Cybersecurity nexus (CSX)

Slides:



Advertisements
Similar presentations
Security Services & VIP Protection
Advertisements

Strengthen Your Career by Effectively Marketing Your Credentials Cheyene Haase BC Management, Inc.
North American Leadership Conference Dallas, Texas USA April 13-14, 2013 Hyatt Regency.
Certification Programs CISA/CISM/CGEIT DoD Overview Update: 1 May 2009.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
1 Building the Nation’s Cybersecurity Workforce Benjamin Scribner Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch.
1 Transforming Enterprise IT Speaker Name/Title Date.
ISACA Research Update Robert Foster Research Director, ISACA Northern England Chapter.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Third Annual Shopping on the Job: ISACA’s Online Holiday Shopping and Workplace Internet Safety Survey Commissioned by ISACA ( November 2010.
Introduction to Security Architecture
UMUC HS-EM Graduate Programs Competency Based Model A Work in Progress June 2014 CHDS – EMI Higher Ed Irmak Renda-Tanali, D.Sc. Collegiate Professor Director,
ISACA Wellington: 2014 Strategy. Background ISACA’s vision: Trust in, and value from, information and information systems ISACA’s mission: For professionals.
The Road to the Microsoft MCITP Certifications and Other Topics Networking Curriculum.
Chapter 2 Careers in Fraud Examination and Financial Forensics.
Certification and Training Presented by Sam Jeyandran.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
ISACA STUDENT MEMBER CYBERSECURITY SURVEY Results from 171 Participants│APRIL 2014.
© 2007 ISACA ® All Rights Reserved DAMA-NCR Chapter Meeting March 11, 2008.
1 Homologues Group Meeting Slovenia, October 2009 Republika SlovenijaEuropean Union Ljubljana, October 2009 Introduction to IT audits PART II IT.
ISACA For Student. Agenda- “Move yourself Forward” About ISACA –Professions served –Certifications available ISACA Student Membership –Student Benefits.
2 Overview With active participation from individuals and chapters all over the world, the Information Systems Security Association (ISSA)
Essential Enterprise IT Governance with COBIT®5 Date: 7 th and 8 th October 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama,
Resources to Support Training Programs for CSIRTs.
Cyber Security Actual needs & future trends Vlastimil Červený.
QAI Federation Chapters Overview Quality Assurance Institute (QAI)
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Strohl Systems International User Group Conference — April 9-12, 2006 — Orlando, Florida USA Assess Your BC Career Today ~ to Ensure Your Marketability.
Information Systems Audit and Control Association ( ISACA ) – Certified Information Security Manager (CISM ) ITEC 6324 Instructor: Dr. E. Crowley Name:
Center for Cybersecurity Research and Education (CCRE)
Cybersecurity : Optimal Approach for PSAPs
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
1 Building the Cybersecurity Workforce October 1, 2015 C3 & National K-12 Cybersecurity Education Conference Benjamin Scribner Department of Homeland Security.
Audit Management. Resource allocation/prioritazion/planning/execution/ reassignments Evaluating audit quality/peer reviews Best practices identification.
ISACA’s Cybersecurity nexus (CSX) & Legislative Watch April 7, 2016 Lisa Moorer, CISA, CRISC.
THE HUMAN RESOURCES/OPERATIONS INITIATIVE: NEW RESOURCES UNVEILED! By: Kathy Balu, Denver Water September 20, 2011 RMSAWWA/RMWEA Joint Annual Conference.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
“ I C T a d v i s o r y s e r v i c e s ” Transforming Enterprise IT Thomas Bbosa, CISSP BitWork Consult Ltd BitWork Consult Ltd.
ISACA: 2016 AND BEYOND MATT LOEB (CGEIT, CAE) ISACA CHIEF EXECUTIVE OFFICER.
2 Overview With active participation from individuals and chapters all over the world, the Information Systems Security Association (ISSA)
MS in IT Auditing, Cyber Security, and Risk Assessment
Welcome to PMP certification Introduction for Managers
IS4680 Security Auditing for Compliance
Send Final PPT by Wed 9am. (866) ID: , Leader PIN: 4869
Associate Degree in Cyber security
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Cybersecurity Education and Workforce Development Resources
IT and Project Management Best Practice Training
Stretch Your Budget With Organizational Membership
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Information Systems Audit and Control Association
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Careers in IT.
How to Successfully Leverage Professional Associations
ISACA OVERVIEW June 2015.
IT Technician Pathway - Cybersecurity
ISACA Guidance and Practices Committee
Information governance and information security
ISACA Imperatives: IT risk
مبانی ممیزی فناوری اطلاعات
Welcome to PMP certification Introduction for Managers
Cybersecurity ATD technical
ISACA Guidance and Practices Committee
Stretch Your Budget With Organizational Membership
High School and Beyond Purpose.
Society of Actuaries STRATEGIC VISION LISTENING TOUR
The Association of Certified Accounts Payable Professionals (ACAPP)
ISACA IN 2019 Robin Lyons WHAT’S NEXT, NOW Technical Research Manager
Presentation transcript:

Cybersecurity nexus (CSX) ISACA’s Cybersecurity nexus (CSX) April 2015

EXECUTIVE OVERVIEW Market Need is Clear: CSX Roadmap: Cybersecurity Skills Crisis Market Need is Clear: ISACA & RSA State of Cybersecurity: Implications for 2015 survey ISACA 2015 Global Cybersecurity Status Report Highlights ISACA Student Poll CSX Roadmap: CSX Training and Certifications CSX Resources CSX 2015, Washington DC Career Management Evolving Resources and Tools

ABOUT ISACA Assuring trust in a dynamically changing digital world Global association serving 140,000 cybersecurity, assurance, governance and risk professionals Members in 180 countries; 200+ chapters worldwide Launched Cybersecurity Nexus (CSX) in 2014 to address growing cybersecurity skills crisis and develop a skilled cyber workforce Skills-based training Performance-based certifications Developed and maintains the COBIT framework Offers the CISA, CISM, CGEIT and CRISC certifications

Cybersecurity: Market need Cybersecurity is a top global concern. 82% of enterprises expect to experience a cyber incident in 2015 More than 35% are unable to fill open cybersecurity positions 69% say certification is required for cybersecurity jobs 33% say qualified candidates have hands-on experience 46% say technical skills are needed There is a cybersecurity skills crisis: 1 million unfilled jobs (source: Cisco) The research is clear. Cybersecurity has evolved from critical topic into a public safety issue

State of CYBERSECURITY: IMPLICATIONS FOR 2015 ISACA and RSA CONFERENCE JOINT SURVEY—649 RESPONDENTS WORLDWIDE www.isaca.org/state-of-cybersecurity-2015

2015 Global cybersecurity status report 3,400+ RESPONDENTS WORLDWIDE www.isaca.org/cybersecurityreport

ISACA STUDENT POLL Do you plan to pursue a cybersecurity related certificate or certification? 88% of students plan to work in a field or job that requires some level of cybersecurity knowledge after graduation.

CSX: the roadmap

Isaca AND CSX AT THE FOREFRONT ISACA and CSX are Leaders in Cybersecurity Career Management Cybersecurity is a natural extension building on how ISACA has evolved to serve the needs of professionals worldwide ISACA collaborates with leading global governments and organizations at the center of cybersecurity Through CSX, ISACA is providing the first holistic program for cybersecurity career progression

OUR SOLUTION CSX Is Providing a Single Source for Cybersecurity Professionals: our holistic program will be the first and only “one stop shop” providing a complete solution and covering the full career lifecycle. Credentialing and Training Education/ Conferences Membership Resources/ Publications Career Management

Career path: cybersecurity certifications CSX training and certifications offered for skill levels and specialties throughout a professional’s career. www.isaca.org/csx-certifications

Career path: cybersecurity certifications CSX Practitioner—Demonstrates ability to serve as a first responder to a cybersecurity incident following established procedures and defined processes. (1 certification, 3 training courses; prerequisite for CSX Specialist) CSX Specialist—Demonstrates effective skills and deep knowledge in one or more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5 certifications, 5 training courses; requires CSX Practitioner) CSX Expert—Demonstrates ability of a master/expert-level cybersecurity professional who can identify, analyze, respond to, and mitigate complex cybersecurity incidents. (1 certification, 1 training course; no prerequisites required) Certified Information Security Manager certification (25,000+ professionals certified since inception; named the second-highest-paying certification by Global Knowledge’s 2015 IT Skills and Salary Survey; 5+ years experience required)

www.isaca.org/cyber-con #CSXNA 19-21 October 2015 Washington, DC, USA 70+ sessions tailored by career level www.isaca.org/cyber-con #CSXNA

CSX ELEMENTS: Roadmap Cybersecurity standard for small-to-medium enterprises Computer forensics guide Career management road map 2015 APT study Threats and opportunities tool

www.isaca.org/cyber Contact: csx@isaca.org