SlideShare ist ein Scribd-Unternehmen logo
1 von 19
THE FUTURE
OF WORK
– Joe Speicher and Tracie Neuhaus
“This ‘skills gap’ is a challenge for
everyone—and it’s likely to worsen as
cognitive technologies and automation
become more widespread.”
3,500,000+
Unfilled Cybersecurity Jobs
THE COMPETENCY GAP
Many job seekers in the
cybersecurity field fall short of
the standard of competence that
employers demand of their
cybersecurity professionals.
“
”
CYBERSECURITY
COMPETENCIES
Tier 1
Personal Effectiveness
Competencies
M E R C I !
T H A N K Y O U !
QUESTIONS ?

Weitere ähnliche Inhalte

Mehr von EyesOpen Association

Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...EyesOpen Association
 
Approche de sécurisation des identités: Cas de Active Directory
Approche de sécurisation des identités: Cas de Active DirectoryApproche de sécurisation des identités: Cas de Active Directory
Approche de sécurisation des identités: Cas de Active DirectoryEyesOpen Association
 
Cyber threat intelligence avec Open CTI
Cyber threat intelligence avec Open CTI Cyber threat intelligence avec Open CTI
Cyber threat intelligence avec Open CTI EyesOpen Association
 
Le rôle de la sensibilisation et de la formation à la cybersécurité
Le rôle de la sensibilisation et de la formation à la cybersécuritéLe rôle de la sensibilisation et de la formation à la cybersécurité
Le rôle de la sensibilisation et de la formation à la cybersécuritéEyesOpen Association
 
Cyber psychology: Understand your cyber security mental health culture
Cyber psychology: Understand your cyber security mental health culture Cyber psychology: Understand your cyber security mental health culture
Cyber psychology: Understand your cyber security mental health culture EyesOpen Association
 
La sécurité des API: Quand les mauvais élèves entrent en piste.
La sécurité des API: Quand les mauvais élèves entrent en piste.La sécurité des API: Quand les mauvais élèves entrent en piste.
La sécurité des API: Quand les mauvais élèves entrent en piste.EyesOpen Association
 
Programme de cybersécurité : Implementer le framework NIST CSF en entreprise
Programme de cybersécurité : Implementer le framework NIST CSF en entrepriseProgramme de cybersécurité : Implementer le framework NIST CSF en entreprise
Programme de cybersécurité : Implementer le framework NIST CSF en entrepriseEyesOpen Association
 
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique EyesOpen Association
 
Report: Digital Transformation and Application Security Posture in West and C...
Report: Digital Transformation and Application Security Posture in West and C...Report: Digital Transformation and Application Security Posture in West and C...
Report: Digital Transformation and Application Security Posture in West and C...EyesOpen Association
 
Effective Information Security Risk and Controls Management
Effective Information Security Risk and Controls Management Effective Information Security Risk and Controls Management
Effective Information Security Risk and Controls Management EyesOpen Association
 
Cybersecurity in Mergers and Acquisitions (M&A)
Cybersecurity in Mergers and Acquisitions (M&A) Cybersecurity in Mergers and Acquisitions (M&A)
Cybersecurity in Mergers and Acquisitions (M&A) EyesOpen Association
 
The evolving shape of Cybersecurity landscape in Africa
The evolving shape of Cybersecurity landscape in Africa The evolving shape of Cybersecurity landscape in Africa
The evolving shape of Cybersecurity landscape in Africa EyesOpen Association
 
L'Art du threat Modeling : Modéliser les menaces informatiques avec la méthod...
L'Art du threat Modeling : Modéliser les menaces informatiques avec la méthod...L'Art du threat Modeling : Modéliser les menaces informatiques avec la méthod...
L'Art du threat Modeling : Modéliser les menaces informatiques avec la méthod...EyesOpen Association
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationEyesOpen Association
 
Management des vulnérabilités - Greenbone OpenVas
Management des vulnérabilités - Greenbone OpenVasManagement des vulnérabilités - Greenbone OpenVas
Management des vulnérabilités - Greenbone OpenVasEyesOpen Association
 
Cyber attaques APT avec le framework MITRE ATT&CK
Cyber attaques APT avec le framework MITRE ATT&CKCyber attaques APT avec le framework MITRE ATT&CK
Cyber attaques APT avec le framework MITRE ATT&CKEyesOpen Association
 

Mehr von EyesOpen Association (17)

Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...
 
Approche de sécurisation des identités: Cas de Active Directory
Approche de sécurisation des identités: Cas de Active DirectoryApproche de sécurisation des identités: Cas de Active Directory
Approche de sécurisation des identités: Cas de Active Directory
 
Cyber threat intelligence avec Open CTI
Cyber threat intelligence avec Open CTI Cyber threat intelligence avec Open CTI
Cyber threat intelligence avec Open CTI
 
Le rôle de la sensibilisation et de la formation à la cybersécurité
Le rôle de la sensibilisation et de la formation à la cybersécuritéLe rôle de la sensibilisation et de la formation à la cybersécurité
Le rôle de la sensibilisation et de la formation à la cybersécurité
 
Cyber psychology: Understand your cyber security mental health culture
Cyber psychology: Understand your cyber security mental health culture Cyber psychology: Understand your cyber security mental health culture
Cyber psychology: Understand your cyber security mental health culture
 
La sécurité des API: Quand les mauvais élèves entrent en piste.
La sécurité des API: Quand les mauvais élèves entrent en piste.La sécurité des API: Quand les mauvais élèves entrent en piste.
La sécurité des API: Quand les mauvais élèves entrent en piste.
 
Programme de cybersécurité : Implementer le framework NIST CSF en entreprise
Programme de cybersécurité : Implementer le framework NIST CSF en entrepriseProgramme de cybersécurité : Implementer le framework NIST CSF en entreprise
Programme de cybersécurité : Implementer le framework NIST CSF en entreprise
 
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
 
Report: Digital Transformation and Application Security Posture in West and C...
Report: Digital Transformation and Application Security Posture in West and C...Report: Digital Transformation and Application Security Posture in West and C...
Report: Digital Transformation and Application Security Posture in West and C...
 
Effective Information Security Risk and Controls Management
Effective Information Security Risk and Controls Management Effective Information Security Risk and Controls Management
Effective Information Security Risk and Controls Management
 
Cybersecurity in Mergers and Acquisitions (M&A)
Cybersecurity in Mergers and Acquisitions (M&A) Cybersecurity in Mergers and Acquisitions (M&A)
Cybersecurity in Mergers and Acquisitions (M&A)
 
The evolving shape of Cybersecurity landscape in Africa
The evolving shape of Cybersecurity landscape in Africa The evolving shape of Cybersecurity landscape in Africa
The evolving shape of Cybersecurity landscape in Africa
 
L'Art du threat Modeling : Modéliser les menaces informatiques avec la méthod...
L'Art du threat Modeling : Modéliser les menaces informatiques avec la méthod...L'Art du threat Modeling : Modéliser les menaces informatiques avec la méthod...
L'Art du threat Modeling : Modéliser les menaces informatiques avec la méthod...
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your Organization
 
Management des vulnérabilités - Greenbone OpenVas
Management des vulnérabilités - Greenbone OpenVasManagement des vulnérabilités - Greenbone OpenVas
Management des vulnérabilités - Greenbone OpenVas
 
Cyber attaques APT avec le framework MITRE ATT&CK
Cyber attaques APT avec le framework MITRE ATT&CKCyber attaques APT avec le framework MITRE ATT&CK
Cyber attaques APT avec le framework MITRE ATT&CK
 

Kürzlich hochgeladen

Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdfThe Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdfJasper Colin
 
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)twfkn8xj
 
Top 10 scenario-based questions for hiring a Team Leader
Top 10 scenario-based questions for hiring a Team LeaderTop 10 scenario-based questions for hiring a Team Leader
Top 10 scenario-based questions for hiring a Team LeaderHireQuotient
 
Recruitment & Selection Theory Models that Work for the Modern Workplace
Recruitment & Selection Theory Models that Work for the Modern WorkplaceRecruitment & Selection Theory Models that Work for the Modern Workplace
Recruitment & Selection Theory Models that Work for the Modern WorkplaceHireQuotient
 
Intern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfIntern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfmarketing659039
 
A Proven #1 Prospecting Hack You're Missing Out On
A Proven #1 Prospecting Hack You're Missing Out OnA Proven #1 Prospecting Hack You're Missing Out On
A Proven #1 Prospecting Hack You're Missing Out Onfross37
 
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?hxwwranl
 
Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...Sabuj Ahmed
 
15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdf15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdfAlex Vate
 
The Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureThe Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureAggregage
 
7 non-negotiable roles of Human Resource Management
7 non-negotiable roles of Human Resource Management7 non-negotiable roles of Human Resource Management
7 non-negotiable roles of Human Resource ManagementHireQuotient
 
Top HR Intern Interview Questions to Ask and Their Ideal Answers
Top HR Intern Interview Questions to Ask and Their Ideal AnswersTop HR Intern Interview Questions to Ask and Their Ideal Answers
Top HR Intern Interview Questions to Ask and Their Ideal AnswersHireQuotient
 
Webinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary DataWebinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary DataPayScale, Inc.
 
Webinar - Q2 2024: What’s New in MarketPay
Webinar - Q2 2024: What’s New in MarketPayWebinar - Q2 2024: What’s New in MarketPay
Webinar - Q2 2024: What’s New in MarketPayPayScale, Inc.
 
Public Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & CompanyPublic Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & CompanyPhiferCompany
 

Kürzlich hochgeladen (18)

Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdfThe Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
 
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
 
Top 10 scenario-based questions for hiring a Team Leader
Top 10 scenario-based questions for hiring a Team LeaderTop 10 scenario-based questions for hiring a Team Leader
Top 10 scenario-based questions for hiring a Team Leader
 
Recruitment & Selection Theory Models that Work for the Modern Workplace
Recruitment & Selection Theory Models that Work for the Modern WorkplaceRecruitment & Selection Theory Models that Work for the Modern Workplace
Recruitment & Selection Theory Models that Work for the Modern Workplace
 
Intern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfIntern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdf
 
A Proven #1 Prospecting Hack You're Missing Out On
A Proven #1 Prospecting Hack You're Missing Out OnA Proven #1 Prospecting Hack You're Missing Out On
A Proven #1 Prospecting Hack You're Missing Out On
 
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
 
Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...
 
15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdf15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdf
 
The Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureThe Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance Culture
 
7 non-negotiable roles of Human Resource Management
7 non-negotiable roles of Human Resource Management7 non-negotiable roles of Human Resource Management
7 non-negotiable roles of Human Resource Management
 
Top HR Intern Interview Questions to Ask and Their Ideal Answers
Top HR Intern Interview Questions to Ask and Their Ideal AnswersTop HR Intern Interview Questions to Ask and Their Ideal Answers
Top HR Intern Interview Questions to Ask and Their Ideal Answers
 
Call Girls in Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in  Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in  Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
Hot Sexy call girls in Preet Vihar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Preet Vihar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Preet Vihar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Preet Vihar🔝 9953056974 🔝 Delhi escort Service
 
Webinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary DataWebinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary Data
 
Webinar - Q2 2024: What’s New in MarketPay
Webinar - Q2 2024: What’s New in MarketPayWebinar - Q2 2024: What’s New in MarketPay
Webinar - Q2 2024: What’s New in MarketPay
 
Public Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & CompanyPublic Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & Company
 

Cybersecurity Competencies and the Future of Work