1 / 14

Joining the Cybersecurity Revolution : What it means, where the jobs are, how you can join

Joining the Cybersecurity Revolution : What it means, where the jobs are, how you can join. Agenda. What is Cybersecurity? Sources of threats and attacks What are the impacts? Where do you come in? Types of jobs How do you get in? Prerequisites Challenges.

babu
Télécharger la présentation

Joining the Cybersecurity Revolution : What it means, where the jobs are, how you can join

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Joining the Cybersecurity Revolution: What it means, where the jobs are, how you can join

  2. Agenda What is Cybersecurity? Sources of threats and attacks What are the impacts? Where do you come in? Types of jobs How do you get in? Prerequisites Challenges

  3. What is Cybersecurity? • aka Information security, IT security, information assurance • encompasses computer security, network security, internet security, application security, disaster recovery, business continuity • BOTTOM LINE: Its the protection of data and systems from cyber threats and attacks.

  4. Sources of threats and attacks? • Hackers (script kiddies, professionals) • Hacktivists • Insiders • Criminals • Foreign countries (cyber terrorism, cyber espionage, cyber warfare)

  5. What are the Impacts? • Financial loss • Intellectual property theft • Brand/reputation compromise • Fraud • Legal exposure/lawsuit • Loss of shareholder value • Extortion • Loss of control to critical infrastructure systems that operate chemical, electricity, and water plants. (derail trains, shut down power grids)

  6. Where do you come in? There is high demand for Cybersecurity pros "The need for cyber professionals across all industries is likely to continue to surge in the near future, hiring professionals say..." -Washington Post "They need cybersecurity expertise on the architectural level and the programming level. They're going to certainly encounter new threats as they open up their network to a whole new function." -Networkworld "The federal government says a potential cyberattack is the most serious economic and national security threat the United States faces, but it faces a shortage of skilled experts who could head off that threat, Homeland Security Secretary Janet Napolitano warns.“ -CNN "We don't have enough security professionals and that's a big issue." –Reuters "The scarcity is reflected throughout the education system, from primary schools to universities. There are fewer graduates in STEM areas, and women are particularly underrepresented – a big problem for a field that already lacks diversity." –FCW

  7. Types of Jobs Government/Gov't Contractor/Private

  8. How to get in? • Current job - cross train • Intern • Cyber competitions • College w/ job placement • Law enforcement • Job fairs • Company websites • Join security groups • Find a mentor • Network • Immerse yourself

  9. Prerequisites • IT background • Work your way up (helpdesk, sys admin, network admin, developer) • Education • Degree in Computer Science, Cybersecurity, Forensics, IT • Training - Hands-on, not just theory. Linux • Certs - A+, Security+, Microsoft, Cisco, CEH... • Patience, persistence, self-motivation

  10. Challenges • Security has many areas • Lack of experience • Getting a job - catch 22 - no experience • Male-dominated field - bias, attitudes • Discriminatory practices with salaries and promotion • Security clearance process long & complex • There isn't a pipeline in place

  11. Resources Get Training/Experience • Self-study (books, blogs/sites, videos/webcasts) • Build a lab - live distros, virtual machines • Intern Security groups • ISSA • Meetup.com • Linkedin • InfraGard Internships • http://www.todaysengineer.org/2011/Aug/career-focus.asp • http://www.nsa.gov/careers/opportunities_4_u/students/index.shtml • https://www.fbijobs.gov/23.asp • http://www.dhs.gov/cybersecurity-recruitment-and-development-programs

  12. Resources cont'd Company websites • Google top 100 govt contractors, Fortune 500 co's • Those that must comply with regulations (financial, utilities, retail, healthcare, • USAJOBS.gov, dice.com, indeed.com, careerbuilder, monster Cyber competitions • U.S. Cyber Challenge (USCC) Colleges w/ job placement • NSA-COE • Scholarship for Service Program • Rochester Institute of Technology Vocational Schools

  13. Resources cont'd Mentorship • Current company, Women's Society of Cyberjutsu Conferences • Defcon, Blackhat, Sharkfest, many more Free online courses • Coursehero • INE -CCNA Associate Video Course Videos • Securitytube.net, youtube, webcasts More info on getting into Cybersecurity: http://krebsonsecurity.com/2012/06/how-to-break-into-security-ptacek-edition/ http://pentest.cryptocity.net/careers

  14. Thank you Women's Society of Cyberjutsu www.womenscyberjutsu.com info@womenscyberjutsu.com 703-828-4507

More Related