ISACA S CYBERSECURITY NEXUS (CSX) October 2015



Similar documents
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

KEY TRENDS AND DRIVERS OF SECURITY

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

ISACA Tools Help Develop Cybersecurity Expertise

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

CYBERSECURITY NEXUS CSX. 15 October 2014 ISACA Winchester Chapter

Cyber Risk Management with COBIT 5

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

The Next Generation of Security Leaders

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

State of South Carolina InfoSec and Privacy Career Path Model

Enterprise Service Management (ESM)

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA

CyberSkills Management Support Initiative

MANY CERTIFICATES WHAT S THE WORTH?

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Cybersecurity Supply-Chain

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

Cyber Learning Solutions

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY, A GROWING CIO PRIORITY

ENABLE YOUR JOURNEY TO THE CLOUD

Certification and Training

The Talent Management Framework

State of IT Skills Gap

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

SECURING PAYMENTS IN THE CYBER WORLD

PCI DSS READINESS AND RESPONSE

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

National Initiative for Cybersecurity Education

THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers

Security Transcends Technology

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

Advanced Threat Protection with Dell SecureWorks Security Services

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Security Intelligence Services. Cybersecurity training.

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Welcome Remarks, IDMA President, Dana Reynolds, SAC Ravenelle

Network Management and Defense Telos offers a full range of managed services for:

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA

Certified Information Security Manager (CISM)

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

RFID Journal LIVE! 2014

Cybersecurity Framework: Current Status and Next Steps

(BDT) BDT/POL/CYB/Circular

Talent & Organization. Change Management. Driving successful change and creating a more agile organization

Department of Homeland Security Federal Government Offerings, Products, and Services

CyberNEXS Global Services

Project Management Professional (PMP)

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Getting in Front of the Cybersecurity Talent Crisis

SCADA Security Training

REPORT. Next steps in cyber security

National Initiative for Cyber Security Education

Address C-level Cybersecurity issues to enable and secure Digital transformation

Information Security Workforce Development Matrix Initiative. FISSEA 23 rd Annual Conference March 23, 2010

Aftermath of a Data Breach Study

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.

The fast track to top skills and top jobs in cyber. Guaranteed.

EMC ACADEMIC ALLIANCE

Developing a Mature Security Operations Center

Sales and Marketing Certifications. Global Accreditation Body for. Digital Marketing (DM) Branding and Advertising (BA) Marketing Strategy (MS)

Trends in Information Technology (IT) Auditing

Re-Imagining the Cyber Warrior of the Future

CYBERSECURITY & ANALYTICS. How Both Will Change Your Career in e-discovery

Transcription:

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration with chief information security officers and cybersecurity experts from leading companies around the world, fills an unmet need for a single, central location where security professionals and their enterprises can find cybersecurity research, guidance, certificates and certifications, education, mentoring and community. The continued growth of cyberattacks comes with a steep price tag. A World Economic Forum/McKinsey report estimates that not changing current approaches to cybersecurity could cost the global economy US $3 trillion.2 Today, there is a sizeable gap between formal education and real world needs. This, in itself, is an area requiring immediate focus so that the industry can get better at detecting and mitigating cyberthreats.

Bild 2 DO2 * Move the RSA survey to the line under About ISACA.and move those slides up accordingly. * Add "Conference" after RSA and add "survey" after "2015" * You have "student poll" on this twice * needs a better head than "Agenda" Deborah Oetjen (ISACA HQ); 2015-04-17

DO2 EXECUTIVE OVERVIEW Cybersecurity Skills Crisis Global Market Need is Clear: ISACA & RSA State of Cybersecurity: Implications for 2015 survey ISACA 2015 Global Cybersecurity Status Report Highlights ISACA Student Poll CSX Roadmap: CSX Training and Certifications CSX Resources and Tools Career Management CSX 2015, Washington DC

Bild 3 DO2 * Move the RSA survey to the line under About ISACA.and move those slides up accordingly. * Add "Conference" after RSA and add "survey" after "2015" * You have "student poll" on this twice * needs a better head than "Agenda" Deborah Oetjen (ISACA HQ); 2015-04-17

CYBERSECURITY: MARKET NEED The research is clear. Cybersecurity has evolved from critical topic into a public safety issue. 82% of enterprises expect to experience a cyber incident in 2015. More than 35% are unable to fill open cybersecurity positions 69% say certification is required for cybersecurity jobs. Only 33% say qualified candidates have hands-on experience. 46% say technical skills are needed. There is a cybersecurity skills crisis: 1 million unfilled jobs. (Cisco)

STATE OF CYBERSECURITY: IMPLICATIONS FOR 2015 ISACA and RSA CONFERENCE JOINT SURVEY www.isaca.org/state-of-cybersecurity-2015

2015 GLOBAL CYBERSECURITY STATUS REPORT 3,400+ RESPONDENTS WORLDWIDE www.isaca.org/cybersecurityreport

ISACA STUDENT POLL Do you feel that you will have adequate cybersecurity knowledge to do the type of job you are seeking when you graduate? Yes (47%) No (22%) Unsure (29%) Do you plan to pursue a cybersecurity related certificate or certification? Yes (74%) Unsure (19%) No (7%) 0% 50% 100% I do not need cybersecurity knowledge for the job I am seeking (2%) 88% of students plan to work in a field or job that requires some level of cybersecurity knowledge after graduation. 8

CSX: THE ROADMAP cybersecurity.isaca.org

ISACA AND CSX AT THE FOREFRONT ISACA and CSX are Leaders in Cybersecurity Career Management Cybersecurity is a natural extension building on how ISACA has evolved to serve the needs of professionals worldwide. ISACA collaborates with leading global governments and organizations at the center of cybersecurity. Through CSX, ISACA is providing the first holistic program for cybersecurity career progression. https://cybersecurity.isaca.org/csx-careers 10

OUR SOLUTION CSX Is Providing a Single Source for Cybersecurity Professionals: our holistic program will be the first and only one stop shop providing a complete solution and covering the full career lifecycle. Credentialing and Training Education/ Conferences Membership Resources/ Publications Career Management 11

CYBERSECURITY TRAINING AND CERTIFICATIONS CSX training and certifications offered for skill levels and specialties throughout a professional s career. https://cybersecurity.isaca.org/csx-certifications 12

COMPETITIVE ADVANTAGE ISACA will be the only organization to provide the full spectrum of training, certifications, events, research, thought leadership, career management, and more, in one place. 13

CSX CERTIFICATIONS - OVERVIEW Certified Information Security Manager CSX Expert CSX Specialist Identify CSX Specialist Detect CSX Specialist Protect CSX Specialist Respond CSX Specialist Recover CSX Practitioner Cybersecurity Fundamentals Certificate 14

PRIMARY CHANNELS Training Providers Academic Institutions Enterprises Government 15

TARGET ROLES AND MARKET SEGMENTS PRIMARY TARGETS College Students/Recent Grads Security Practitioners Management SECONDARY TARGETS Professionals in technical and/or business roles who contribute to cybersecurity or who need to have knowledge of cybersecurity practices and tools Technical professionals: network analysts, network architects, DBAs, software programmers Business professionals: network managers and directors, information risk managers, business analysts, project managers 16

PRIMARY VERTICALS AND MARKETING GOALS Primary Universities: Verticals Market Segment Leading in Computer Sciences with Industry- Leading Curriculum Students: Higher Ed Young Professionals: Recent Grads Entry Level 1-5 Years Experience Practitioners Mid Management: 5-10+ Years Experience Senior/C-Level: CISOs CIOs CISMs Key Marketing Strategies Awareness Education Awareness Education Adoption Awareness Adoption Awareness Adoption Awareness Organizational Adoption Organizational Education Program Areas and Offers Customized Curriculum Student Career Planning Onsite Education Cybersecurity Fundamentals Certificate Fundamentals Study Guide CSX I Certification Training Courses Student Membership Career Management CSX 2015 North America Conference Cybersecurity Fundamentals Certificate Fundamentals Study Guide CSX I Certification Training Courses Sandbox Subscription Career Management CSX 2015 North America Conference CSX I Certification CSX II Certification CSX III Certification Study Guide Training Courses Sandbox Subscription Professional Membership Career Management CSX 2015 North America Conference Enterprise Training Onsite Training & Education Content Hiring Influencers Professional Membership CSX 2015 North America Conference CISO Forums Marketing Focus Brand Awareness Activities Outreach Brand Awareness Activities Direct Sales Brand Awareness Activities Direct Sales Brand Awareness Activities Direct Sales Brand Awareness Activities Channel Sales Support Marketing Tactics Direct Mail Email Tradeshows/Conferences Collateral Virtual Conferences Webinars Direct Mail Email Tradeshows/Conferences Collateral Webinars SEM Direct Mail Email Tradeshows/Conferences Collateral Virtual Conferences Website (landing pages, banner ads, content, video) Digital Advertising Communications (PR, Social Media, Speakers, Blog, CSX Nexus News Hub) SEM Direct Mail Email Tradeshows/Conferences Collateral Virtual Conferences Website (landing pages, banner ads, content, video) Digital Advertising Communications (PR, Social Media, Speakers, Blog, CSX Nexus News Hub) SEM Direct Mail Email Tradeshows/Conferences Collateral Virtual Conferences Website (landing pages, banner ads, content, video) Digital Advertising Communications SEM 17

MARKETING CHANNELS 18

KEY MESSAGES ISACA is introducing the first-ever performance-based cybersecurity certifications so employers can confidently identify and hire people with proven skills and technical ability. CSX training will help build a cybersecurity-trained global workforce using an innovative online cyber practice lab. Professionals can practice and improve skills in a real-world environment. CSX helps individuals gain skills and expertise to build, grow and change their careers in a constantly evolving field. Supporting Messages: Skilled cybersecurity professionals are urgently needed to fill thousands of open jobs globally. 82 percent of organizations expect to experience a cyber attack in 2015, yet more than one in three (35 percent) are unable to fill cybersecurity positions.* Less than half feel their security teams are able to detect and respond to complex incidents* 69% require certification when looking for cybersecurity candidates.* *According to the State of Cybersecurity: Implications for 2015 study by ISACA and RSA. 19

CYBERSECURITY TRAINING AND CERTIFICATIONS CSX Practitioner Demonstrates ability to serve as a first responder to a cybersecurity incident following established procedures and defined processes. (1 certification, 3 training courses; prerequisite for CSX Specialist) CSX Specialist Demonstrates effective skills and deep knowledge in one or more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5 certifications, 5 training courses; requires CSX Practitioner) CSX Expert Demonstrates ability of a master/expert-level cybersecurity professional who can identify, analyze, respond to, and mitigate complex cybersecurity incidents. (1 certification, 1 training course; no prerequisites required) Certified Information Security Manager certification (26,000+ professionals certified since inception; named the second-highest-paying certification by Global Knowledge s 2015 IT Skills and Salary Survey; 5+ years experience required) 20

CAREER MANAGEMENT CSX focuses on providing you with the resources to continuously hone your skills, expand your knowledge, and start (and keep) your career on a trajectory towards achieving your goals. 21

CAREER MANAGEMENT https://cybersecurity.isaca.org/csx-careers 22

CAREER MANAGEMENT https://cybersecurity.isaca.org/csx-careers 23

CSX RESOURCES AND TOOLS Cybersecurity Guidance for Small and Medium-Sized Enterprises Overview of Digital Forensics UPCOMING ELEMENTS: Career management road map 2015 APT study Threats and opportunities tool 24

19-21 October 2015 Washington, DC, USA 70+ sessions tailored by career level Women in Security Global CyberLympics World Finals www.isaca.org/cyber-con #CSXNA

DO10 ABOUT ISACA Assuring trust in a dynamically changing digital world Global association serving 140,000 cybersecurity, assurance, governance and risk professionals Members in 180 countries; 200+ chapters worldwide Launched Cybersecurity Nexus (CSX) in 2014 to address growing cybersecurity skills crisis and develop a skilled cyber workforce Skills-based training Performance-based certifications Developed and maintains the COBIT framework Offers the CISA, CISM, CGEIT and CRISC certifications

Bild 26 DO10 * Move the RSA survey to the line under About ISACA.and move those slides up accordingly. * Add "Conference" after RSA and add "survey" after "2015" * You have "student poll" on this twice * needs a better head than "Agenda" Deborah Oetjen (ISACA HQ); 2015-04-17

DO9 cybersecurity.isaca.org Contact: csx@isaca.org

Bild 27 DO9 * Use only the csx email here Deborah Oetjen (ISACA HQ); 2015-04-17

THANK YOU