(c) 2004 Allan Berg Building the Security Workforce of Tomorrow Allan Berg University of Dallas Graduate School of Management.

Slides:



Advertisements
Similar presentations
Human Resource Management: Gaining a Competitive Advantage
Advertisements

Industry Certification Program…. for Tennessee Business Technology Instructors! Presented by: Dr. Lloyd Brooks 2006 Summer Conference - Murfreesboro.
Reasons to Become CISSP Certified Keith A. Watson, CISSP CERIAS.
IT Assurance A fantastic career choice! Presented by the PICPA’s IT Assurance Committee.
Gaining a Competitive Advantage
Dept. of Computing and Technology (CaT) School of Science and Technology B.S. in Computer Information Systems (CIS) CIP Code: Program Code: 411.
Security and Personnel
Career and Technical Education in Arizona adds so much value to the lives of its citizens and the state’s economy that every parent and student considers.
Role of Vendor Technologies in the Development of Network Professionals Mak Sharma and Sharon Cox School of Computing, Telecommunications and Networks.
So Many Possibilities Dr. Vic MaconachyChris Inglis Capitol Technology University U. S. Naval Academy CAE Community Meeting, - Columbia, Maryland Accreditations.
Educational Outcomes: The Role of Competencies and The Importance of Assessment.
Update from the UNC General Education Council [presented to the UNC Board of Governors’ Educational Planning, Programs, and Policies Committee on February.
School of Business University of Bridgeport Admissions Presentation Robert Gilmore, Ph.D. Associate Dean School of Business.
Successful Strategies for Supporting Managers in Implementation of CBET PATRICIA BIDART, SENIOR TECHNICAL ADVISOR, COLLEGES AND INSTITUTES CANADA: CEFE.
Education to Careers. Education-to-Careers in Illinois Also known as school to work Commitment to improve quality and relevance of education for every.
1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Networking Academy Program Prepare Yourself for 21 st Century IT.
Engineering and Technology Management A program in technical decision making and leadership for engineering and business professionals.
IT in Education. No. of Students Enrollment Rate Annual Increase Employees Schools Budget General Education 1,100,000 98,7% 6% 47, US$M.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Introduction to Human Resource Development
Advances in Human Resource Development and Management
Introduction to Human Resource Development
Security Certification
Lecture 32.
Security Certifications
Company LOGO Leading, Connecting, Transforming UNC… …Through Its People Human Capital Management.
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
Certification and Training Presented by Sam Jeyandran.
Margaret J. Cox King’s College London
Preparing our students for Tomorrow through our Partnerships We understand that the future of our community rests in the hands of our students. We are.
ENGAGING LEADERS FOR CHANGE AND INNOVATION ADEA CCI 2011 Summer Liaison Meeting San Diego, CA June 27-29, 2011 Janet M. Guthmiller, DDS, PhD University.
The of a Successful Workforce Readiness Program. Creating Communities that Work. Advancing the profession of Human Resource Management. Building a strategic.
Thomas College Name Major Expected date of graduation address
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
Part 1—Career Exploration
PAWS 4 Page 5.  No! Career/Technical Pathway programs offer a broad range of training for a wide variety of career pathways and many aspects of a broad.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Information Security: A Growth Career Lynn McNulty, CISSP Director of Government Affairs (ISC) 2 September 27, 2007.
Hosted by Staffing Security Positions How To Choose The Right Personnel Jeffrey Posluns, CISA, CISSP, SSCP, CCNP, GSEC SecuritySage Inc.
NSF IGERT proposals Yang Zhao Department of Electrical and Computer Engineering Wayne State University.
WHO Global Standards. 5 Key Areas for Global Standards Program graduates Program graduates Program development and revision Program development and revision.
Dallas Independent School District Technology Plan Ronald R. Pugh ET8011 May 15, 2011.
Why I want to be a Teacher. Ever since I was little, I have always wanted to be a teacher. At the time I didn’t know what kind of teacher I wanted to.
Standards Certification Education & Training Publishing Conferences & Exhibits ISA Certified Automation Professional ® (CAP ® ) Program.
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
Center for Cybersecurity Research and Education (CCRE)
Associate of Applied Science Degree Information & Telecommunication Technology Scott edu
Introduction to Project Management.  Explain what a project is?  Describe project management.  Understand project management framework.  Discuss the.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
ORGANIZATION OF AMERICAN STATES XIV INTER-AMERICAN CONFERENCE OF MINISTERS OF LABOR Employment Services and Labor Market Observatories: Opportunities and.
Business Computer Applications I Business Computer Applications II Accounting Principles I Accounting Principles II Business Law (offered 2017) Intro to.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Internal Audit Agency Integrity + Professionalism INTERNAL AUDIT AGENCY ISACA Presentation 15 July, 2013 Alisa Hotel, ACCRA.
Planning Planning is considered the most important element of the administrative process. The higher the level of administration, the more the involvement.
WHY COMPUTER SCIENCE? University of Phoenix.
Fundamentals & Ethics of Information Systems IS 201
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
MANAGING HUMAN RESOURCES
Stretch Your Budget With Organizational Membership
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Careers in IT.
Information Technology
Building the Security Workforce of Tomorrow
Building the Security Workforce of Tomorrow
Stretch Your Budget With Organizational Membership
Computer Science Section
Certified Information Technology Professional (CITP) Credential
Lifelong Learning.
Presentation transcript:

(c) 2004 Allan Berg Building the Security Workforce of Tomorrow Allan Berg University of Dallas Graduate School of Management

(c) 2004 Allan Berg Information Assurance and Infrastructure Protection … is a national priority as well as a complex and critical challenge. One that requires a true partnership between all stakeholders, government, public, private, and academe. … is a national priority as well as a complex and critical challenge. One that requires a true partnership between all stakeholders, government, public, private, and academe.

(c) 2004 Allan Berg Certification, Education, and Training in Information Assurance People involved in IA must be able to understand and systematically employ and manage IA concepts, principles, methods, techniques, practices and procedures drawn from U.S. statutes, current or pending. IA experts also must understand procedures mandated by the Department of Defense, federal, state and local governments, businesses, and industries. People involved in IA must be able to understand and systematically employ and manage IA concepts, principles, methods, techniques, practices and procedures drawn from U.S. statutes, current or pending. IA experts also must understand procedures mandated by the Department of Defense, federal, state and local governments, businesses, and industries.

(c) 2004 Allan Berg Questions What is the supply core of IA workers What education and training does the IA worker need How will this education and training be imparted Who will certify this education and training

(c) 2004 Allan Berg The IA Workforce Challenge Continuing sustained rapid growth and accelerating Intense demand for unique combinations IT, IA skills, experience, and industry knowledge

(c) 2004 Allan Berg Assessing Educational and Training Needs What occupations comprise the core IA work force Standardized definition of the standards that define the information security worker agreeable to government, industry and academe. Enforcing security processes on a document oriented information system may be very different from a communications network system. Often overlooked : physical, personnel, standards and policy, and administrative security expertise is also a necessity in today’s information security workforce environment.

(c) 2004 Allan Berg Information Assurance Encompasses the scientific, technical, and management disciplines required to ensure computer and network security including the following functions: –System/network administration and operations –Systems security engineering –Information assurance systems and product acquisition –Cryptography –Threat and vulnerability assessment, to include risk management –Web security –The operations of computer emergency response team –Information assurance training, education and management –Computer forensics –Defensive information operations

(c) 2004 Allan Berg Academic Degree vs. Industry Certification Are academe and industry competing for the same market? –Absolutely NOT!! Are academe and industry complimentary? –Absolutely YES!! Many people have some level of experience, but little time to devote to semester-long courses. Many people have no experience, and might not benefit from Wham! Bam! 5-day training courses. –But have time to attend semester-long courses.

(c) 2004 Allan Berg Information Security + What Network and network infrastructure security Physical, personnel and administrative security Cryptography and Public-Key Infrastructure Testing and verification methodologies Intrusion Detection Vulnerabilities analysis and Risk Management Policy and auditing technologies Host security Ethics and legal issues Authentication technologies E-commerce and Public Policy

(c) 2004 Allan Berg The Niche IA Labor Markets Mix of knowledge and skills required can vary Certain technical skills may be in high demand IT is changing rapidly

(c) 2004 Allan Berg Incentives for IA Certification and Education Establishes a professional identity and upholds the quality of the profession. Establishes a minimum level of knowledge with regard to the practice of the profession, and through continuous learning, upgrading of knowledge base and skills. Promulgates a code of ethical practice. Provides a review process and participation in published standards of practice. Promotes ongoing role and function studies for practitioners to validate their practice.

(c) 2004 Allan Berg Incentives for IA Certification and Education (Con’t.) Demonstrates that certified individuals meet acceptable uniform national standards. Establishes a standard level of competency for employee hiring and evaluation. Promotes consumer protection. JOB ADVANCEMENT – certification gives you a competitive edge for promotion and hiring. SALARY – Profile studies shows that certification holders earn more per year than those who do not have certification. ESTEEM – Attaining certification demonstrates to your employer, your colleagues, and yourself that you are committed as a professional.

(c) 2004 Allan Berg Disadvantages of Certification Multiple choice tests are unable to test problem solving and analytic skills. They reward students who can memorize and replay a set of facts with ease. Furthermore, these tests have become integrated into vendor marketing strategies.

(c) 2004 Allan Berg Disadvantages of Certification (Con’t.) Emphasize facts important to a particular product line and frequently do not assess globally important knowledge. Hence, the industry has coined the terms “paper-_ _ _ _” to describe someone who only knows enough to pass the tests, but not enough to function effectively on the job. Since many of the short-term training programs teach only the answers to the tests, the problem is only getting worse.

(c) 2004 Allan Berg The Fix Developing curriculum that includes not only the test information, but also additional materials designed to give the student real insight and hands-on experience with the software and hardware used in the industry. While our student do pass the tests and become certified, they fully understand that it is knowledge beyond the tests that makes them valuable. Such knowledge will last a lifetime, since it will not become obsolete with the next software upgrade.

(c) 2004 Allan Berg Initiatives and Opportunities Assessing educational and training needs State initiatives for IA education Benefits of certification and continuing education Internet-enabled education and training International security education and collaboration

(c) 2004 Allan Berg Initiatives for IA Education Department’s of Information Technology Academic initiatives Internships Federal initiatives CAE/ISE DoD IASP NSF Scholarship Program

(c) 2004 Allan Berg Benefits of Certification and Continuing Education Benefits of Certification Demonstrates a level of expertise/competency Recognition by government, industry Periodic recertification????? Benefits of Continuing Education Life-long Through community colleges and universities Demonstrates a level of expertise/competency Recognition by industry, government, academia Corporate “Universities” Focuses on immediate and near future needs In-house and/or mini-courses by local purveyors Recognition by industry, government

(c) 2004 Allan Berg Internet-enabled and In-class Certification, Education, and Training Assessing the quality: –Can the students reliably and efficiently access all the curriculum materials so that they can complete the course requirements in the specified time period? –Does the technology allow the students to become reasonably engaged with the material? –Are there special difficulties associated with the administration of the program and exams? –Is the time investment on the part of the faculty instructor and students manageable or prohibitive?

(c) 2004 Allan Berg Internet-enabled and In-class Certification, Education, and Training –Does effective learning occur when using the Internet as the primary means of delivering the course curriculum? –How far should distance education really go in being a substitute for the classroom experience? –What is the nature of the market for distance education for the IA professional? –What is the potential for learning with distance education for the IA professional?

(c) 2004 Allan Berg “It’s A Jungle Out There” Microsoft Certified Systems Engineer (MCSE) Cisco Certified Network Associate (CCNA) Cisco Certified Network Professional (CCNP) Cisco Certified Security Professional (CCSP) Certified Internet Webmaster (CIW) Certified Wireless Network Administrator (CWNA) Certified Information System Security Specialist (CISSP) CISSP Concentrations: ISSAP, ISSMP, ISSEP Certified Information System Auditor (CISA) Certified Information Security Manager (CISM) SANS (GIAC) ……………………………… And the list goes on, and on, and on, and on, and on, and on, and on, and on, and on, and on, and on, and on …………………………………………..

(c) 2004 Allan Berg Looking to the Future To move forward, to stay successful, information assurance professionals in an organization, and its leaders, must have vision. Standing still isn’t an option! To move forward, to stay successful, information assurance professionals in an organization, and its leaders, must have vision. Standing still isn’t an option!

(c) 2004 Allan Berg Building the Security Workforce of Tomorrow Allan Berg University of Dallas Graduate School of Management