Jay Armstrong National Account Manager

Similar documents
GIAC Program Overview 2015 Q4 Version

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed.

DoD Directive (DoDD) 8570 & GIAC Certification

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Course Descriptions November 2014

OVERVIEW DEGREES & CERTIFICATES

Information Security Engineering

Cyber Defense Operations Graduate Certificate

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Audit Tips and other Free Audit Resources Inside! h t tp://i t -audit.sans.or g

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Frequently Asked Questions

Enterprise Security Tactical Plan

Middle Class Economics: Cybersecurity Updated August 7, 2015

VetSuccess. Top employers providing America s veterans with careers in cybersecurity

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE

Reliable, Repeatable, Measurable, Affordable

How To Build A Cybersecurity Company

Nine Cyber Security Trends for 2016

Four Top Emagined Security Services

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

CYBER SECURITY TRAINING SAFE AND SECURE

Looking at the SANS 20 Critical Security Controls

GIAC Certification. Enterprise Solution

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Cyber Security Solutions Integrated. Proactive. Resilient.

Software Architecture Professional Certificate

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Forensic Certifications

CAST Center for Advanced Security Training

Office of the Chief Information Officer

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

BUILD YOUR CYBERSECURITY SKILLS WITH NRB

Information Security Specialist Training on the Basis of ISO/IEC 27002

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Cyber Security Evolved

Information Security Services

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Cyber Security Trends Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

EC-Council. Certified Ethical Hacker. Program Brochure

Overview TECHIS Carry out security testing activities

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

A Guide to Preparing for the GSM Capstone Exam

THE WORLD IS MOVING FAST, SECURITY FASTER.

National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints. Continuous. - Continuous Monitoring. - Continuous Assessment

Cybersecurity Strategic Talent Management. March, 2012

EC Council Certified Ethical Hacker V8

State of South Carolina InfoSec and Privacy Career Path Model

Understanding the NIST Cybersecurity Framework September 30, 2014

CERT/CC Overview & CSIRT Development Team Activities

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

NAVSEA Leadership Development Continuum

defense through discovery

Cyber Education triangle clarifying the fog of cyber security through targeted training

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

IBM Internet Security Systems October FISMA Compliance A Holistic Approach to FISMA and Information Security

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net

Cybersecurity Risk Information Sharing Program (CRISP): Bi-Directional Trust

Optimizing Network Vulnerability

Securing the Microsoft Cloud

CYBERSPACE SECURITY CONTINUUM

Hackers are here. Where are you?

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

A. Centrality to institutional mission statement and planning priorities:

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Course Design Document. Information Security Management. Version 2.0

Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0

SERC Security. By Jennifer Bayuk

Building Security In:

CyberSecurity Solutions. Delivering

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

SCADA Security Training

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Cyber Watch. Written by Peter Buxbaum

Lessons from Defending Cyberspace

Florida Department of Management Services Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services RFI

ESKISP Conduct security testing, under supervision

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation

Program Overview and 2015 Outlook

Cybersecurity Training

Transcription:

Jay Armstrong National Account Manager

NetWars Continuous 4 Months of online access Designed for novice to advanced 5 levels of increasing complexity Automated hint system NetWars Tournament 1 or 2 day live challenge 5 Levels of increasing complexity Competitive environment interactive scoring NetWars Cyber City ICS / SCADA enabled model city Team-based Mission-oriented

SANS Education Continuum 1. SANS Securing The Human - Awareness Training for all personnel 2. SANS CyberTalent Assess a subset of personnel for those with aptitude for Cyber Talent. 3. SANS Training hands-on, hyper-current curriculum taught by the top-guns in the industry. 4. GIAC Certifications - Validate personnel with skill-based exams. 5. SANS NetWars continuing individual and team-based Cyber Range exercises. 6. SANS Masters Degree - Educate top candidates through STI

The data and insights to improve your team's performance. Talent assessment tool that provides a method to screen for aptitude and skills Existing Staff Candidates Four Areas of focus: Cyber Defense Penetration Testing Digital Forensics Application Security Format Web-based tool 30 question assessment 60 minutes allowed for completion

SANS provides intensive, hands-on, immersion training Highest quality 50+ courses covering basic security skills to cutting edge topics Courses updated several times per year to keep current Course material includes very thorough back-up material to provide post training value The world s best practitioner-instructors Practical steps for defending systems and applications Available in conference, online, private event, and local community event venues The SANS Promise - You will be able to apply our information security training the day you get back to the office.

Validates real-world competency Focuses on hands-on concepts Is highly respected among both industry leaders and technical practitioners Offers 26 different skills based certifications aligned with critical infosec job duties Many certs are ISO/ANSI 17024 accredited Several GIAC certifications are included under the DoD Directive 8570

Live In-Person Training SANS Conferences Private Events Local Community Venues Online Training Courses OnDemand Self-Paced Online Learning vlive Live Virtual Evening Courses Event Simulcast Attend Conference Courses without travel

Teaches the essential information security skills and techniques you need to protect and secure your organization's critical information assets and business systems in a hands on bootcamp-style format. Attendees learn: To develop effective security metrics that provide a focused playbook that IT can implement, auditors can validate, and executives can understand To analyze and assess the risk to your environment in order to drive the creation of a security roadmap that focuses on the right areas of security Practical tips and tricks to focus in on high-priority security problems within your organization and on doing the right things that will lead to security solutions that work The core areas of security and how to create a security program that is anchored on PREVENT-DETECT-RESPOND. Prepares students for the GIAC GSEC Certification Exam

Analyze attack techniques in-depth and learn how to apply industry-best defenses Gain hands-on experience in finding vulnerabilities and discovering intrusions This course provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them. Explore the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence. Addresses the latest cutting-edge insidious attack vectors, the "oldie-but-goodie" attacks that are still prevalent, and everything in between. Prepares attendees for the GIAC GCIH certification exam

Learn the best ways to test your own systems before the bad guys attack. Apply industry leading pen test techniques to help prioritize defense resources Understand the tools and techniques underlying today s most damaging attacks In-depth, hands on lessons (30+ labs) Designed for: Pen testers Red teamers Vulnerability testers Technical Auditors Forensics specialists Cyber Defenders Prepares attendees for GIAC-GPEN certification

This course will teach you how to strengthen your skills to undertake a proactive approach to security. Analyze a security architecture for deficiencies Apply the principles learned in the course to design a defensible security architecture Understand the importance of a detection-dominant security architecture and Security Operations Centers (SOC) Identify the key components of Network Security Monitoring (NSM)/Continuous Diagnostics and Mitigation (CDM)/Continuous Monitoring (CM) Implement robust Network Security Monitoring/Continuous Security Monitoring Determine requisite monitoring capabilities for a SOC environment Determine capabilities required to support continuous monitoring of key Critical Security Controls Utilize tools to support implementation of Continuous Monitoring per NIST guidelines SP 800-137 Prepares students for the GIAC GMON certification exam.

Jay Armstrong National Account Manager Partnerships jarmstrong@sans.org www.sans.org (614) 543.0357