Information Services Security Management

Slides:



Advertisements
Similar presentations
CISSP Seeks CIPP Object: Mutual Compliance Marriage of Privacy and Security Professionals Under HIPAA David B. Nelson, CISSP Yolo County Woodland, California.
Advertisements

Philippine Cybercrime Efforts
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Security and Personnel
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
OU INFORMATION SECURITY & RISK MANAGEMENT ISA – February 4, 2015.
The College of Information Sciences and Technology ist.psu.edu.
What is CISSP Anyway? A Presentation by: George L. McMullin II, CISSP COO, CorpNet Security, Inc. Executive Director, NEbraskaCERT.
Certification and Training Presented by Sam Jeyandran.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Careers in IT: The Real Story Rich James, F5 Networks Director, Staffing.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Cyber Security & Fraud – The impact on small businesses.
The IT Professional Outlook: Where Will We Go From Here? Chart Your Course: Sourcing the Global Workforce Diane Morello VP Research Gartner Inc. May 24,
CISSP Best Practices Guide to the Basics of Certified Information Systems Security Professional 1 The Certified Information System Security Professional.
BUSINESS WITH CONFIDENCEicaew.com © ICAEW 2015 IT and Accountants: A Partnership Made in Heaven? Kirstin Gillon, ICAEW IT Faculty Introduction by Christiana.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
MIS323 – Business Telecommunications Chapter 10 Security.
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
2 Overview With active participation from individuals and chapters all over the world, the Information Systems Security Association (ISSA)
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Sierra Pacific Community College District 7300 College Avenue Sacramento, CA
Today’s managers & leaders are challenged unlike any of the past generations in their roles.
MS in IT Auditing, Cyber Security, and Risk Assessment
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Information Security Program
MGMT 452 Corporate Social Responsibility
Segmap Solutions Mapping segments.
Cybersecurity - What’s Next? June 2017
MGT301 Principles of Marketing
OHIMA 2010.
Information Technology Sector
Stephanie Montgomery, Vice President, Technology and Standards
ICT Security Expert, DC Cloud Practice Leader HUAWEI
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
CISSP TRAINING IN.
Securing Information Systems
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
Cybersecurity Awareness and Education
Agenda Workforce Development Coaching Mentoring
National Cyber Security
Security Essentials for Small Businesses
Presentation for information days Units involved:
Cyber Security professions Overview
David Zane: Rehabilitation Specialist
Cyber Security Culture
Students The number in the lower left corner of each slide is the page number in the O’Brien textbook to which the material refers. The slides in this.
Security week 1 Introductions Class website Syllabus review
Cloud Computing LegalRun Solutions Why It’s Right for You!
Stephanie Montgomery, Vice President, Technology and Standards
INFRASTRUCTURE & ACCESS 4TH JULY 2018
Life Sciences Solutions
Streamline your move to the cloud
Presentation transcript:

Information Services Security Management James ‘Mason’ Costa “I am an IT Management Professional passionate about protecting companies and individuals against what I call ‘cyber-trauma’.”

General Requirements MY SKILLS TOOLBOX “Big Picture” Strategic Planning Project Management Leadership & Team Building Communication, Collaboration, Presentation, Negotiation Analysis & Problem-Solving Deductive & Inductive Reasoning

Career Outlook Web Security: 11.2% Projected Growth in 5 Years More Internet Users = More Security Risk More Data & Devices = More Security Risk More External Threats (cyber-attacks, hacktivists) More Internal Threats (careless breaches, deliberate breaches) More Compliance Requirements (COBIT, PCI DSS, SOX, CPNI, HIPAA, …) (Kessler, 2012) (Lainhart, 2011)

Security Intelligence Should be a C-Suite Priority Not just a CIO/CISO concern impacts: CEO, CFO, COO, CHRO, CMO A Comprehensive Approach The need to mitigate risk in 4 key areas People/Access Security Data Security Applications Security Infrastructure Security (Lainhart, 2011)

Career Competencies The Magnificent 7 Leading people and teams Developing sustainable solutions Serving customers Managing products and services Managing technology and innovation Assessing the competitive environment Planning for the future in the global marketplace

Leading People and Teams Public speaking & presentation skills Leadership & Team Management Team Building Communication, Collaboration, Presentation, Negotiation Ethics

Developing Sustainable Solutions Project Management Cost, Benefit, and Risk Analysis Analysis & Problem-Solving Deductive & Inductive Reasoning Eye On the Future

Serving Customers Executive-level persuasion & negotiation Strong security policies, corporate-wide user training Promote security awareness and compliance Recognition programs for “Safe Computing” Improved self-service features & web-based tools Ethics

Managing Products and Services Continually enhance current products/services for Business Harmonize IT processes with Business Processes Analysis & Problem-Solving Deductive & Inductive Reasoning Promote security initiatives/enhancements executives Project & Team Management

Managing Technology and Innovation Focus on the Future (mobile, cloud, virtualization) Analysis & Problem-Solving Deductive & Inductive Reasoning Promote security initiatives/enhancements to executives Project & Team Management

Assessing the Competitive Environment and Planning for the Future in the Global Marketplace Focus on the Future (mobile, cloud, virtualization) Threat report reviews (SANS/CERT) ISSA (Information Systems Security Assoc) chapter association

Technical Skills CISSP “10 DOMAINS” International Information Systems Security Certification Consortium, Inc. Technical Skills CISSP “10 DOMAINS” 1. Access Control 2. Telecommunications and Network Security 3. Information Security Governance and Risk Mgt. 4. Software/Application Development Security 5. Cryptography 6. Security Architecture and Design 7. Security Operations 8. Business Continuity and Disaster Recovery Planning 9. Legal, Regulations, Investigations and Compliance 10. Physical Security (ISC2, 2013)

Contact Info James 'Mason' Costa MBA / Information Technology Management BS / Electrical Engineering Technology PMI-PMP / Project Management Professional - Mobile: 864-243-1160 - Email: masoncosta@gmail.com - LinkedIn: www.linkedin.com/in/masoncosta - Resume / Credentials / Portfolio: www.visualcv.com/masoncosta

References ISC2 (2013). CISSP Domains. Certification Programs: CISSP. Retrieved from https://www.isc2.org/cissp-domains/default.aspx Kessler, S. (2012). Computers: Consumer Services & the Internet. Standard & Poor's Industry Surveys. Retrieved from http://www.netadvantage.standardandpoors.com/NASApp/NetAdvantage/showIndustrySurvey.do?task=showIndustrySurvey&code=csi Lainhart, J., Robinson, S., & Van Zadelhoff, M. (2011). Managing threats in the digital age. Retrieved from http://www-935.ibm.com/services/us/gbs/thoughtleadership/ibv-security-managing-threats.html