SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Cybersecurity
LECET Information Technology Conference | May 2, 2012
        Carrie Leary | Anne Arundel Community College
Background

    AACC                   CyberWatch                  Organizations
Center of Academic        Advanced Technological       Public & Private Sectors
    Excellence               Education Center

                                  Curriculum
     AAS Degree in                                             Research
Information Assurance &
     Cybersecurity
                                 K-12 Training

                                                               Training
      Certificates
                           Professional Development
   Network Security
 Server Administration
  CISCO Networking          Collegiate Cybersecurity          Awareness
        Forensic             Defense Competitions
What is Cybersecurity?

 Defined as…

 Measures taken to protect a computer or computer system (as
   on the Internet) against unauthorized access or attack
                                         - Merriam-Webster

 The state of being protected against the criminal or
   unauthorized use of electronic data, or the measures taken to
   achieve this                          -Oxford Dictionaries
What are the needs?

96,600 Network & Computer System Administrators
   65,700 Information Security Analysts
110,000              Computer Support Specialists


     120,000 Computer Systems Analysts
       Bureau of Labor Statistics | Employment Change 2010 - 2020
The Problem




 Current         IT       Workforce
Workforce     Graduates    Needs
Identifying the Workforce
 Information Technology (IT)
   jobs found in every industry
   and across numerous job
   functions

 Lack of job training and skills

 Pending baby boom
   retirements

 Lack of interest in STEM
   fields

 Lack career info
1986 - 1996
2000 - 2004
2004 - 2008
2009 - current
Why worry?




Our Nation               Organizations        Individuals
 Loss of Intelligence    Loss of Data        Identity Theft
 Critical                Reduced             Financial Loss
   Infrastructure/          Productivity       Inconvenience
   Power Grid             Financial Loss
                          Loss of Trust by
                            Customers
                          Bankruptcy
The Problem




 Current         IT       Workforce
Workforce     Graduates    Needs
Avoid Weak Passwords
Accessing the Internet
Accessing the Internet

Choose your browser carefully.
Select Google Chrome, Mozilla
Firefox, of Safari if possible.
Keep Web Browser up-to-date.
Install patches as they are released

Use secure websites.
Look for “https” when transmitting
confidential information.
Never click links.
Always type the web address
directly into the address bar.
Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.

Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.


Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection


Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.

Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.


Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection


Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.

Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.


Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection


Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.

Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.


Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection


Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
Evolving Infrastructure

 We continue to embrace new technology
     Mobile Device
     Virtualization
     Cloud Computing

 Need a workforce versed in specific technical knowledge



As the number of                         the need for data    security to defend
                    storage needs will
connected devices                          analytics will    against robust threats
                         increase,
    increases                              increase, and       will be essential
Be Smart with your Smartphone

                                   Only connect to
                                   protected WiFi

                         Be vigilant when
                         clicking web links


                      Use a complex password



                      Keep firmware updated


                         Only download apps from
                         trusted sources
                                 Pay attention to
                                 the data the phone
                                 is accessing
Cloud Computing




         Built on TRUST!
Cloud Computing – Know what to ask




System Downtime     Encryption of data       Disaster Recovery   Data Retention Policy
                  (in transit and at rest)          Plan




 Data Integrity    Identity and Access         Regulatory          Location of Data
  Assurance           Management               Compliance              Centers/
                                                                   Physical Security
Moving Forward

  Awareness and Training are essential!


  Resources

  • Stay Safe Online
    http://www.staysafeonline.org/
  • National Institute of Standards and Technology (NIST)
    www.nist.gov
  • National Initiative for Cybersecurity Education
    (NICE)http://csrc.nist.gov/nice/
  • CyberWatch ATE Center
    www.cyberwatchcenter.org
  • Cyber Maryland
    http://www.cybermaryland.org/
Questions?
Carrie Leary | csleary@aacc.edu | 410-777-7088
Resources
 Stay Safe Online
   http://www.staysafeonline.org/

 National Institute of Standards and Technology (NIST)
   www.nist.gov

 National Initiative for Cybersecurity Education (NICE)
   http://csrc.nist.gov/nice/

 CyberWatch
   www.cyberwatchcenter.org

 Cyber Maryland
   http://www.cybermaryland.org/
Resources

 http://www.intel.com/content/www/us/en/communications/inte
  rnet-minute-infographic.html

 http://www.confidenttechnologies.com/infographic

 http://www.makeuseof.com/tech-fun/the-only-thing-internet-
  explorer-is-good-for/

Weitere ähnliche Inhalte

Was ist angesagt?

Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills GapStephen Cobb
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021Doug Newdick
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Readying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudReadying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudRH
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Leonardo
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0grp362
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineeringPeter Wood
 

Was ist angesagt? (20)

Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Readying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudReadying your IT Infrastructure for Cloud
Readying your IT Infrastructure for Cloud
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
Mobile security
Mobile securityMobile security
Mobile security
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 

Andere mochten auch

RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPLbhattsipl
 
Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...
Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...
Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...JISC RSC Eastern
 
What's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyWhat's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyEly Kahn
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
WiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightWiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightRandle Stonier
 
Teacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and AppsTeacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and AppsShelly Sanchez Terrell
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in EducationTyrone Grandison
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Andere mochten auch (13)

RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPL
 
Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...
Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...
Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...
 
What's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyWhat's Next in Cybersecurity Policy
What's Next in Cybersecurity Policy
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
WiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightWiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it right
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Teacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and AppsTeacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and Apps
 
Wifi Ppt
Wifi PptWifi Ppt
Wifi Ppt
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Ähnlich wie Cybersecurity Workforce Needs

Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxDomain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxInfosectrain3
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfNirGoldstein5
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursDilum Bandara
 

Ähnlich wie Cybersecurity Workforce Needs (20)

Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxDomain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptx
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 

Kürzlich hochgeladen

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cybersecurity Workforce Needs

  • 1. Cybersecurity LECET Information Technology Conference | May 2, 2012 Carrie Leary | Anne Arundel Community College
  • 2. Background AACC CyberWatch Organizations Center of Academic Advanced Technological Public & Private Sectors Excellence Education Center Curriculum AAS Degree in Research Information Assurance & Cybersecurity K-12 Training Training Certificates Professional Development Network Security Server Administration CISCO Networking Collegiate Cybersecurity Awareness Forensic Defense Competitions
  • 3. What is Cybersecurity?  Defined as…  Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack - Merriam-Webster  The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this -Oxford Dictionaries
  • 4.
  • 5. What are the needs? 96,600 Network & Computer System Administrators 65,700 Information Security Analysts 110,000 Computer Support Specialists 120,000 Computer Systems Analysts Bureau of Labor Statistics | Employment Change 2010 - 2020
  • 6. The Problem Current IT Workforce Workforce Graduates Needs
  • 7. Identifying the Workforce  Information Technology (IT) jobs found in every industry and across numerous job functions  Lack of job training and skills  Pending baby boom retirements  Lack of interest in STEM fields  Lack career info
  • 12.
  • 13. Why worry? Our Nation Organizations Individuals  Loss of Intelligence  Loss of Data  Identity Theft  Critical  Reduced  Financial Loss Infrastructure/ Productivity  Inconvenience Power Grid  Financial Loss  Loss of Trust by Customers  Bankruptcy
  • 14. The Problem Current IT Workforce Workforce Graduates Needs
  • 15.
  • 18.
  • 19. Accessing the Internet Choose your browser carefully. Select Google Chrome, Mozilla Firefox, of Safari if possible. Keep Web Browser up-to-date. Install patches as they are released Use secure websites. Look for “https” when transmitting confidential information. Never click links. Always type the web address directly into the address bar.
  • 20.
  • 21. Accessing the Internet Do not use unsecure WiFi. Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information. Password protect your home WiFi Password protecting decreased the number of unauthorized users on your connection. Do not broadcast the SSID of your home WiFi. Hiding the name of your network decreases the number of unauthorized users on your connection Be careful when selecting and answering Password Recovery Questions. Do not select questions that others know the answer to or can utilize social engineering to determine.
  • 22. Accessing the Internet Do not use unsecure WiFi. Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information. Password protect your home WiFi Password protecting decreased the number of unauthorized users on your connection. Do not broadcast the SSID of your home WiFi. Hiding the name of your network decreases the number of unauthorized users on your connection Be careful when selecting and answering Password Recovery Questions. Do not select questions that others know the answer to or can utilize social engineering to determine.
  • 23. Accessing the Internet Do not use unsecure WiFi. Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information. Password protect your home WiFi Password protecting decreased the number of unauthorized users on your connection. Do not broadcast the SSID of your home WiFi. Hiding the name of your network decreases the number of unauthorized users on your connection Be careful when selecting and answering Password Recovery Questions. Do not select questions that others know the answer to or can utilize social engineering to determine.
  • 24. Accessing the Internet Do not use unsecure WiFi. Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information. Password protect your home WiFi Password protecting decreased the number of unauthorized users on your connection. Do not broadcast the SSID of your home WiFi. Hiding the name of your network decreases the number of unauthorized users on your connection Be careful when selecting and answering Password Recovery Questions. Do not select questions that others know the answer to or can utilize social engineering to determine.
  • 25. Evolving Infrastructure  We continue to embrace new technology  Mobile Device  Virtualization  Cloud Computing  Need a workforce versed in specific technical knowledge As the number of the need for data security to defend storage needs will connected devices analytics will against robust threats increase, increases increase, and will be essential
  • 26.
  • 27. Be Smart with your Smartphone Only connect to protected WiFi Be vigilant when clicking web links Use a complex password Keep firmware updated Only download apps from trusted sources Pay attention to the data the phone is accessing
  • 28.
  • 29. Cloud Computing Built on TRUST!
  • 30. Cloud Computing – Know what to ask System Downtime Encryption of data Disaster Recovery Data Retention Policy (in transit and at rest) Plan Data Integrity Identity and Access Regulatory Location of Data Assurance Management Compliance Centers/ Physical Security
  • 31. Moving Forward Awareness and Training are essential! Resources • Stay Safe Online http://www.staysafeonline.org/ • National Institute of Standards and Technology (NIST) www.nist.gov • National Initiative for Cybersecurity Education (NICE)http://csrc.nist.gov/nice/ • CyberWatch ATE Center www.cyberwatchcenter.org • Cyber Maryland http://www.cybermaryland.org/
  • 32. Questions? Carrie Leary | csleary@aacc.edu | 410-777-7088
  • 33. Resources  Stay Safe Online http://www.staysafeonline.org/  National Institute of Standards and Technology (NIST) www.nist.gov  National Initiative for Cybersecurity Education (NICE) http://csrc.nist.gov/nice/  CyberWatch www.cyberwatchcenter.org  Cyber Maryland http://www.cybermaryland.org/
  • 34. Resources  http://www.intel.com/content/www/us/en/communications/inte rnet-minute-infographic.html  http://www.confidenttechnologies.com/infographic  http://www.makeuseof.com/tech-fun/the-only-thing-internet- explorer-is-good-for/

Hinweis der Redaktion

  1. Background about Industry
  2. What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursue
  3. Why do we need so many? Let’s talk about the changes that have occurred in the industry and how the landscape has changed.
  4. What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursueWe are not able to develop technology as fast as neededNeed to get individual users to feel accountable and practice safe security
  5. Biggest threats come from within the organization – not following polices and guidelines
  6. Technology is now so accessible to so many# of connected device – storage, analytics, and security to protect against robust threats
  7. What does your phone know about you? What are you giving it access to?
  8. Only download apps from trusted sources, such as reputable app stores and download sites. Remember to look at the developer name, reviews, and star ratings.After clicking on a web link, pay close attention to the address to make sure it matches the website it claims to be if you are asked to enter account or login information.Set a password on your mobile device so that if it is lost or stolen, your data is difficult to access.Download a mobile security tool that scans every app you download for malware and spyware and can help you locate a lost or stolen device. For extra protection, make sure your security app can also protect from unsafe websites.Be alert for unusual behaviors on your phone, which could be a sign that it is infected. These behaviors may include unusual text messages, strange charges to the phone bill, and suddenly decreased battery life.Make sure to download firmware updates as soon as they are available for your device.
  9. Handing over trustMost valuable thing to a company is their data