Security Training and Certification A look at why security should become a part of your DNA

Slides:



Advertisements
Similar presentations
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Advertisements

Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
McGraw-Hill/Irwin The I-Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Windows XP Security Chapter 9 - Objectives.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Avtec Inc Virtualization - Securely Moving to the Cloud.
Riding the Cloud Storm – Responding to Cloud Risks David Rawle Technical Director.
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
Unified Communications Survey Summary Results
Security and resilience for Smart Hospitals Key findings
SAM Baseline Review Engagement
Technology and Business Continuity
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
How-To Build Transformational Organization-Wide Marketing
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
IoT Security Part 1, The Data
Cyber Security – An Existential Threat? (IIC, Singapore)
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Careers in Cyber Security
Cisco 2017 Security Annual Report
IT Security Goes Organic
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Sponsored by EMC Embargo until December 11, 2012 at 8:00am
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Challenges facing Enterprise Mobility
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Digital Disruption An ISP take on trends and possibilities
National Mining University
Cyber Security Challenges & Opportunities.
Managing Information Technology
Infrastructure, Data Center & Managed Services
Today’s Risk. Today’s Solutions. Cyber security and
Smart Office Market
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Industrial Control Systems Security Market to reach $7bn by 2024: Global.
CompTIA CAS-003 Exam Study Material - CompTIA CAS-003 Exam Dumps Realexamdumps.com
CIS 333 RANK Education for Service-- cis333rank.com.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
Internet of Things Forecast
Challenges and Opportunities
Company Overview & Strategy
Cyber Security in the Mortgage Industry
Threat Landscape for Data Security
Information Technology
Internet of Things Vulnerabilities
Strong Security for Your Weak Link:
Navigating Security Seas in a Small Ship with a Limited Crew
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Securing the Threats of Tomorrow, Today.
Beekeeper: Path to Growth
Cyber Security Culture
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
How to address security, cost, IT and migration concerns
The Case for Change 1.9 million shortage of software engineers
Tom Murphy Chief Information Security Officer
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Threat Landscape Update
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Enterprise Networking Market Size to Exceed $90 bn by 2025 Growing at CAGR.
Presentation transcript:

Security Training and Certification A look at why security should become a part of your DNA

A little about me Jedi Hammond Certification Strategy Lead Dell EMC Proven Professional Program Over 20 years in IT Some Career Roles Include: IT management, IT administration, product development, technical and professional skills training, and certification program management.

Disrupters Sources: The Human Side of IT Security | Dell Inc.

Changing Security Landscape Cloud / Mobile Cloud applications up 43% since 2015 trillion IoT IHS forecasts 75.4 billion IoT devices by 2025 billion Ransomware million Ransomware grew by 167x year‐over‐year (638 million in 2016) https://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016/#3dc97342292d IHS forecasts that the IoT market will grow from an installed base of 15.4 billion devices in 2015 to 30.7 billion devices in 2020 and 75.4 billion in 2025. IoT platforms: enabling the Internet of Things, March 2016 2017 SonicWall Annual Threat Report Cloud applications up 43% since 2015 Ransomware use grew by 167x year‐over‐year (638 million in 2016) Internet of Things devices were compromised on a  massive scale due to poorly designed security features,  opening the door for distributed denial‐of‐service attacks.  DDoS attacks in general are estimated to cost businesses an average of $22,000 per minute  Build a “human firewall” by teaching your employees, especially those  dealing with payments, how to deal with potential threats, such as  malicious emails and suspicious pop‐ups. Tell your users never to  accept a self‐signed, non‐valid certificate.   Isolate the corporate network environment into LAN, WLAN and VLAN  zones and implement multifactor authentication for cross‐visiting.  Isolate critical systems, Internet of Things (IoT) devices and POS  systems as well.  Sources: 2017 SonicWall Annual Threat Report IoT platforms: enabling the Internet of Things, March 2016

Where are the Transformation Opportunities? “Among the most common causes of data loss and security breaches are the vulnerabilities of an organization’s employees.” - Doug Steelman, Chief Information Security Officer, Dell SecureWorks Cognizant Collaboration Culture Landscape Disrupters Knowledge Communication Process Responsibility As new product training is created a key portion of that is how you secure. Risks are new, and the attack surface is greater. We live in a world of mobile workers, Cloud applications and IoT the traditional mindset doesn’t work by itself anymore. It not just a matter of doing “security training” or having a security person but embed in everything. Security isn’t just for the security Guy Security can impact functionality if people have lack of knowledge on use, or implementation hamper productivity and employees looks for ways around it causing a bigger issue. http://www.iftf.org/future-now/article-detail/realizing-2030-dell-technologies-research-explores-the-next-era-of-human-machine-partnerships/ Images from: Gallerygogopix.net Thenounproject.com Commons.Wikipedia.com

Education is the solution Vulnerabilities Data Endpoint Infrastructure Solution Security focused education Embed security as part of the “norm” in all training. Validate experience though certification. Forward-thinking organizations invest in more than just technology to shore up their IT defenses. They work to educate, train, and cultivate a ‘culture of security’ among employees. - The Human Side of IT Security | Dell Inc., End-user education - Security Focused education Embed security as part of the “norm” in technology training. Implementation Administration Operations Validate experience and knowledge though certification.

Final Take away One of the greatest vulnerabilities in today’s security are people with a knowledge gap. The solution is fully educated people.