the Cybersecurity Revolution What it means where the jobs are how you can join Agenda What is Cybersecurity Sources of threats and attacks What are the impacts Where do you come in ID: 324745
Download Presentation The PPT/PDF document "Joining" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Joining
the Cybersecurity Revolution
: What it means, where the jobs are, how you can joinSlide2
Agenda
What is Cybersecurity?
Sources of threats and attacks
What are the impacts?
Where do you come in?
Types of jobs
How do you get in?
Prerequisites
ChallengesSlide3
What is Cybersecurity?
aka Information security, IT security, information assurance
encompasses computer security, network security, internet security, application security, disaster recovery, business continuity
BOTTOM LINE: Its the protection of data and systems from cyber threats and attacks.Slide4
Sources of threats and attacks?
Hackers (script kiddies, professionals)
Hacktivists
Insiders
Criminals
Foreign countries (cyber terrorism, cyber espionage, cyber warfare)Slide5
What are the Impacts?
Financial loss
Intellectual property theft
Brand/reputation compromise
Fraud
Legal exposure/lawsuit
Loss of shareholder value
Extortion
Loss of control to critical infrastructure systems that operate chemical, electricity, and water plants. (derail trains, shut down power grids)Slide6
Where do you come in?
"The need for cyber professionals across all industries is likely to continue to surge in the near future, hiring professionals say..."
-Washington Post
"They need cybersecurity expertise on the architectural level and the programming level. They're going to certainly encounter new threats as they open up their network to a whole new function."
-Networkworld
"
The federal government says a potential cyberattack is the most serious economic and national security threat the United States faces, but it faces a shortage of skilled experts who could head off that threat, Homeland Security Secretary Janet Napolitano warns
.“ -
CNN
"
We don't have enough security professionals and that's a big issue." –Reuters"The scarcity is reflected throughout the education system, from primary schools to universities. There are fewer graduates in STEM areas, and women are particularly underrepresented – a big problem for a field that already lacks diversity." –FCW
There is high demand for Cybersecurity prosSlide7
Types of Jobs
Application security tester
Security analyst
Penetration tester
Information assurance engineer
Information assurance analyst
Reverse engineer
Malware analyst
Forensics
Incident response
Vulnerability analyst
Vulnerability researcher
Mobile code tester
Program managerLegalDeveloperPolicy & procedure writerSecurity architectCode reviewerNetwork security engineerTechnical writer
Government/Gov't Contractor/PrivateSlide8
How to get in?
Current job - cross train
Intern
Cyber competitions
College w/ job placement
Law enforcement
Job fairs
Company websites
Join security groups
Find a mentor
Network
Immerse yourselfSlide9
Prerequisites
IT background
Work your way up (helpdesk, sys admin, network admin, developer)
Education
Degree in Computer Science, Cybersecurity, Forensics, IT
Training - Hands-on, not just theory. Linux
Certs - A+, Security+, Microsoft, Cisco, CEH...
Patience, persistence, self-motivationSlide10
Challenges
Security has many areas
Lack of experience
Getting a job - catch 22 - no experience
Male-dominated field - bias, attitudes
Discriminatory practices with salaries and promotion
Security clearance process long & complex
There isn't a pipeline in placeSlide11
Resources
Get Training/Experience
Self-study (books, blogs/sites, videos/webcasts)
Build a lab - live distros, virtual machines
Intern
Security groups
ISSA
Meetup.com
Linkedin
InfraGardInternships
http://www.todaysengineer.org/2011/Aug/career-focus.asp
http://www.nsa.gov/careers/opportunities_4_u/students/index.shtml
https://www.fbijobs.gov/23.asphttp://www.dhs.gov/cybersecurity-recruitment-and-development-programsSlide12
Resources cont'd
Company websites
Google top 100 govt contractors, Fortune 500 co's
Those that must comply with regulations (
financial,
utilities, retail, healthcare,
USAJOBS.gov, dice.com, indeed.com, careerbuilder, monster
Cyber competitions
U.S. Cyber Challenge (USCC)
Colleges w/ job placement
NSA-COE
Scholarship for Service Program
Rochester Institute of Technology
Vocational SchoolsSlide13
Resources cont'd
Mentorship
Current company, Women's Society of Cyberjutsu
Conferences
Defcon, Blackhat, Sharkfest, many more
Free online courses
C
oursehero
INE -CCNA Associate Video Course
Videos
Securitytube.net, youtube, webcastsMore info on getting into Cybersecurity:http://krebsonsecurity.com/2012/06/how-to-break-into-security-ptacek-edition/http://pentest.cryptocity.net/careersSlide14
Thank you
Women's Society of Cyberjutsu
www.womenscyberjutsu.com
info@womenscyberjutsu.com
703-828-4507