Information Assurance Opportunities and Requirements Doug Jimenez, IA Division Director Mary Mayonado, CISSP, IA Program Manager Marla Shipley, CND/aXiom.

Slides:



Advertisements
Similar presentations
Eric DeGraff Director July OVERVIEW X-Feds, Inc. Proprietary  X-Feds is dedicated to providing superior expertise in technical consulting services.
Advertisements

GOV SOLUTIONS GROUP A WOMAN-OWNED SMALL BUSINESS CORPORATE CAPABILITIES BRIEF The Cameron Bell Corporation D/B/A Gov Solutions Group 162 Seven Farms.
Security and Personnel
Information Visualization Solutions March 15-16, 2007 Information Visualization Solutions Team Overview & Analysis ~ Michael Hardy.
2003 Indigo Technology, Inc. All Rights Reserved Alliance Portfolio Computing Infrastructure Services Customer Relationship Management Engineering Services.
DKW Proprietary Information 1 Emergent Proprietary Information 1 Cyber Security In the Global Marketplace Emergent, Inc Rivers Avenue Suite 132 North.
1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Networking Academy Program Prepare Yourself for 21 st Century IT.
(c) 2004 Allan Berg Building the Security Workforce of Tomorrow Allan Berg University of Dallas Graduate School of Management.
Federal Business Alliance Texas Small Business Procurement Fair - What It Takes to be My Partner - Lee Ann Standish, PMP Vice President / Small Business.
Chapter 15 Information Technology Careers.
Security Certification
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
The Road to the Microsoft MCITP Certifications and Other Topics Networking Curriculum.
© Paradigm Publishing Inc Chapter 15 Information Technology Careers.
1 © 2005 Cisco Systems, Inc. All rights reserved. Changing the way we learn Cisco Networking Academy Program Name Organization Date Insert Academy logo.
CCNP RS 7.0 Course Overview
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
1 © 2005 Cisco Systems, Inc. All rights reserved. Changing the way we learn CISCO NETWORKING ACADEMY PROGRAM Insert Academy logo here Insert speaker name.
April 9,  Employers  IS Careers  Business Support  Key Trends  Manage your career  Questions 2.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
“Navigating IT Solutions. Delivering Results.” Bay State, Inc. ◊ 4201 Northview Drive, Suite 408, Bowie, MD ◊ t: ◊
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
The IT Professional Outlook: Where Will We Go From Here? Chart Your Course: Sourcing the Global Workforce Diane Morello VP Research Gartner Inc. May 24,
Smart People Solving Hard Problems Science Applications International Corporation (SAIC) Jim Thigpen – deputy general manager, Platform Integration Operations.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Navigating IT Solutions.Delivering Results. Bay State Proprietary l CAPABILITY BRIEFING FOR MITRE 12TH SERVICE ORIENTED ARCHITECTURE.
Going further together Building and Effective IT Profession Charles Hughes President British Computer Society IFIP Workshop 25 August 2006.
Center for Cybersecurity Research and Education (CCRE)
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Link, Additional Information Train students for: Entry-level computer support positions Advanced degree preperation Professional Certification Train students.
Annette Rosta Associate Director Recruiting Diversity & Compliance KPMG Career Center Navigating Career Web Sites February 2012 Annette Rosta Associate.
1 © 2004 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Building the Future Cisco Networking Academy Program.
C4ISR for the Military: Development and Implementation Presentation to the Security Network’s C4ISR, Robot Platforms, and Sensor Conference Greg Collins,
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Oracle Academy Overview Oracle in Education Jane Richardson Senior Director, EMEA.
A+ certification 2012 Guidelines. CompTIA A+ certification validates the latest skills needed by today’s computer support professionals. It is an international,
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
CSCE 727 Industry Certifications in IA. Global IA Workforce Trends A Frost & Sullivan Market Survey Sponsored by (ISC) 2® Prepared by Robert Ayoub, CISSP,
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Ordering - BoM Cisco ONE VIP 26 Overview Duration: 1.5 hrs Notes: Update colors and bring into new template. Remove this photo and use it on slide 5 instead.
IT Jobs Positions available in the field of Information Technology.
Infrastructure Deployment Services Dell Networking Deployment Services.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Computers Are Your Future
MS in IT Auditing, Cyber Security, and Risk Assessment
Computers Are Your Future
Department of Computer and Information Sciences
Department of the Navy’s (DoN’s) Historically Black Colleges and Universities/ Minority Institutions (HBCU/MI) Cybersecurity/Information Assurance (CS/IA)
Chapter 15 Information Technology Careers.
SAP in ERP – A Bird’s Eye View
Associate Degree in Cyber security
A+ certification 2015 Guidelines.
U.S. Education Implementation Examples
Microsoft Virtual Academy
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
U.S. Education Implementation Examples
UNM Information Assurance Scholarship for Service (SFS) Program
~ 20% of employees are military veterans.
Credentials Name: Matthew Robson
Security week 1 Introductions Class website Syllabus review
ICT ASSOCIATE PROFESSIONAL
UNM Information Assurance Scholarship for Service (SFS) Program
Remote Coding: Best Practices and Strategies AHIMA 2016
Microsoft Data Insights Summit
Latest Practice Test Dumps
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Information Assurance Opportunities and Requirements Doug Jimenez, IA Division Director Mary Mayonado, CISSP, IA Program Manager Marla Shipley, CND/aXiom Program Manager January 8, 2010

© 2009 Science Applications International Corporation. All rights reserved. SAIC and the SAIC logo are registered trademarks of Science Applications International Corporation in the United States and/or other countries. Energy | Environment | National Security | Health | Critical Infrastructure 2 SAIC James Business Unit Information Assurance Overview Information Assurance (IA Division) – Doug Jimenez, Division Director – 200+ employees supporting SPAWAR Systems Center Atlantic, NAVAIR, and their sponsors – 42m annually – DOD 8570 Compliant Workforce Certified Information Systems Security Professionals (CISSP) CISSP/Information System Security Engineering Professional (CISSP-ISSEP) Security Plus Vendor Certifications – Fully Qualified Navy Certification Agents

© 2009 Science Applications International Corporation. All rights reserved. SAIC and the SAIC logo are registered trademarks of Science Applications International Corporation in the United States and/or other countries. Energy | Environment | National Security | Health | Critical Infrastructure 3 Customers

© 2009 Science Applications International Corporation. All rights reserved. SAIC and the SAIC logo are registered trademarks of Science Applications International Corporation in the United States and/or other countries. Energy | Environment | National Security | Health | Critical Infrastructure 4 General Programming/Network Support SPAWAR Atlantic and Sponsors Core Routing and Switching _ vendor independent Integration Support – Routers/Switches – IDS/IPS – Application Proxy Firewalls – Remote access solutions Secure Wireless (Survey, Design, and Integration) LAN Infrastructure Service Oriented Architectures (SOA)/Cloud Computing Virtualization/Data Centers Application Development/Programming (JAVA, Pearl) UNIX Services Sharepoint/Web hosting IPv6 readiness and implementation

© 2009 Science Applications International Corporation. All rights reserved. SAIC and the SAIC logo are registered trademarks of Science Applications International Corporation in the United States and/or other countries. Energy | Environment | National Security | Health | Critical Infrastructure 5 Why Are We Here? High Demand for IA savvy employees Relocation Costs High Training Costs Lost Revenue We Could Do So Much More if Education/Academia and Industry were better aligned – Capture more of those high school students who want IT/IA careers – Create more jobs for the State of SC Less Relocation/Bringing in talent from outside – Chance for Recognition as a center of excellence for IA

© 2009 Science Applications International Corporation. All rights reserved. SAIC and the SAIC logo are registered trademarks of Science Applications International Corporation in the United States and/or other countries. Energy | Environment | National Security | Health | Critical Infrastructure 6 What do we need from Academia (Education/Skill sets needed) Graduates who understand and are able to develop a secure IT solution, a comprehensive understanding of underlying principles is the foundation – Networking, TCP/IP fundamentals – Programming, secure coding techniques – System Engineering – for the entire lifecycle – Configuration Management processes and techniques Legal Issues in Information Assurance – Forensics – HIPAA – Privacy Act Compliance issues – vary by customer

© 2009 Science Applications International Corporation. All rights reserved. SAIC and the SAIC logo are registered trademarks of Science Applications International Corporation in the United States and/or other countries. Energy | Environment | National Security | Health | Critical Infrastructure 7 Shortfall Areas/Potential Research Areas Cross Domain/Multilevel Security – We have to share data across organizations, this is still a major area of challenge Active Network Defense – Within ethical and legal guidelines Event Correlation – Gathering attack data across diverse networks to develop comprehensive threat/risk picture Anti-Tamper – Need to develop additional techniques to guard against reverse engineering hardware and software Improved IA techniques for Weapons Systems – Confidentiality – generally o.k. – Integrity – area of improvement – Availability – area of improvement

© 2009 Science Applications International Corporation. All rights reserved. SAIC and the SAIC logo are registered trademarks of Science Applications International Corporation in the United States and/or other countries. Energy | Environment | National Security | Health | Critical Infrastructure 8 SAIC 5617 North Rhett Avenue North Charleston, SC – fax For More Information