of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744



Similar documents
Information Security Principles and Practices

Computer Security and Investigations

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Brandman University. School of CCNA

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Career Analysis into Cyber Security: New & Evolving Occupations

OVERVIEW DEGREES & CERTIFICATES

Presented by Frederick J. Santarsiere

Technology Approved Certifications

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

How To Build A Cybersecurity Company

Network Engineering Technology

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

InfoSec Academy Application & Secure Code Track

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

Security University. Sondra Schneider. Security University. July 2015

CYBER SECURITY TRAINING SAFE AND SECURE

Information Systems Technology & Cybersecurity Programs

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

Cisco Network Specialist CCNA

Introducing... FedVTE and FedCTE

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

Field of Study Area of Expertise Certification Vendor Course

Information Technology 2015 Programmes

Priority III: A National Cyberspace Security Awareness and Training Program

DoD Directive (DoDD) 8570 & GIAC Certification

IT and Cyber Security Training Courses

InfoSec Academy Pen Testing & Hacking Track

Michelle Govan & Anand Philip Network & Security Engineering

Preparing the Cybersecurity Workforce Through Creative Partnering

Cybersecurity Workforce Training Partnership

Access FedVTE online at: fedvte.usalearning.gov

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Information Security Specialist Training on the Basis of ISO/IEC 27002

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

InfoSec Academy Forensics Track

Bachelor of Information Technology

State of South Carolina InfoSec and Privacy Career Path Model

Cybersecurity Education Doesn t Always Take Place in the Classroom

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

Guided HIPAA Compliance

Cyber Security Operations Specialist

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

Minnesota State Community and Technical College Detroit Lakes Campus

Cyber Security Education: My Personal Thoughts. Bharat Doshi

GIAC Program Overview 2015 Q4 Version

Cisco Security Certifications

Understanding the Federal Cyber Security Professional (FCSP) Certifications

Information Systems Security Certificate Program

Cyber R &D Research Roundtable

Metropolitan Community College Cisco & Network Security Advisory Board Meeting & Luncheon. Minutes June 10, 2013

Information Security Engineering

Goal. Vision. CAE 2Y Program Eligibility and Summary

CONSULTING IMAGE PLACEHOLDER

Report on CAP Cybersecurity November 5, 2015

Hackers are here. Where are you?

Unit 3 Cyber security

Information Security Training & Awareness

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Principles of Information Assurance Syllabus

EC-Council. Certified Ethical Hacker. Program Brochure

TOPSECRETPROTECTION.COM (TSP)

Cyber Defense Operations Graduate Certificate

ISO Information Security Management Services (Lot 4)

Cyber Security at NSU

Hackers are here. Where are you?

CAST Center for Advanced Security Training

EC-Council Certified Security Analyst (ECSA)

CESG Certified Professional

IT courses For Senior Managers

Cybersecurity Certificate Programs

Transcription:

6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744

Basic Principles The Basic Principles of InfoSecurity are Universal and Timeless principles of processes and methodology. Values govern people s behavior and principles ultimately determine the consequences, Processes and methodology used to educate and train our Cybersecurity professionals ensures the security work force is not just certifying but qualifing the workforce. There are 6 Skills of Highly Effective & Validated InfoSec Professionals with simple steps to achieve that goal in a series of infosecurity skills certifications, manifesting as a progression from certified via validated via qualified.

Today s Cybersecurity Professionals 1,000 U.S. security specialists with the skills necessary to operate in cyberspace -- the country needs 10,000 to 30,000. CSIS' Commission on Cybersecurity condemned the credentials of today's federal cyber practitioners. "It is the consensus that the current professional certification regime is not merely inadequate, it creates a dangerously false sense of security" because the credentials do not improve employees' skills Current credentials focus too much on demonstrating expertise in documenting security compliance rather than expertise in preventing and responding to attacks

Certified vs Qualified IT Security Skills Tactically Pyramid Qualified Validated Skills Practical Hands-on Lab Experience CCIE, CCNA, Q/ISP Q/EH, Q/SA, Q/FE, Q/ND CISSP, MCSE, GIAC, CEH CompTIA Security+ Network+ Administrator Skills A+, CISCO, FW

Job Analysis A job is a collection of tasks and responsibilities that an employee is responsible to conduct. A task is a typically defined as a unit of work, a set of activities needed to produce some result, e.g., assessing vulnerabilities, writing an assessment, threat management. Complex positions in your organization may include a large number of tasks, which were can refer to as functions Job descriptions list the general tasks, or functions, and responsibilities of a position A job analysis examining the tasks and sequences of tasks necessary to perform the job. The analysis looks at the areas of knowledge and skills needed by the job Resulting in a role - the set of responsibilities with expected results associated with a job. (A job usually includes several roles)

Job analysis aims to answer questions such as: 1. Why does the job exist? 2. Who can do the job? 2. What tactical t skills if any do you need to do the job? 3. How does the worker do the job? 4. In a skills-based job, the skills are inferred from tasks and the skills are rated directly in terms of importance of frequency. 5. How do you determine if they are qualified to perform the job? 6. What constit tt utes successful performance?

6 Skills of Qualified Highly Effective Security Professionals Qualified & Validated Professionals Pyramid Wireless security C&A Network Defense Forensics Defense/ Investigations Security Analysis Vulnerability /Penetration Testing Ethical Hacking - Security Testing Tools

Competence or Confidence? Certification and Certificate are vastly different terms, yet the InfoSec industry uses them synonymously. Certification assesses of an individual s knowledge, skills, and abilities based on a body of knowledge. You can master the body of knowledge confidently passing an exam. Certificate or Assessment Based Certification programs are performance based assessments of an individual s knowledge, hands-on skills, and abilities based on practical assessment and validation of practical assessment. The recent CSIS report validates Certifications provide a false sense of security about the cyber workforce. If in 2005 validated hands-on security skills was required like a Cisco CCIE Certification is required by Cisco the 2001 workforce would be 40% closer to a 10,000 validated cybersecurity workforce standard. https:// //www.ansica.org/wwwversion2/ 2/outside/PERf /PERfaq.asp?menuID=2

Workforce readiness How should companies verify or test to ensure the right people are in right place with the appropriate skill sets? There might be other choices for validating workforce readiness, but for this discussion, it comes down to handson skills qualification or certification. 6 Security Skills of Highly Effective Security Professionals Security testing tools, Ethical Hacking Security Analyst Vulnerability Penetration Testing Forensic Defense & Investigations Network Defense Certifi ification i & Accreditati dit tion of ISMS Wireless Security

Overhaul cybersecurity certifications? Is there a debate to what is more important? 1) validate: an individual s conceptual knowledge, 2) assessment based performance associated with a tactical security skill? Who do you want on your six? Do you want a security SME who has practical security skills who competency has been validated with a certification, qualification and lastly a validation process or do you want a trained infosec person who has demonstrated expertise in documenting security compliance

Ownership Some day a combination of science, technology, education and discipline may produce an information infrastructure less sensitive to human foibles foibles. But, unless and until then, these words by Thomas Jefferson that answer the question posed by this essa y s title. I know of no safe depository of the ultimate powers of society but the people themselves; es and if we think them not enlightened enough to exercise their control with a wholesome discretion, the remedy is not to take it from them, but inform their discretion by education.

6 Skills of Highly Effective Security Professionals THANK YOU! By Sondra Schneider CEO Security University s0ndra@securityuniversity.net net 203.357.7744