© Copyright 2009 (ISC)², Inc. All Rights Reserved. Confidential Information Security: Still A Growth Career Marc H. Noble, CISSP-ISSAP, CISM Director of.

Slides:



Advertisements
Similar presentations
. . . a step-by-step guide to world-class internal auditing
Advertisements

THE LUBRECHT REPORT: A MID-WAY ASSESSMENT OF THE 10 -YEAR WILDERNESS STEWARDSHIP CHALLENGE Developed By: The Wilderness Advisory Group April 2010.
1 WeCAN Works Presentation Monday, December 14, 2009.
© 2014 Burning Glass Technologies Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time Jobs Intelligence Matching.
Connecticut Society of Certified Public Accountants Student Outreach Become a CPA – and discover a lifetime of opportunity!
Security and Personnel
SMART Scholarship Program ASEE SMART Scholarship Program Team.
Manage and Safeguard Your BC Career Cheyene Haase BC Management, Inc.
Shared Governance Balancing Authority, Leadership and Management.
Manage Your BC Career Cheyene Haase BC Management, Inc. Elevating Your BC Career & Assessing Your Worth.
Preparing for Careers in Business-IT: CIS Major and IT Minor CIS Presents Prof. Jennifer Xu November 6, 2007.
College of Business and Economics California State University Northridge.
Human Resource Management
Make a Difference! Discover a Career in Healthcare Management!
Click to edit Master title style What are you worth? Vince Hines, Managing Director.
Careers in IT Farrokh Alemi, Ph.D.. Course on Project Management Credit.
Make a Difference! Discover a Career in Healthcare Management!
0 Career Opportunities in Public Accounting. Introduction to Deloitte & Touche 1 Deloitte Touche Tohmatsu u Over 100,000 people worldwide u Over 30,000.
The Business of Empowering Women November 18, 2009 Presentation at the World Bank’s GAP Event Working Women: Better Outcomes for Growth CONFIDENTIAL AND.
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
Preparing the New Generation of Security Professionals Marc Noble, Director Government Relations, (ISC)², Former Chief Information Security Officer, FCC.
JOBTALKS Careers Options in Finance and Accounting Indiana University Kelley School of Business C. Randall Powell, Ph.D Contents used in this presentation.
(ISC) Global Workforce Study U.S. Government Results May 7, 2013.
STRICTLY PRIVATE & CONFIDENTIAL Careers in the Banking Industry Vanda Hudak RBC Recruitment & Learning.
Los Angeles / Orange County Regional Consortium Public Sector Workforce Challenges & Opportunities July 18, 2007.
Federal Cyber Service Training and Education Initiative CICG Personnel, Training and Education Subgroup Mark Montgomery National Security Council November.
Cybersecurity nexus (CSX)
Careers Matthew Ganey, Indiana University General Mills Company of Champions.
Computer Information Systems. Overview  What is Information Systems (IS)?  Computer Information Systems (CIS) Major  Careers in CIS/IT.
SACRED HEART COLLEGE College of Business Administration, Accountancy, and Computer Science AY
The of a Successful Workforce Readiness Program. Creating Communities that Work. Advancing the profession of Human Resource Management. Building a strategic.
Mature Business Continuity Programs What do they have that others struggle with….? February 19, 2014 Cheyene Marling, Hon. MBCI.
From Where Will The Next Generation of CISOs Come? FISSEA March 22, :00 pm Moderator: Jane Scott Norris, CISSP, CISM Chief Information Security Officer,
NON-PROFIT AND GOVERNMENT Prepared and Presented by: Mr. Coriarty Shaker High School.
Connecticut Society of Certified Public Accountants Student Outreach Become a CPA – and discover a lifetime of opportunity!
STRICTLY PRIVATE & CONFIDENTIAL Session: Putting it all together Michael Hayden RBC Recruitment & Learning March 11, 2008.
PAWS 4 Page 5.  No! Career/Technical Pathway programs offer a broad range of training for a wide variety of career pathways and many aspects of a broad.
Career Opportunities in Public Accounting The Who, What, Where, When, Why and How……
1. 2 Collaborative Partnerships It’s that evolution thing again! Adult education has been partnering and collaborating for years.
CISSP Thomas Moore. Thomas Moore, Ph.D., EMBA BCSA BCSP LCNAD CISM CISSP LMNOP (Licensed Microsoft Network Operations Professional) B.S. No, really, in.
Preparing Students for Today’s IT Employment Market Ted Mullin Metro Market Manager.
Information Security: A Growth Career Lynn McNulty, CISSP Director of Government Affairs (ISC) 2 September 27, 2007.
Comprehensive Educator Effectiveness: New Guidance and Models Presentation for the Virginia Association of School Superintendents Annual Conference Patty.
© Copyright 2009 (ISC)², Inc. All Rights Reserved. Confidential Information Security: Still A Growth Career Lynn McNulty, CISSP Director of Government.
Make a Difference! Discover a Career in Healthcare Management!
Strohl Systems International User Group Conference — April 9-12, 2006 — Orlando, Florida USA Assess Your BC Career Today ~ to Ensure Your Marketability.
The Connecticut Society of Certified Public Accountants advocacy community education Connecticut Society of Certified Public Accountants Student Outreach.
Benchmarking the BC Profession Presented by: Cheyene Haase of BC Management, Inc. Evaluating the Budgets, Reporting Structure, Personnel & Compensation.
OUR MOVEMENT: UNDERSTANDING THE BIG PICTURE. 2 OVERVIEW Theory of Change Programmatic Approach.
Chapter Dental Public Health & Research Contemporary Practice for the Dental Hygienist Copyright ©2011 by Pearson Education, Inc. All rights reserved.
Information Systems in Organizations 1.1 The Modern Organization is a system and set of processes.
Financial Managers Gio Perazo. Job Description The duties of financial managers vary with their specific titles, which include controller controller treasurer.
Enterprise Service Management (ESM) An Approach for Adopting and Adapting Best Practice Programs to Manage, Secure and Improve an Organizations Information.
Arizona Department of Education in partnership with Arizona State University Using Technical Skill Attainment Data.
Quality Assurance Review Team Oral Exit Report School Accreditation Center Grove High School 10 November 2010.
CHAPTER 2 Personal Selling Opportunities in the Age of Information.
Oklahoma ABLE Tech Oklahoma IT Accessibility Initiatives.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Workforce Recruitment Program A pipeline of talent FEDs New Perspective Conference Washington, DC April 29, 2015.
Welcome to Workforce 3 One U.S. Department of Labor Employment and Training Administration Webinar Date: March 18, 2014 Presented by: National Office of.
11 Green Workforce Development Lessons Learned November 30, 2010.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
2 Overview With active participation from individuals and chapters all over the world, the Information Systems Security Association (ISSA)
A Nepris Presentation April 24, 2017
Mission Davenport University prepares and transforms students to achieve the highest levels of academic performance, leading them to excel and advance.
Career Opportunities in Public Accounting
Careers in IT.
IT Technician Pathway - Cybersecurity
Career Opportunities in Public Accounting
Career Opportunities in Public Accounting
Presentation transcript:

© Copyright 2009 (ISC)², Inc. All Rights Reserved. Confidential Information Security: Still A Growth Career Marc H. Noble, CISSP-ISSAP, CISM Director of Government Affairs (ISC) 2 November, 2010

2 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Outline Discuss the evolution of IS/IA as a distinct career field Review current status of IS/IA professionals in public and private Sectors The (ISC) 2 Global Information Security Workforce Study—2008 and CISO Survey Reports Examine current educational and professional certification opportunities Discuss current government programs

3 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Growth of IS/IA as a Career Field First dedicated IS/IA officers began to appear in the early 1970s. National security community was leader Civil agencies and private sector followed Organizational placement/career advancement/recognition issues Higher education recognizes need for dedicated IS/IA programs

4 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Growth—Cont. Slow growth in profession during 80s and 90s Real surge began with the advent of internet as the basis for E-gov/E-commerce Security problems create need for dedicated and qualified IT/IA security workforce Need for qualified workforce stimulates the higher education community Development of professional certifications for IT/IA security DOD IT/IA workforce improvement program

5 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential The (ISC) 2 Global Information Security Workforce Study Respondents had:  Responsibility for acquiring or managing their organizations’ information security  Involvement in decision-making process regarding use of security technology and services and/or hiring of internal security staff  Employment in the information security profession Study objectives:  Gain detailed insight into important trends and opportunities within the information security profession  Provide you with information you can use to further your career, such as a clear understanding of pay scales, skills gaps, training requirements, corporate hiring practices, security budgets, career progression and corporate attitude toward information security

6 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Highlights from 2008 Global Information Security Workforce Study Conducted by Frost & Sullivan; sponsored by (ISC) million IS/IA professionals worldwide Number will grow to 2.7 million by 2012 In North America the numbers are 749,470 going to 1,100,072 by 2012 Information technology, financial services, government, & professional services are largest employers

7 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Highlights (North Amer) —Cont. Level of Education—9% High School; 54% Bachelors; 31% Masters; 2% PhD Years of Experience—45% 5 to 9 Years Compensation—50% of respondents made $90K or more after five years of experience

8 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Government CISO Survey Conducted by (ISC)2 CISO and Senior level information security Trend in two years –  Einstein, Web 2.0, policies in place, collaboration  Enjoy position

9 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Government CISO Survey Staffing plans for hires  Contractor conversions (30.2 percent)  Internally (29.8 percent)  Private Sector (29 percent)  Other agencies (21.3 percent)  Scholarship for Service Program (20 percent)

10 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential IS/IA Security Has Many Facets Chief Information Security Officers Technical Specialists Policy Wonks Training Specialists Intrusion Monitoring Specialists Forensic Specialists Evangelists System/Network Security Administrators

11 click to edit Master title style Career Levev Career Levels and Traditional Paths Senior Executive CIO; CISO; CTO; CRO; COOls and Traditional Paths Senior Executive CIO; CISO; CTO; CRO; COO EXPERT Principal Consultant; Senior/Chief Architect; Senior Security Auditor; Etc. Specialist (Technical/Business) Security Consultant; Security Designer/Architect; Security Auditor; Information Risk Consultant; Security Product Manager; Business Analyst MANAGER/DIRECTOR Consulting Manager/Director; Information Security Manager/Director; Head of Security Audit; Information Risk Manager/Director; Operations Manager/Director Specialist (Management) Project Manager; Program Manager; Team Leader; Account Manager; Sales Manager; Marketing Manager Years of experience & ability ENTRANT Security Analyst; Security Developer; Security Administrator; Trainee Information Risk Consultant; Security Product Sales; Etc. Adapted fromAINSER ISPRFramework

12 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential What is Happening in the Educational Environment? Significant Growth of IS/IA Classes and Programs at Universities and Colleges NSA/DHS Academic Centers of Excellence Program Scholarship for Service Programs Interesting Developments at the Community College Level Need for Continuing Education

13 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Rockefeller/Snowe Bill incorporated into Lieberman/Collins/Carper Bill Introduced in April 2009—builds on existing program Section 12 focuses on Federal Cyber Scholarship-for-Service Program Scholarships for up to 1000 students/ year Provides for summer and part-time employment for K-12 students Authorizes $50M in FY-1010 going to $70M by FY 2014

14 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Role of Professional Certifications Growth in IA/IT Profession has been accompanied by growth of professional certifications ISO adds value to certifications Department of defense professional certification program State department program Growing reliance on certification as an employment criteria

15 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential The Future of the IS/IA Career Field IS/IA career field has bright future --Continued growth in integration of technology into all facets of life --IT security concerns will not be solved in our lifetime Career field is both wide and deep—plenty of opportunity for many participants

16 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Advice to Interested Students Don’t get involved in hacking Keep a clean record—many IA/IS positions with government or government contractors require a security clearance Opportunities to work in career field --Internships --Volunteer Positions

17 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Advice—Cont. Develop soft skills—IS/IA is not just about the technology. --Ability to write clearly and speak effectively is very important Understand the business impact of IT security

18 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential (ISC) 2 Publications of Interest (ISC)² Resource Guide for Today’s Information Security Professional  (ISC)² Hiring Guide to the Information Security Profession  (ISC)² Career Guide: Decoding the Information Security Profession  2008 Workforce Studies (Builds on previous reports)

19 © Copyright 2009 (ISC)², Inc. All Rights Reserved. confidential Questions Contact Information: Marc Noble Director of Government Affairs (ISC)