The Value of Information Security Certifications



Similar documents
Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund

Security Transcends Technology

Exploring the Landscape of Philippine Cybersecurity

The face of consistent global performance

Career Capital 2014 Global Research Results

Certification and Training

World Consumer Income and Expenditure Patterns

Appendix 1: Full Country Rankings

The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost *

Reporting practices for domestic and total debt securities

BT Premium Event Call and Web Rate Card

OCTOBER Russell-Parametric Cross-Sectional Volatility (CrossVol ) Indexes Construction and Methodology

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES

Behaviour Analysis & Certification in Europe: Developments & Opportunities

SUPPLEMENTAL EXECUTIVE RETIREMENT PLANS IN CANADA

Behaviour Analysis & Certification in Europe: Developments & Opportunities

CNE Progress Chart (CNE Certification Requirements and Test Numbers) (updated 18 October 2000)

Brochure More information from

Global Effective Tax Rates

Microsoft Voucher Ordering Processes

MERCER S COMPENSATION ANALYSIS AND REVIEW SYSTEM AN ONLINE TOOL DESIGNED TO TAKE THE WORK OUT OF YOUR COMPENSATION REVIEW PROCESS

Governance, Risk and Compliance Assessment

inancial Planning s nternational Standard

CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update

10.0 FPSB s Country/region-specific Trademark Symbols and Legal Notices

Information Systems Security Engineering Professional (ISSEP)

Consolidated International Banking Statistics in Japan

Configuring DHCP for ShoreTel IP Phones

THE WORLD S LEADING CAR DESIGN MAGAZINE

The Path Forward. International Women s Day 2012 Global Research Results

CLUB SURVEY 2015 BANKING ARGENTINA

SunGard Best Practice Guide

THE INTERNATIONAL FEDERATION OF PURCHASING AND SUPPLY MANAGEMENT. Your global network of procurement professionals

AACSB International Accreditation and Joint Programs

The Determinants of Global Factoring By Leora Klapper

STATE OF GLOBAL E-COMMERCE REPORT (Preview) February 2013

GLOBAL HRMONITOR NEW DIMENSIONS IN ONLINE HR INFORMATION TALENT HEALTH RETIREMENT INVESTMENTS

IFI SPONSOR & PARTNER OPPORTUNITIES CELEBRATING 50 YEARS

An introduction to the World Federation of Occupational Therapists (WFOT)

Senate Committee: Education and Employment. QUESTION ON NOTICE Budget Estimates

A Nielsen Report Global Trust in Advertising and Brand Messages. April 2012

Business Continuity Program Benchmark Report Budget Review - SAMPLE -

IP Trading Solutions

Cloud Readiness Consulting Services

How do you manage the brain of the business in a way that supports the opportunities your organisation wants to take advantage of?

Raveh Ravid & Co. CPA. November 2015

Schedule R Teleconferencing Service

Global Dialing Comment. Telephone Type. AT&T Direct Number. Access Type. Dial-In Number. Country. Albania Toll-Free

41 T Korea, Rep T Netherlands T Japan E Bulgaria T Argentina T Czech Republic T Greece 50.

YTD CS AWARDS IN AMERICAS

Doing Business in Australia and Hong Kong SAR, China

Cloud Readiness Workshop

2014 UXPA Salary Survey. November 2014

best practice guide The Three Pillars of a Secure Hybrid Cloud Environment

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals

Hybrid Wide-Area Network Application-centric, agile and end-to-end

The Next Generation of Security Leaders

How To Get A New Phone System For Your Business

July 2012 Decoding Global Investment Attitudes

HAS BRAZIL REALLY TAKEN OFF? BRAZIL LONG-RUN ECONOMIC GROWTH AND CONVERGENCE

2015 Growth in data center employment continues but the workforce is changing

Vodafone Traveller and Vodafone World

Project Management Salary Survey Ninth Edition Project Management Institute Newtown Square, Pennsylvania, USA

MAUVE GROUP GLOBAL EMPLOYMENT SOLUTIONS PORTFOLIO

SEPTEMBER 2012 TALENT ASSESSMENT IN M&A THE PEOPLE FACTOR

Global AML Resource Map Over 2000 AML professionals

2012 Country RepTrak Topline Report

Know the Facts. Aon Hewitt Country Profiles can help: Support a decision to establish or not establish operations in a specific country.

USAGE OF METRICS AND ANALYTICS IN EMEA MOVING UP THE MATURITY CURVE

Axioma Risk Monitor Global Developed Markets 29 June 2016

Agenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE

July Figure 1. 1 The index is set to 100 in House prices are deflated by country CPIs in most cases.

Introducing GlobalStar Travel Management

2013 GLOBAL PERFORMANCE MANAGEMENT SURVEY REPORT

ENDOWMENT & FOUNDATION GOVERNANCE: FIDUCIARY OVERSIGHT AND IMPLEMENTATION MAY 2013

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

IOOF QuantPlus. International Equities Portfolio NZD. Quarterly update

How To Manage An Ip Telephony Service For A Business

DIR Contract #DIR-TSO-2610 Amendment #1 Appendix C Price Index

Digital vs Traditional Media Consumption

Carnegie Mellon University Office of International Education Admissions Statistics for Summer and Fall 2010

The value of accredited certification

DSV Air & Sea, Inc. Aerospace Sector. DSV Air & Sea, Inc. Aerospace

International Institute of Business Analysis. Salary Survey Report

What have you got in mind?

Brochure More information from

Defining Success 2013 Global Research Results

A BETTER RETIREMENT PORTFOLIO FOR MEMBERS IN DC INVESTMENT DEFAULTS

List of tables. I. World Trade Developments

Contact Centre Integration Assessment

It s critical to be able to correlate threats pre-emptively and respond to them immediately.

E-Seminar. Financial Management Internet Business Solution Seminar

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

Software-as-a-service Delivery: The Build vs. Buy Decision

MANDATORY PROVIDENT FUND SCHEMES AUTHORITY

Report on Government Information Requests

Logix5000 Clock Update Tool V /13/2005 Copyright 2005 Rockwell Automation Inc., All Rights Reserved. 1

Enterprise Mobility Suite (EMS) Overview

Cloud Services for Microsoft

Transcription:

The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org

Overview Why professional certificate for information security? About (ISC) 2 and its credentials Number of (ISC)² members worldwide & in Asia-Pacific Ed Zeitler, CISSP What does this stand for? Chester Soong, CISSP-ISSAP, ISSMP What do these stand for? 2

Why a certificate for information security? In an era of increasingly complex global security risks, the skills and knowledge of security professionals become central to every risk mitigation strategy. The quality of security solutions depends on the ability of security professionals to stay up-to-date, fully trained, and to collaborate with their fellow professionals around the world. Like in other industries, such as the CPA for accounting, credentials provide employers an additional measure of confidence in the knowledge, expertise and ethics of the professional with a credential Information security certifications provide organizations with the assurance that its staff has been tested on understanding industry best practices and possess a broad knowledge of the field as well as sound professional judgment. 3

Professional Certification The Characteristics International Accredited against some international standard that is recognized worldwide, such as ISO standard Examination Rigorous exam to assure knowledge of a taxonomy of information security topics - CBK Independent Not product or service specific Tests habitual knowledge Endorsement Strict endorsement and audit process to verify candidate assertions Ethics Comprehensive set of behavioral guidelines Professional judgment Experience Practical application of the CBK is acquired through experience Re-certification Continuing education to maintain credential Maturity Wide acceptance as the true measure of competency 4

Professional Certification The Values to the Enterprise Solutions orientation, not specialization Broad understanding of Taxonomy of information security topics The rigor and regimen adds to credibility A business and technology orientation to risk management to the Professional Career differentiator Confirms knowledge of a broad range of information security topics Networking with experts globally Part of an elite group of professionals Member of an organization offering career resources and support 5

(ISC) 2 Certifications & Membership

(ISC)² - About Us Established in 1989 - Non-profit consortium of industry leaders Global leaders in certifying and educating information security professionals with the CISSP and related concentrations, CAP CM & SSCP Global standard for information security (ISC)² CBK, a a taxonomy of information security topics Nearly 50,000 certified professionals in 129 countries Produce the only global study of the information security workforce 7

Credential Offerings Credentials The Gold Standards in information security certification Certified Information Systems Security Professional (CISSP ) Certification and Accreditation (CAP CM ) System Security Certified Practitioner (SSCP ) CISSP Concentrations In-depth, specialized enhancements to the CISSP Information Systems Security Architecture Professional (ISSAP ) Information Systems Security Engineering Professional (ISSEP ) Information Systems Security Management Professional (ISSMP ) 8

Certified Information Systems Security Professional (CISSP ) Meant for professionals who: Are experienced professionals who manage and enforce information security policies Have minimum 4 years cumulative work experience in (ISC)² CISSP CBK domains, or 3 years and either Master s degree in information security or undergraduate degree Subscribe to (ISC)² Code of Ethics Are endorsed by another CISSP, qualified professional with knowledge of information systems or an officer of the candidate's corporation Pass a rigorous exam to assess their knowledge, skills and abilities relevant to the (ISC)² CISSP CBK Earn 120 hours of Continuing Professional Education (CPE) every 3 years for recertification May pursue specialized concentrations available in several areas of the (ISC)² CISSP CBK 9

CISSP CBK Domains Access Control Application Security Business Continuity and Disaster Recovery Planning Cryptography Information Security and Risk Management Legal, Regulations, Compliance and Investigations Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network Security 10

CISSP Information Systems Security Architecture Professional (ISSAP )CBK Domains Access Control Systems and Methodology Telecommunications and Network Security Cryptography Requirements Analysis and Security Standards/Guidelines Criteria Technology Related Business Continuity Planning (BCP) & Disaster recovery Planning (DRP) & Continuity of Operations Planning (COOP) Physical Security Integration 11

CISSP Information Systems Security Engineering Professional (ISSEP )CBK Domains Systems Security Engineering Certification & Accreditation Technical Management U.S. Government Information Assurance (IA) Regulations 12

CISSP Information Systems Security Management Professional (ISSMP )CBK Domains Enterprise Security Management Practices Enterprise-Wide Systems Development Security Overseeing Compliance of Operations Security Understand Business Continuity Planning (BCP) & Disaster recovery Planning (DRP) & Continuity of Operations Planning (COOP) Law, Investigations, Forensics and Ethics 13

Certification and Accreditation Professional (CAP CM ) Meant for professionals who: Formalize processes used to assess risk and established security requirements Ensure information systems possess security commensurate with the level of exposure to potential risk Possess at least 2 cumulative years of relevant certification and accreditation work experience as evidenced by the responsibilities included in the previous and current positions held within their organization(s) Subscribe to the (ISC)² Code of Ethics Pass the CAP certification examination based on the requirements of knowledge, skills and abilities identified Earn 65 hours of CPE credits every 3 years 14

CAP CBK Domains Understanding the Purpose of Certification Initiation of the System Authorization Process Certification Phase Accreditation Phase Continuous Monitoring Phase 15

Systems Security Certified Practitioner (SSCP ) Meant for professionals who: Are systems and network security administration professionals Possess a minimum 1 year cumulative professional experience in (ISC)² SSCP CBK domains Subscribe to (ISC)² Code of Ethics Earn 60 hours of CPE credits every 3 years 16

SSCP CBK Domains Access Control Administration Audit and Monitoring Risk, Response and Recovery Cryptography Data Communications Malicious Code/Malware 17

Associate of (ISC)² Program to Provide early support for information security careers Set new entrants on the right path early in their careers Encourage early commitment to the profession Accelerate the growth of professionals worldwide Designed for candidates who Pass the CISSP or SSCP examination Lack professional experience required for certification Are willing to subscribe to the (ISC)² Code of Ethics Indicates a candidate Possesses an independent and objective measure of competence via understanding of the (ISC)² CBK Aspires to adhere to the rigors and ethics of the profession through association with (ISC)² Is required to complete the necessary professional experience and the subsequent endorsement process within 5 years Provides access to suite of (ISC)² career support programs Official (ISC)² communications (bi-monthly newsletter) Peer networking 18

Educational Offerings Voted Best Professional Training Program by SC Magazine in 2006 & 2007 Providers of only (ISC)²-authorized CBK Review Seminars for CISSP, SSCP and CAP through the (ISC)² Institute and dozens of authorized academic affiliates around the world elearning and instructor-led course options (ISC)² Academic Program Education affiliates Continuing education for (ISC)² certified members (ISC)² Security Leadership Series (ISC)² members discounts to conferences held by IPEvents, RSA, MISTI, CSI and many other globally renowned providers 19

Supporting the Professional Annual (ISC)² Information Security Scholarship Program US$100,000 Research Annual (ISC)² Global Information Security Workforce Study Management and communication practices (with Auburn University) Free materials (ISC)² Resource Guide for Today s Information Security Professional (ISC)² Career Guide: Decoding the Information Security Profession 20

(ISC)² Global Membership 48,818 (ISC)² Members Worldwide*: CISSP 47,945 ISSAP 755 ISSEP 302 ISSMP 656 CAP 287 SSCP 586 Associate of (ISC)² 610 *As of 2/28/07 21

(ISC)² Honor Roll 1000+ United States Canada United Kingdom Hong Kong Korea, South 500+ Singapore Australia India Japan 200+ Netherlands China Germany Switzerland France South Africa 100+ Saudi Arabia United Arab Emirates Ireland Taiwan Finland Sweden Belgium Brazil Mexico Italy Denmark Spain Malaysia Israel New Zealand 22

Members in Asia-Pacific As of: 14/Feb/07 China (378) Macao (3) Korea, South (1,727) Thailand (75) Japan (720) Indonesia (27) Hong Kong (1,315) Singapore (891) Philippines (59) India (796) Taiwan (209) Sri Lanka (16) Malaysia (151) 23

People Are the Key For more information about us, please visit www.isc2.org