SlideShare a Scribd company logo
1 of 18
A Day in the Life of a Cyber
Security Professional
Tim Holman, CEO of 2-sec
18th June 2015
Focus on:
• Typical day to day activities as CEO of 2-sec.
• The highlights (and lowlights) of my cyber
security career.
• How to develop YOUR career as a cyber security
professional.
• How can the ISSA created Cyber Security Career
Lifecycle™ help?
Tim Holman, CEO 2-sec
• 20 plus years security experience in Cyber security
including:
– auditing
– penetration testing
– credit card security
– ethical hacking
– training
– incident response
• Awarded Microsoft MVP Security in 2004, 2005 and 2006
• Director of the ISSA International Board, Fellow of ISSA
and Previous President of ISSA-UK
What do I do all day!?
• Work in a multi disciplinary team across the South
of England.
• Help many different types of UK businesses from
SMEs to large conglomerates.
• All market sectors, including retail, financial,
professional services hospitality.
• Penetration Testing, Audits and Assessments, PCI
DSS, CISO, Physical Security and Training.
What do I do all day!?
• Most of my time is ADVISING existing and new clients.
• Also responsible for projects including:
– Security assessments including pen testing/physical
– Card security
– Auditing companies to gain industry compliance e.g. PCI
DSS.
– Incident Response Planning
• Disaster management during data breaches.
• Managing ISSA.
• Each day is different.
Highs and Lows of my Career
Highs (or the good bits)
• Recognition
• Making a difference
• Helping others
• Defeating cyber
crime
Lows (or the bad bits)
• Box tickers
• Some vendors
• Sales guys
• Bootcamps
Why are we successful?
• Experience of our consultants who are
KNOWN to be experts in their fields.
• Experience in many different sectors.
• Our commercial understanding.
• We communicate well with our clients.
• We provide simple, cost effective solutions
in non technical language.
Cyber Security as a Profession
• Over 50 different career types within cyber
security.
• Reports of 300,000 and 1,000,000 current
cybersecurity positions are vacant.
• Demand is expected to rise as public, private and
government sectors face unprecedented numbers
of cybersecurity threats.
• The lack of cybersecurity talent can be an
organization's biggest vulnerability, exposing it to
serious risk.
Problems with the Profession
• The Information Security profession has
developed largely in reaction to threats.
• Now we are paying the price with an enormous
gap of skilled professionals and an entire “missing
generation.”
• No synergy around defining cyber security roles;
e.g Network Security Analysis in USA may not
have same responsibilities as those working for
other countries.
The profession has developed in
REACTION to threats
Somebody is trying to
get in – stop them
Somebody got in – find
out what they did
How do we stop somebody
from getting in?
Stop them at the border with
firewalls, then with intrusion
prevention/detection
• General IT support staff
(system managers, networks,
operators, etc.)
• Security Analysts
• Network Security Engineers
Locking down systems to
prevent further damage and
retrace the steps
• General IT support staff
(system managers, networks,
operators, etc.)
• Security Analyst
• Network Security Engineers
• Forensic Analysts
• Cyber law enforcement
• Cyber legal council
Locking down systems and
building the defense in layers
• General IT support staff
(system managers, networks,
operators, etc.)
• Security Analysts
• Network Security Engineers
• Forensic Analysts
• Cyber law enforcement
• Cyber legal council
• Security Architects
• GRC Specialists
• Secure Code Developers
There really IS a problem
• Our reactive development has not allowed for:
• Developing a professional career map.
• Building what we need to be proactive.
• “next generation”.
• Well rounded skill sets.
• Our industry has taken a knee jerk reaction:
• Tremendous push by governments to fill the gap through
formal education programs.
• New training and education programs are popping up
everywhere.
• No collaboration between entities or countries.
• No “voice” speaking for the profession/professional.
The Cyber Security Career Lifecycle™
The CSCL is a systematic approach that:
• Enables professionals to discover the areas of
weakness.
• Defines personalized career map.
• Provides guidance, resources, and a support
system to achieve skills and career goals.
www.issa.org/cscl
What is the CSCL?
The CSCL is a systematic approach that:
– Enables professionals to discover the areas of
weakness in their skill sets and aptitudes.
– Defines personalized career map according to the
individuals knowledge, skills, aptitudes and interest.
– Provides guidance, resources, and a support system
to achieve skills and career goals.
The Cyber Security Career Lifecycle™
Pre-
Professional
Entry
Mid-
Career
Senior
Leader
Understand your career!
Self -Assessment
Knowledge, Skills, Aptitudes
Career Mapping
Personal
Guidance
Understand your career!
Understand where you currently are in your career
• Career Mapping
• Self assessment using KSAs
ISSA resources to strengthen & grow
• Knowledge sharing
• Formalized training
• Networking
• Mentoring
Direct feedback for new services
ISSA Career Progression Continues…
• Focus on the “missing generation”
• Meet-ups (virtual & in person)
• Mentoring
• Continuing support of all phases
• Journal
• Webcasts
• International Conference/ CSCL Tracks
• New service development using CSCL phases
• International Consortium for Cyber Security Education
and Professional Development (ICCE&PD)
Thank you very much!
STAND BH514
tim.holman@2-sec.com
0844 502 2066
@2_secure
www.2-sec.com
Any Questions?

More Related Content

Viewers also liked

Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]Albert Kenyani Inima
 
High School Diploma_Pavel Mishev
High School Diploma_Pavel MishevHigh School Diploma_Pavel Mishev
High School Diploma_Pavel MishevPavel Mishev
 
Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016Emily Miketinac
 
McKinsey Slides Examples
McKinsey Slides ExamplesMcKinsey Slides Examples
McKinsey Slides ExamplesLewis Lin 🦊
 
IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015Mary Minicka
 

Viewers also liked (7)

Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]
 
Contabilidad
ContabilidadContabilidad
Contabilidad
 
High School Diploma_Pavel Mishev
High School Diploma_Pavel MishevHigh School Diploma_Pavel Mishev
High School Diploma_Pavel Mishev
 
Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016
 
McKinsey Slides Examples
McKinsey Slides ExamplesMcKinsey Slides Examples
McKinsey Slides Examples
 
Ruc y rise
Ruc y riseRuc y rise
Ruc y rise
 
IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015
 

Similar to 2-sec "A Day in the Life of a Cyber Security Professional" Interop London June 2015

2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class OneFRSecure
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?PECB
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1FRSecure
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureSecurity Innovation
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1FRSecure
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small BusinessArt Ocain
 
Cyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San AntonioCyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San AntonioClearedJobs.Net
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018 David Germain
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueMurray Security Services
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptxBoni Yeamin
 

Similar to 2-sec "A Day in the Life of a Cyber Security Professional" Interop London June 2015 (20)

2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
How To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk Analyst
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
Cyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San AntonioCyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

2-sec "A Day in the Life of a Cyber Security Professional" Interop London June 2015

  • 1. A Day in the Life of a Cyber Security Professional Tim Holman, CEO of 2-sec 18th June 2015
  • 2. Focus on: • Typical day to day activities as CEO of 2-sec. • The highlights (and lowlights) of my cyber security career. • How to develop YOUR career as a cyber security professional. • How can the ISSA created Cyber Security Career Lifecycle™ help?
  • 3. Tim Holman, CEO 2-sec • 20 plus years security experience in Cyber security including: – auditing – penetration testing – credit card security – ethical hacking – training – incident response • Awarded Microsoft MVP Security in 2004, 2005 and 2006 • Director of the ISSA International Board, Fellow of ISSA and Previous President of ISSA-UK
  • 4. What do I do all day!? • Work in a multi disciplinary team across the South of England. • Help many different types of UK businesses from SMEs to large conglomerates. • All market sectors, including retail, financial, professional services hospitality. • Penetration Testing, Audits and Assessments, PCI DSS, CISO, Physical Security and Training.
  • 5. What do I do all day!? • Most of my time is ADVISING existing and new clients. • Also responsible for projects including: – Security assessments including pen testing/physical – Card security – Auditing companies to gain industry compliance e.g. PCI DSS. – Incident Response Planning • Disaster management during data breaches. • Managing ISSA. • Each day is different.
  • 6. Highs and Lows of my Career Highs (or the good bits) • Recognition • Making a difference • Helping others • Defeating cyber crime Lows (or the bad bits) • Box tickers • Some vendors • Sales guys • Bootcamps
  • 7. Why are we successful? • Experience of our consultants who are KNOWN to be experts in their fields. • Experience in many different sectors. • Our commercial understanding. • We communicate well with our clients. • We provide simple, cost effective solutions in non technical language.
  • 8. Cyber Security as a Profession • Over 50 different career types within cyber security. • Reports of 300,000 and 1,000,000 current cybersecurity positions are vacant. • Demand is expected to rise as public, private and government sectors face unprecedented numbers of cybersecurity threats. • The lack of cybersecurity talent can be an organization's biggest vulnerability, exposing it to serious risk.
  • 9. Problems with the Profession • The Information Security profession has developed largely in reaction to threats. • Now we are paying the price with an enormous gap of skilled professionals and an entire “missing generation.” • No synergy around defining cyber security roles; e.g Network Security Analysis in USA may not have same responsibilities as those working for other countries.
  • 10. The profession has developed in REACTION to threats Somebody is trying to get in – stop them Somebody got in – find out what they did How do we stop somebody from getting in? Stop them at the border with firewalls, then with intrusion prevention/detection • General IT support staff (system managers, networks, operators, etc.) • Security Analysts • Network Security Engineers Locking down systems to prevent further damage and retrace the steps • General IT support staff (system managers, networks, operators, etc.) • Security Analyst • Network Security Engineers • Forensic Analysts • Cyber law enforcement • Cyber legal council Locking down systems and building the defense in layers • General IT support staff (system managers, networks, operators, etc.) • Security Analysts • Network Security Engineers • Forensic Analysts • Cyber law enforcement • Cyber legal council • Security Architects • GRC Specialists • Secure Code Developers
  • 11. There really IS a problem • Our reactive development has not allowed for: • Developing a professional career map. • Building what we need to be proactive. • “next generation”. • Well rounded skill sets. • Our industry has taken a knee jerk reaction: • Tremendous push by governments to fill the gap through formal education programs. • New training and education programs are popping up everywhere. • No collaboration between entities or countries. • No “voice” speaking for the profession/professional.
  • 12. The Cyber Security Career Lifecycle™ The CSCL is a systematic approach that: • Enables professionals to discover the areas of weakness. • Defines personalized career map. • Provides guidance, resources, and a support system to achieve skills and career goals. www.issa.org/cscl
  • 13. What is the CSCL? The CSCL is a systematic approach that: – Enables professionals to discover the areas of weakness in their skill sets and aptitudes. – Defines personalized career map according to the individuals knowledge, skills, aptitudes and interest. – Provides guidance, resources, and a support system to achieve skills and career goals.
  • 14. The Cyber Security Career Lifecycle™ Pre- Professional Entry Mid- Career Senior Leader
  • 15. Understand your career! Self -Assessment Knowledge, Skills, Aptitudes Career Mapping Personal Guidance
  • 16. Understand your career! Understand where you currently are in your career • Career Mapping • Self assessment using KSAs ISSA resources to strengthen & grow • Knowledge sharing • Formalized training • Networking • Mentoring Direct feedback for new services
  • 17. ISSA Career Progression Continues… • Focus on the “missing generation” • Meet-ups (virtual & in person) • Mentoring • Continuing support of all phases • Journal • Webcasts • International Conference/ CSCL Tracks • New service development using CSCL phases • International Consortium for Cyber Security Education and Professional Development (ICCE&PD)
  • 18. Thank you very much! STAND BH514 tim.holman@2-sec.com 0844 502 2066 @2_secure www.2-sec.com Any Questions?