/
Joining Joining

Joining - PowerPoint Presentation

pasty-toler
pasty-toler . @pasty-toler
Follow
393 views
Uploaded On 2016-05-18

Joining - PPT Presentation

the Cybersecurity Revolution What it means where the jobs are how you can join Agenda What is Cybersecurity Sources of threats and attacks What are the impacts Where do you come in ID: 324745

cyber security gov cybersecurity security cyber cybersecurity gov http job professionals threats www network loss experience company jobs resources assurance women attacks

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Joining" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Joining

the Cybersecurity Revolution

: What it means, where the jobs are, how you can joinSlide2

Agenda

What is Cybersecurity?

Sources of threats and attacks

What are the impacts?

Where do you come in?

Types of jobs

How do you get in?

Prerequisites

ChallengesSlide3

What is Cybersecurity?

aka Information security, IT security, information assurance

encompasses computer security, network security, internet security, application security, disaster recovery, business continuity

BOTTOM LINE: Its the protection of data and systems from cyber threats and attacks.Slide4

Sources of threats and attacks?

Hackers (script kiddies, professionals)

Hacktivists

Insiders

Criminals

Foreign countries (cyber terrorism, cyber espionage, cyber warfare)Slide5

What are the Impacts?

Financial loss

Intellectual property theft

Brand/reputation compromise

Fraud

Legal exposure/lawsuit

Loss of shareholder value

Extortion

Loss of control to critical infrastructure systems that operate chemical, electricity, and water plants. (derail trains, shut down power grids)Slide6

Where do you come in?

"The need for cyber professionals across all industries is likely to continue to surge in the near future, hiring professionals say..."

-Washington Post

"They need cybersecurity expertise on the architectural level and the programming level. They're going to certainly encounter new threats as they open up their network to a whole new function."

-Networkworld

"

The federal government says a potential cyberattack is the most serious economic and national security threat the United States faces, but it faces a shortage of skilled experts who could head off that threat, Homeland Security Secretary Janet Napolitano warns

.“ -

CNN

"

We don't have enough security professionals and that's a big issue." –Reuters"The scarcity is reflected throughout the education system, from primary schools to universities. There are fewer graduates in STEM areas, and women are particularly underrepresented – a big problem for a field that already lacks diversity." –FCW

There is high demand for Cybersecurity prosSlide7

Types of Jobs

Application security tester

Security analyst

Penetration tester

Information assurance engineer

Information assurance analyst

Reverse engineer

Malware analyst

Forensics

Incident response

Vulnerability analyst

Vulnerability researcher

Mobile code tester

Program managerLegalDeveloperPolicy & procedure writerSecurity architectCode reviewerNetwork security engineerTechnical writer

Government/Gov't Contractor/PrivateSlide8

How to get in?

Current job - cross train

Intern

Cyber competitions

College w/ job placement

Law enforcement

Job fairs

Company websites

Join security groups

Find a mentor

Network

Immerse yourselfSlide9

Prerequisites

IT background

Work your way up (helpdesk, sys admin, network admin, developer)

Education

Degree in Computer Science, Cybersecurity, Forensics, IT

Training - Hands-on, not just theory. Linux

Certs - A+, Security+, Microsoft, Cisco, CEH...

Patience, persistence, self-motivationSlide10

Challenges

Security has many areas

Lack of experience

Getting a job - catch 22 - no experience

Male-dominated field - bias, attitudes

Discriminatory practices with salaries and promotion

Security clearance process long & complex

There isn't a pipeline in placeSlide11

Resources

Get Training/Experience

Self-study (books, blogs/sites, videos/webcasts)

Build a lab - live distros, virtual machines

Intern

Security groups

ISSA

Meetup.com

Linkedin

InfraGardInternships

http://www.todaysengineer.org/2011/Aug/career-focus.asp

http://www.nsa.gov/careers/opportunities_4_u/students/index.shtml

https://www.fbijobs.gov/23.asphttp://www.dhs.gov/cybersecurity-recruitment-and-development-programsSlide12

Resources cont'd

Company websites

Google top 100 govt contractors, Fortune 500 co's

Those that must comply with regulations (

financial,

utilities, retail, healthcare,

USAJOBS.gov, dice.com, indeed.com, careerbuilder, monster

Cyber competitions

U.S. Cyber Challenge (USCC)

Colleges w/ job placement

NSA-COE

Scholarship for Service Program

Rochester Institute of Technology

Vocational SchoolsSlide13

Resources cont'd

Mentorship

Current company, Women's Society of Cyberjutsu

Conferences

Defcon, Blackhat, Sharkfest, many more

Free online courses

C

oursehero

INE -CCNA Associate Video Course

Videos

Securitytube.net, youtube, webcastsMore info on getting into Cybersecurity:http://krebsonsecurity.com/2012/06/how-to-break-into-security-ptacek-edition/http://pentest.cryptocity.net/careersSlide14

Thank you

Women's Society of Cyberjutsu

www.womenscyberjutsu.com

info@womenscyberjutsu.com

703-828-4507