Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?

Slides:



Advertisements
Similar presentations
Survivor Can your team outwit, outplay and outlast your opponents to be the ultimate Survivor?
Advertisements

2 whoami The OWASP Foundation Nahidul Kibria Co-Leader, OWASP Bangladesh, Senior Software Engineer, KAZ Software Ltd.
Security and Personnel
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
CSCE101 –Chapter 9 – Sections 2 and 3 Thursday, December 7, 2006.
MIS 3580 Defending Against Cyber Crime
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
CYBER CRIME AND SECURITY TRENDS
Computer Careers Dr. Kip Irvine School of Computing and Information Sciences, Florida International University.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Oklahoma Chapter Information Systems Security Association Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee Oklahoma Chapter,
Future Jobs Denton MacDonald. Possible careers Architect Plan and design buildings and other structures Information Security Analyst Help ensure the security.
Securing Information Systems
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Survivor Can your team outwit, outplay and outlast your opponents to be the ultimate Survivor?
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
AUDITORÍA THE APPCO. VOLUME 8: CRITICAL ASSET FOR PEOPLE.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
C8- Securing Information Systems
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
Survivor Can your team outwit, outplay and outlast your opponents to be the ultimate Survivor?
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Emergency Management Open House What Is Emergency Management? An inter-disciplinary field that focuses on saving lives, preserving the.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Survivor Can your team outwit, outplay and outlast your opponents to be the ultimate Survivor?
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Ingredients of Security
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Safe’n’Sec IT security solutions for enterprises of any size.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Objectives Who I Am The Company I Interned With The Projects I Worked On Project Details How The Experience Relates To My Education Conclusions Drawn.
Survivor Can your team outwit, outplay and outlast your opponents to be the ultimate Survivor?
Surveillance and Security Systems Cyber Security Integration.
Securing Information Systems
Securing Information Systems
Cyber Security Policy Analysts
Careers in Cyber Security
Associate Degree in Cyber security
Systems Security Keywords Protecting Systems
Career JEOPARDY! Cluster: Information Technology
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Securing Information Systems
Cyber Security Lesson Quarter 1.
I have many checklists: how do I get started with cyber security?
Virginia Union University
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
DID YOU KNOW??? Science - Technology - Engineering - Mathematics
Presentation transcript:

Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?

Cryptographers Forensic Analysts Network Security Engineers Penetration Testers Malware Analysts Disaster Recover Experts

Use your immunity idol to pass on a question or challenge. You must surrender the idol once it is used.

Each time you get a question right, you get a challenge and a chance at bonus points.

You depend on the other tribes to vote for your challenge solution. They will lose points for teaming up unfairly.

The secret final challenge will be revealed at the end of the game for additional points. Good Luck CyberSurvivors!

What professional protects your day-to-day operations, data, and communications from tornados, hurricanes, power outages, and denial of service attacks?

A Disaster Recovery Expert

Name the critical responsibility of the disaster recovery expert that assures the Disaster Recovery Plan will work in an emergency.

This professional develops algorithms to protect communications from being read if intercepted.

A Cryptographer

Cryptographers are not only needed to protect our national secrets, these organizations and companies need encryption too.

This professional simulates attacks on developing applications, networked systems, and computers to simulate an attack by a criminal to help strengthen organizational security.

A Penetration Tester

These professionals are often unofficially called the “White Hat” version of these “Black Hat” criminals.

This processional configures the hardware, software, policy and end-user education of organizations to protect its digital assets.

Network Security Engineer

Which of the following three things is the biggest threat to an organizations security – hardware, software, employees?

This professional studies malicious software -- such as viruses, key loggers, and spyware – to understand how they function.

A Malware Analyst

Malware analysts can decompile malware’s compiled executable code to look at a representation of the source code. This helps them determine what the malware intends to do. This process is called…

This professional collects and analyzes data if a computer has been used in a crime.

A Forensic Analyst

The data the forensic analyst collects for law enforcement or litigation purposes can also be called…

What do Cybersecurity professionals protect?

Data and Communications

A cyber attack by terrorists on our infrastructure could cause what kind of problems?

According to the National Workforce Center for Emerging Technologies, what percentage of Information Technology (IT) jobs are in corporations not specifically IT-focused (like healthcare, entertainment, banking, etc…) 30%? 50%? Or 70%?

70% Source:

Which degrees can work in Cybersecurity fields? Certificate? Associates? Bachelors? Masters? Doctorates?

A lot of cybersecurity jobs require that you be eligible for this classification. Hint: Top Secret

Security Clearance

Good reputation management can help a person get a security clearance. What are some things that you could do to keep a good reputation? The team with the most ideas gets the point for this question.

Name as many other cybersecurity careers you can think of. Teams get one point for every unique answer (answers that other teams don’t have on their list)

Information Security Crime Investigator Forensics Expert System, Network and/or Penetration Tester Forensic Analyst Incident Responder Security Architect Malware Analyst Network Security Engineer Security Analyst Computer Crime Investigator Director of Security Application Penetration Tester Security Operations Center Analyst Prosecutor Specializing in Information Security Crime Technical Director and Deputy CISO Intrusion Analyst Vulnerability Researcher Exploit Developer Security Auditor Software developer Software Architect Disaster Recovery Expert Business Continuity Analyst Cryptographer Bioinformatics specialist Robotics