson Version 1.0 March, 2014 Instructor Biography Larry Wilson is responsible for developing, implementing and
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
OVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:
Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you can
BMS Consulting Cyber Security and IT Technology Team
BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the
Secure360. Measuring the Maturity of your Information Security Program Impossible? Presented by: Mark Carney, VP of Strategic Services
Secure360 Measuring the Maturity of your Information Security Program Impossible? Presented by: Mark Carney, VP of Strategic Services Question about Life HOW DO YOU KNOW IF YOU ARE GETTING THE MOST OUT
Understanding the Federal Cyber Security Professional (FCSP) Certifications
Understanding the Federal Cyber Security Professional (FCSP) Certifications Introducing a new set of performance-based credentials from the Federal IT Security Institute First Public Draft Copyright 2010-2011
Mission Critical CyberSecurity Functions
Mission Critical Cyber Functions Critical roles with the most technically sophisticated knowledge, skills and abilities for enterprise cybersecurity February 2014 1700 N Moore St Ste 2100 Telephone: 703.600.1935
