SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Introduc)on	
  &	
  Chapter	
  Forma)on	
  
Status	
  Update	
  
The	
  New	
  Era	
  of	
  Cyber	
  Security	
  	
  
University	
  of	
  Piraeus	
  	
  
8/12/2014	
  
Kostas	
  Papadatos	
  
	
  President,	
  (ISC)2	
  Hellenic	
  Chapter	
  
MSc	
  Infosec,	
  CISSP-­‐ISSMP,	
  CISM,	
  ISO27001	
  LA,	
  PMP,	
  MBCI	
  	
  
University	
  of	
  Piraeus	
  
Department	
  of	
  Digital	
  Systems	
  
WELCOME!
(ISC)2	
  Hellenic	
  Chapter	
  	
  
Inaugural	
  Mee)ng	
  
The	
  New	
  Era	
  of	
  Cyber	
  Security	
  
•  Welcome	
  Note,	
  Socrates	
  Katsikas	
  
•  IntroducHon	
  &	
  Chapter	
  FormaHon	
  
Status	
  Update,	
  Kostas	
  Papadatos	
  	
  
•  Advanced	
  Persistent	
  Threats:	
  
AOack	
  &	
  Defense	
  Techniques,	
  
Christos	
  Ventouris	
  
•  MiHgaHng	
  a	
  Cyber	
  AOack,	
  Ioannis	
  
Kypraios	
  
•  Experience	
  from	
  recent	
  NaHonal	
  &	
  
InternaHonal	
  Cyber	
  Exercises,	
  
Christos	
  Xenakis	
  	
  
Agenda	
  
• (ISC)2	
  &	
  Cer)fica)on	
  Programs	
  
• (ISC)2	
  Founda)on	
  
• (ISC)2	
  Hellenic	
  Chapter	
  
About	
  (ISC)2	
  
• Achievements	
  
• Bylaws	
  Key	
  Issues	
  
• Our	
  Sponsors	
  
• Our	
  Constrains	
  
Hellenic	
  Chapter	
  Forma)on	
  Status	
  
Next	
  Ac)ons	
  
New	
  Cer)fica)on	
  Renewal	
  Requirements	
  
Agenda	
  
• (ISC)2	
  &	
  Cer)fica)on	
  Programs	
  
• (ISC)2	
  Founda)on	
  
• (ISC)2	
  Hellenic	
  Chapter	
  
About	
  (ISC)2	
  
• Achievements	
  
• Bylaws	
  Key	
  Issues	
  
• Our	
  Sponsors	
  
• Our	
  Constrains	
  
Hellenic	
  Chapter	
  Forma)on	
  Status	
  
Next	
  Ac)ons	
  
New	
  Cer)fica)on	
  Renewal	
  Requirements	
  
About	
  (ISC)2	
  
•  (ISC)2	
  =	
  InternaHonal	
  InformaHon	
  Systems	
  Security	
  
CerHficaHon	
  ConsorHum	
  
•  Established	
  in	
  1989	
  –	
  Non-­‐profit	
  consor)um	
  of	
  informa)on	
  
security	
  industry	
  leaders	
  	
  
•  Support	
  security	
  professionals	
  throughout	
  their	
  careers	
  	
  
•  Offered	
  the	
  first	
  informa)on	
  technology-­‐related	
  
creden)als	
  to	
  be	
  accredited	
  to	
  ANSI/ISO/IEC	
  Standard	
  
17024	
  	
  
•  Global	
  standard	
  for	
  informa)on	
  security	
  –	
  (ISC)2	
  CBK®,	
  a	
  
compendium	
  of	
  informa)on	
  security	
  topics	
  	
  
•  Over	
  100,000	
  cer)fied	
  professionals;	
  over	
  160	
  countries	
  	
  
Cer)fica)on	
  Programs	
  
Cer4fied	
  Informa4on	
  Systems	
  Security	
  Professional	
  (CISSP®)	
  
InformaHon	
  Systems	
  Security	
  Architecture	
  Professional	
  	
  
(CISSP-­‐ISSAP®)	
  
InformaHon	
  Systems	
  Security	
  Engineering	
  Professional	
  	
  
(CISSP-­‐ISSEP®)	
  
InformaHon	
  Systems	
  Security	
  Management	
  Professional	
  	
  
(CISSP-­‐ISSMP®)	
  
Cer4fied	
  Secure	
  So@ware	
  Lifecycle	
  Professional	
  (CSSLP®)	
  
Cer4fied	
  Cyber	
  Forensics	
  Professional	
  (CCFPSM)	
  
Cer4fied	
  Authoriza4on	
  Professional	
  (CAP®)	
  
HealthCare	
  Informa4on	
  Security	
  and	
  Privacy	
  Prac44oner	
  (HCISPPSM)	
  
Systems	
  Security	
  Cer4fied	
  Prac44oner	
  (SSCP®)	
  	
  
Career	
  Path	
  &	
  Cer)fica)ons	
  
About	
  (ISC)2	
  Founda)on	
  
•  Non-­‐profit	
  charity	
  formed	
  by	
  (ISC)²	
  in	
  2011	
  	
  
•  Its	
  members	
  reach	
  society	
  and	
  empower	
  
students,	
  teachers	
  and	
  the	
  general	
  public	
  to	
  
secure	
  their	
  online	
  life.	
  
•  Conducts	
  cyber	
  security	
  educa)on	
  and	
  
awareness	
  programs	
  in	
  the	
  community.	
  	
  
•  Altruis)c	
  programs	
  include:	
  
–  Safe	
  and	
  Secure	
  Online	
  
–  InformaHon	
  Security	
  Scholarship	
  Program	
  
–  Industry	
  Research	
  
(ISC)2	
  Chapter	
  Program	
  	
  
About	
  (ISC)2	
  Hellenic	
  Chapter	
  
•  Official	
  (ISC)2	
  Chapter	
  (Number:	
  128)	
  since	
  July	
  8,	
  2014	
  
•  Non-­‐Profit	
  Associa)on,	
  under	
  forma)on	
  
•  Provides	
  its	
  members	
  a	
  professional	
  network	
  in	
  
Greece	
  in	
  order	
  to:	
  
–  share	
  knowledge,	
  	
  
–  exchange	
  ideas	
  and	
  resources,	
  	
  
–  network	
  and	
  	
  
–  give	
  back	
  to	
  their	
  local	
  communi)es	
  
•  Our	
  members	
  consist	
  of	
  informa4on	
  security	
  
professionals	
  and	
  (ISC)²	
  creden4aled.	
  	
  
•  You	
  do	
  not	
  need	
  to	
  be	
  an	
  (ISC)²	
  member	
  to	
  join.	
  
Chapter	
  Program	
  benefits	
  	
  
•  Par)cipa)on	
  in	
  co-­‐sponsored	
  events	
  with	
  other	
  
industry	
  associa)ons	
  	
  
•  Ability	
  to	
  earn	
  con)nuing	
  professional	
  educa)on	
  (CPE)	
  
credits	
  by	
  par)cipa)ng	
  in	
  professional	
  ac)vi)es	
  
•  Engagement	
  in	
  leadership	
  opportuni)es,	
  such	
  as:	
  
–  Ac)ng	
  as	
  a	
  chapter	
  officer	
  
–  Speaking	
  at	
  chapter	
  mee)ngs	
  or	
  special	
  events	
  
•  Receiving	
  special	
  discounts	
  on	
  promo)onal	
  and	
  
educa)onal	
  products	
  and	
  events	
  
•  Assis)ng	
  (ISC)2	
  ini)a)ves	
  by	
  wri)ng	
  ar)cles	
  for	
  
publica)on	
  or	
  speaking	
  to	
  university	
  students	
  
•  Par)cipate	
  in	
  (ISC)2	
  altruis)c	
  programs	
  
Agenda	
  
• (ISC)2	
  &	
  Cer)fica)on	
  Programs	
  
• (ISC)2	
  Founda)on	
  
• (ISC)2	
  Hellenic	
  Chapter	
  
About	
  (ISC)2	
  
• Achievements	
  
• Bylaws	
  Key	
  Issues	
  
• Our	
  Sponsors	
  
• Our	
  Constrains	
  
Hellenic	
  Chapter	
  Forma)on	
  Status	
  
Next	
  Ac)ons	
  
New	
  Cer)fica)on	
  Renewal	
  Requirements	
  
Achievements	
  
•  Affilia)on	
  Agreement	
  &	
  Official	
  Chapter	
  Establishment	
  (July	
  8,	
  
2014)	
  
•  Bylaws	
  Development	
  (late	
  drag)	
  
•  (ISC)2	
  Hellenic	
  Chapter	
  Presence	
  
–  www.isc2-­‐chapter.gr	
  
–  mail@isc2-­‐chapter.gr	
  
–  Mailing	
  List	
  
–  hjps://www.linkedin.com/groups?gid=7463330	
  
•  Opera)ons’	
  Sponsorship	
  Program	
  
•  Media	
  Communica)ons	
  Campaign	
  
•  Presence	
  at	
  (ISC)2	
  Chapter	
  Leadership	
  Mee)ng	
  (London,	
  30	
  April	
  
2014)	
  
•  Inaugural	
  Mee)ng	
  
•  Ini)ated	
  Programs	
  
–  SSO	
  
–  Academic	
  Program	
  with	
  Greek	
  Universi)es	
  
Our	
  Opera)ons	
  Sponsors	
  
Hosting Provider Legal Advice Services Public Relations
ACE NET Hosting Filotheidis & Partners
Mina Zoulovits, Partner
RED.comm
www.ace-host.net www.phrlaw.gr www.red-comm.gr
NPO	
  Bylaws	
  Key	
  Issues	
  
•  Board	
  Members:	
  7	
  (4	
  officers	
  +	
  3)	
  
•  Elec)ons:	
  every	
  2	
  years	
  
•  Board	
  Members	
  Cap:	
  4	
  years	
  (1	
  year	
  break)	
  	
  
•  Internal	
  Audit	
  Commijee	
  
•  Membership	
  Types	
  
–  (ISC)2	
  Creden)aled	
  	
  
–  Non-­‐(ISC)2	
  Creden)aled	
  	
  
–  Student	
  
–  Honored	
  
•  Membership	
  Fees	
  
–  Standard:	
  30	
  euro	
  
–  Student:	
  10	
  euro	
  
•  Innova)ons	
  under	
  evalua)on	
  
–  Digital	
  Elec)ons	
  
–  Digital	
  Books	
  
–  Remote	
  Par)cipa)on	
  in	
  Management	
  Ac)vi)es	
  
Many	
  thanks	
  to	
  
Andreas	
  
Athanasoulias!	
  
Our	
  Constrains	
  
Budget	
  
•  Memberships	
  
•  Sponsors	
  
•  S)pend	
  
•  Conferences	
  
…	
  VAT	
  is	
  prerequisite	
  !	
  
Resources	
  -­‐	
  Volunteers	
  
•  Communica)ons	
  &	
  Social	
  Media	
  
•  Webmaster	
  
•  Events	
  Organiza)on	
  
•  Newslejer	
  
•  Educa)on	
  Programs	
  	
  
•  Community	
  Services	
  
–  SSO	
  (2	
  Lead	
  Volunteers	
  iden)fied)	
  
–  Mentorship	
  
•  Regional	
  Coordinators	
  
Agenda	
  
• (ISC)2	
  &	
  Cer)fica)on	
  Programs	
  
• (ISC)2	
  Founda)on	
  
• (ISC)2	
  Hellenic	
  Chapter	
  
About	
  (ISC)2	
  
• Achievements	
  
• Bylaws	
  Key	
  Issues	
  
• Our	
  Sponsors	
  
• Our	
  Constrains	
  
Hellenic	
  Chapter	
  Forma)on	
  Status	
  
Next	
  Ac)ons	
  
New	
  Cer)fica)on	
  Renewal	
  Requirements	
  
What’s	
  Next	
  
Establishment	
  of	
  NPO	
  legal	
  en)ty	
  
Bylaws	
  Final	
  Approval	
  by	
  Legal	
  
Advisor	
  
Signatories	
  (20	
  needed)	
  
Approval	
  by	
  Government	
  
Transla)on	
  in	
  English	
  
NPO	
  Elec)ons	
  (February	
  2015)	
  
Obtain	
  VAT	
  &	
  Bank	
  Account	
  
Generate	
  income	
  
(memberships,	
  sponsors,	
  
s)pend…)	
  
Volunteers	
  &	
  Other	
  Ac)vi)es	
  
SSO	
  
CISSP	
  Prepara)on	
  Workshop	
  
Program	
  
Student	
  Mentorship	
  Program	
  
Establish	
  Sponsorship	
  Program	
  
Chapter	
  Sponsors	
  
SSO	
  Sponsors	
  
Next	
  Chapter	
  Mee)ng	
  
(February	
  2015)	
  
Subject…	
  to	
  be	
  chosen	
  by	
  you!	
  	
  
Chapter	
  Support	
  for	
  Universi)es	
  
•  Mentorship	
  
–  Prepara)on	
  for	
  Industry	
  &	
  Guidance	
  
–  Par)cipa)on	
  in	
  Chapter	
  working	
  groups	
  
•  Reduce	
  (ISC)2	
  cer)fica)ons	
  cost	
  
•  Support	
  in	
  (ISC)2	
  cer)fica)ons	
  prepara)on	
  
•  Iden)fy	
  Scholarship	
  Opportuni)es	
  
•  Organize	
  Students	
  in	
  Parallel	
  Ac)vi)es	
  
•  Reduce	
  Educa)on	
  –	
  Workforce	
  Gap	
  
•  Par)cipa)on	
  in	
  Volunteer	
  Programs	
  
Agenda	
  
• (ISC)2	
  &	
  Cer)fica)on	
  Programs	
  
• (ISC)2	
  Founda)on	
  
• (ISC)2	
  Hellenic	
  Chapter	
  
About	
  (ISC)2	
  
• Achievements	
  
• Bylaws	
  Key	
  Issues	
  
• Our	
  Sponsors	
  
• Our	
  Constrains	
  
Hellenic	
  Chapter	
  Forma)on	
  Status	
  
Next	
  Ac)ons	
  
New	
  Cer)fica)on	
  Renewal	
  Requirements	
  
New	
  Cer)fica)on	
  Renewal	
  
Requirements	
  
Annual	
  CPE	
  requirements	
  will	
  be	
  evenly	
  
distributed	
  over	
  the	
  three	
  year	
  renewal	
  period.	
  	
  	
  
	
  
Ex.	
  	
  CISSPs	
  will	
  need	
  to	
  earn	
  40	
  CPEs	
  per	
  year	
  instead	
  of	
  20	
  
Total	
  number	
  of	
  CPEs	
  per	
  renewal	
  period	
  stays	
  the	
  same.	
  
	
  
Ex.	
  	
  CISSPs	
  will	
  need	
  to	
  earn	
  120	
  CPEs	
  
within	
  the	
  3	
  year	
  renewal	
  period	
  
	
  
New	
  Cer)fica)on	
  Renewal	
  
Requirements	
  
Requirements	
  effec4ve	
  as	
  of	
  January	
  1,	
  2015	
  or	
  at	
  
the	
  beginning	
  of	
  the	
  member’s	
  next	
  three	
  year	
  
cer4fica4on	
  cycle.	
  
Ex.	
  	
  CerHficaHon	
  expires	
  March	
  31,	
  2015,	
  	
  
the	
  new	
  requirements	
  will	
  apply	
  beginning	
  April	
  1,	
  2015	
  
	
  
90-­‐day	
  grace	
  period	
  available	
  to	
  earn	
  and	
  submit	
  CPEs	
  
the	
  first	
  two	
  years;	
  only	
  CPEs	
  earned	
  can	
  be	
  submi^ed	
  in	
  
the	
  grace	
  period	
  a@er	
  the	
  third	
  year.	
  
Ex.	
  	
  CerHficaHon	
  expires	
  March	
  31,	
  2015,	
  only	
  CPEs	
  	
  
earned	
  prior	
  to	
  this	
  date	
  can	
  be	
  submiOed	
  
New	
  Cer)fica)on	
  Renewal	
  
Requirements	
  
CPE	
  rollover	
  credits	
  are	
  now	
  limited	
  to	
  the	
  total	
  CPEs	
  
required	
  each	
  year.	
  	
  	
  
	
  
Ex.	
  	
  CISSPs	
  will	
  only	
  be	
  able	
  to	
  rollover	
  up	
  to	
  40	
  Group	
  A	
  credits	
  	
  
earned	
  in	
  the	
  last	
  6	
  months	
  of	
  the	
  3	
  year	
  cycle	
  
Associate	
  of	
  (ISC)²	
  yearly	
  CPE	
  requirement	
  has	
  
changed	
  to	
  15	
  CPEs	
  regardless	
  of	
  the	
  creden4al	
  
exam	
  that	
  was	
  passed.	
  
	
  
	
  Ex.	
  	
  Associate	
  of	
  (ISC)2	
  for	
  the	
  CISSP	
  will	
  need	
  to	
  	
  
earn	
  15	
  CPEs	
  instead	
  of	
  20	
  
	
  
Feel	
  free	
  to	
  contact	
  us	
  
	
  
info{at}isc2-­‐chapter.gr	
  
•  President:	
   	
   	
   	
  Kostas	
  Papadatos	
  
k.papadatos{at}isc2-­‐chapter.gr 	
  	
  
•  Treasurer:	
   	
   	
   	
  Christos	
  Ventouris	
  
cventouris{at}is2-­‐chapter.gr 	
  	
  
•  Secretary:	
   	
   	
   	
  Andreas	
  Koidis	
  
a.koidis{at}isc2-­‐chapter.gr	
   	
  	
  
•  Membership	
  Chair:	
   	
   	
  Alex	
  Belsis	
  
a.belsis{at}isc2-­‐chapter.gr 	
  	
  
Thank
You!

Más contenido relacionado

La actualidad más candente

How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Examkoidis
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityTonex
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
An introduction to the CISSP certification for self study groups
An introduction to the CISSP certification for self study groupsAn introduction to the CISSP certification for self study groups
An introduction to the CISSP certification for self study groupsTomas Ericsson
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...APNIC
 
Cybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentationCybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentationMonchai Phaichitchan
 
Ceh v11 all you need to know-converted
Ceh v11   all you need to know-convertedCeh v11   all you need to know-converted
Ceh v11 all you need to know-convertedredteamacademypromo
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)GTS Learning, Inc.
 
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkIGF Indonesia
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eumanelmedina
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systemsTonex
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Edureka!
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
Building an application security program
Building an application security programBuilding an application security program
Building an application security programOutpost24
 
ELIXIR and ELIXIR-UK training activities
ELIXIR and ELIXIR-UK training activitiesELIXIR and ELIXIR-UK training activities
ELIXIR and ELIXIR-UK training activitiesELIXIR UK
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseAdrian Mikeliunas
 

La actualidad más candente (20)

How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Exam
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
An introduction to the CISSP certification for self study groups
An introduction to the CISSP certification for self study groupsAn introduction to the CISSP certification for self study groups
An introduction to the CISSP certification for self study groups
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
 
Cybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentationCybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentation
 
Ceh v11 all you need to know-converted
Ceh v11   all you need to know-convertedCeh v11   all you need to know-converted
Ceh v11 all you need to know-converted
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)
 
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Building an application security program
Building an application security programBuilding an application security program
Building an application security program
 
CISSP Summary V1.1
CISSP Summary V1.1CISSP Summary V1.1
CISSP Summary V1.1
 
ELIXIR and ELIXIR-UK training activities
ELIXIR and ELIXIR-UK training activitiesELIXIR and ELIXIR-UK training activities
ELIXIR and ELIXIR-UK training activities
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy Course
 

Destacado

Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2isc2-hellenic
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentationisc2-hellenic
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1isc2-hellenic
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment isc2-hellenic
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attackisc2-hellenic
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosisc2-hellenic
 
General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0isc2-hellenic
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment isc2-hellenic
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewisc2-hellenic
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 

Destacado (13)

Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
 
Panoptis 2016
Panoptis 2016Panoptis 2016
Panoptis 2016
 
General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 

Similar a 2. Chapter introduction & update

ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...EOSC-hub project
 
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJam
Tech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJamTech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJam
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJamUS-Ignite
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPScott Baron
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Usaid project presentation
Usaid project presentationUsaid project presentation
Usaid project presentationSaif Qazzaz
 
tranSMART Community Meeting 5-7 Nov 13 - Session 4: tranSMART Foundation (tF)...
tranSMART Community Meeting 5-7 Nov 13 - Session 4: tranSMART Foundation (tF)...tranSMART Community Meeting 5-7 Nov 13 - Session 4: tranSMART Foundation (tF)...
tranSMART Community Meeting 5-7 Nov 13 - Session 4: tranSMART Foundation (tF)...David Peyruc
 
Code4Health, pop up uni, 2pm, 2 september 2015
Code4Health, pop up uni, 2pm, 2 september 2015Code4Health, pop up uni, 2pm, 2 september 2015
Code4Health, pop up uni, 2pm, 2 september 2015NHS England
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
Building Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & MetricsBuilding Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & MetricsRob Arnold
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...AVEVA
 
NRENs in the Dissemination of Innovative Low Cost Global Solutions: From Univ...
NRENs in the Dissemination of Innovative Low Cost Global Solutions: From Univ...NRENs in the Dissemination of Innovative Low Cost Global Solutions: From Univ...
NRENs in the Dissemination of Innovative Low Cost Global Solutions: From Univ...Daniela Brauner
 
Mit Portugal Road Show 27 05 2010
Mit Portugal Road Show   27 05 2010Mit Portugal Road Show   27 05 2010
Mit Portugal Road Show 27 05 2010mitportugal
 

Similar a 2. Chapter introduction & update (20)

ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
 
IEEE
IEEEIEEE
IEEE
 
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJam
Tech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJamTech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJam
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJam
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Usaid project presentation
Usaid project presentationUsaid project presentation
Usaid project presentation
 
tranSMART Community Meeting 5-7 Nov 13 - Session 4: tranSMART Foundation (tF)...
tranSMART Community Meeting 5-7 Nov 13 - Session 4: tranSMART Foundation (tF)...tranSMART Community Meeting 5-7 Nov 13 - Session 4: tranSMART Foundation (tF)...
tranSMART Community Meeting 5-7 Nov 13 - Session 4: tranSMART Foundation (tF)...
 
Nba msr
Nba msrNba msr
Nba msr
 
Code4Health, pop up uni, 2pm, 2 september 2015
Code4Health, pop up uni, 2pm, 2 september 2015Code4Health, pop up uni, 2pm, 2 september 2015
Code4Health, pop up uni, 2pm, 2 september 2015
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018
 
Building Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & MetricsBuilding Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & Metrics
 
NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
 
NRENs in the Dissemination of Innovative Low Cost Global Solutions: From Univ...
NRENs in the Dissemination of Innovative Low Cost Global Solutions: From Univ...NRENs in the Dissemination of Innovative Low Cost Global Solutions: From Univ...
NRENs in the Dissemination of Innovative Low Cost Global Solutions: From Univ...
 
Mit Portugal Road Show 27 05 2010
Mit Portugal Road Show   27 05 2010Mit Portugal Road Show   27 05 2010
Mit Portugal Road Show 27 05 2010
 
IUL MIT Competition
IUL MIT Competition IUL MIT Competition
IUL MIT Competition
 

Más de isc2-hellenic

Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpectedisc2-hellenic
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Teamisc2-hellenic
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOisc2-hellenic
 
Operation Grand Mars
Operation Grand MarsOperation Grand Mars
Operation Grand Marsisc2-hellenic
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentationisc2-hellenic
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapterisc2-hellenic
 

Más de isc2-hellenic (6)

Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpected
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Team
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Operation Grand Mars
Operation Grand MarsOperation Grand Mars
Operation Grand Mars
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

2. Chapter introduction & update

  • 1. Introduc)on  &  Chapter  Forma)on   Status  Update   The  New  Era  of  Cyber  Security     University  of  Piraeus     8/12/2014   Kostas  Papadatos    President,  (ISC)2  Hellenic  Chapter   MSc  Infosec,  CISSP-­‐ISSMP,  CISM,  ISO27001  LA,  PMP,  MBCI    
  • 2. University  of  Piraeus   Department  of  Digital  Systems  
  • 3. WELCOME! (ISC)2  Hellenic  Chapter     Inaugural  Mee)ng   The  New  Era  of  Cyber  Security   •  Welcome  Note,  Socrates  Katsikas   •  IntroducHon  &  Chapter  FormaHon   Status  Update,  Kostas  Papadatos     •  Advanced  Persistent  Threats:   AOack  &  Defense  Techniques,   Christos  Ventouris   •  MiHgaHng  a  Cyber  AOack,  Ioannis   Kypraios   •  Experience  from  recent  NaHonal  &   InternaHonal  Cyber  Exercises,   Christos  Xenakis    
  • 4. Agenda   • (ISC)2  &  Cer)fica)on  Programs   • (ISC)2  Founda)on   • (ISC)2  Hellenic  Chapter   About  (ISC)2   • Achievements   • Bylaws  Key  Issues   • Our  Sponsors   • Our  Constrains   Hellenic  Chapter  Forma)on  Status   Next  Ac)ons   New  Cer)fica)on  Renewal  Requirements  
  • 5. Agenda   • (ISC)2  &  Cer)fica)on  Programs   • (ISC)2  Founda)on   • (ISC)2  Hellenic  Chapter   About  (ISC)2   • Achievements   • Bylaws  Key  Issues   • Our  Sponsors   • Our  Constrains   Hellenic  Chapter  Forma)on  Status   Next  Ac)ons   New  Cer)fica)on  Renewal  Requirements  
  • 6. About  (ISC)2   •  (ISC)2  =  InternaHonal  InformaHon  Systems  Security   CerHficaHon  ConsorHum   •  Established  in  1989  –  Non-­‐profit  consor)um  of  informa)on   security  industry  leaders     •  Support  security  professionals  throughout  their  careers     •  Offered  the  first  informa)on  technology-­‐related   creden)als  to  be  accredited  to  ANSI/ISO/IEC  Standard   17024     •  Global  standard  for  informa)on  security  –  (ISC)2  CBK®,  a   compendium  of  informa)on  security  topics     •  Over  100,000  cer)fied  professionals;  over  160  countries    
  • 7. Cer)fica)on  Programs   Cer4fied  Informa4on  Systems  Security  Professional  (CISSP®)   InformaHon  Systems  Security  Architecture  Professional     (CISSP-­‐ISSAP®)   InformaHon  Systems  Security  Engineering  Professional     (CISSP-­‐ISSEP®)   InformaHon  Systems  Security  Management  Professional     (CISSP-­‐ISSMP®)   Cer4fied  Secure  So@ware  Lifecycle  Professional  (CSSLP®)   Cer4fied  Cyber  Forensics  Professional  (CCFPSM)   Cer4fied  Authoriza4on  Professional  (CAP®)   HealthCare  Informa4on  Security  and  Privacy  Prac44oner  (HCISPPSM)   Systems  Security  Cer4fied  Prac44oner  (SSCP®)    
  • 8. Career  Path  &  Cer)fica)ons  
  • 9. About  (ISC)2  Founda)on   •  Non-­‐profit  charity  formed  by  (ISC)²  in  2011     •  Its  members  reach  society  and  empower   students,  teachers  and  the  general  public  to   secure  their  online  life.   •  Conducts  cyber  security  educa)on  and   awareness  programs  in  the  community.     •  Altruis)c  programs  include:   –  Safe  and  Secure  Online   –  InformaHon  Security  Scholarship  Program   –  Industry  Research  
  • 11. About  (ISC)2  Hellenic  Chapter   •  Official  (ISC)2  Chapter  (Number:  128)  since  July  8,  2014   •  Non-­‐Profit  Associa)on,  under  forma)on   •  Provides  its  members  a  professional  network  in   Greece  in  order  to:   –  share  knowledge,     –  exchange  ideas  and  resources,     –  network  and     –  give  back  to  their  local  communi)es   •  Our  members  consist  of  informa4on  security   professionals  and  (ISC)²  creden4aled.     •  You  do  not  need  to  be  an  (ISC)²  member  to  join.  
  • 12. Chapter  Program  benefits     •  Par)cipa)on  in  co-­‐sponsored  events  with  other   industry  associa)ons     •  Ability  to  earn  con)nuing  professional  educa)on  (CPE)   credits  by  par)cipa)ng  in  professional  ac)vi)es   •  Engagement  in  leadership  opportuni)es,  such  as:   –  Ac)ng  as  a  chapter  officer   –  Speaking  at  chapter  mee)ngs  or  special  events   •  Receiving  special  discounts  on  promo)onal  and   educa)onal  products  and  events   •  Assis)ng  (ISC)2  ini)a)ves  by  wri)ng  ar)cles  for   publica)on  or  speaking  to  university  students   •  Par)cipate  in  (ISC)2  altruis)c  programs  
  • 13. Agenda   • (ISC)2  &  Cer)fica)on  Programs   • (ISC)2  Founda)on   • (ISC)2  Hellenic  Chapter   About  (ISC)2   • Achievements   • Bylaws  Key  Issues   • Our  Sponsors   • Our  Constrains   Hellenic  Chapter  Forma)on  Status   Next  Ac)ons   New  Cer)fica)on  Renewal  Requirements  
  • 14. Achievements   •  Affilia)on  Agreement  &  Official  Chapter  Establishment  (July  8,   2014)   •  Bylaws  Development  (late  drag)   •  (ISC)2  Hellenic  Chapter  Presence   –  www.isc2-­‐chapter.gr   –  mail@isc2-­‐chapter.gr   –  Mailing  List   –  hjps://www.linkedin.com/groups?gid=7463330   •  Opera)ons’  Sponsorship  Program   •  Media  Communica)ons  Campaign   •  Presence  at  (ISC)2  Chapter  Leadership  Mee)ng  (London,  30  April   2014)   •  Inaugural  Mee)ng   •  Ini)ated  Programs   –  SSO   –  Academic  Program  with  Greek  Universi)es  
  • 15. Our  Opera)ons  Sponsors   Hosting Provider Legal Advice Services Public Relations ACE NET Hosting Filotheidis & Partners Mina Zoulovits, Partner RED.comm www.ace-host.net www.phrlaw.gr www.red-comm.gr
  • 16. NPO  Bylaws  Key  Issues   •  Board  Members:  7  (4  officers  +  3)   •  Elec)ons:  every  2  years   •  Board  Members  Cap:  4  years  (1  year  break)     •  Internal  Audit  Commijee   •  Membership  Types   –  (ISC)2  Creden)aled     –  Non-­‐(ISC)2  Creden)aled     –  Student   –  Honored   •  Membership  Fees   –  Standard:  30  euro   –  Student:  10  euro   •  Innova)ons  under  evalua)on   –  Digital  Elec)ons   –  Digital  Books   –  Remote  Par)cipa)on  in  Management  Ac)vi)es   Many  thanks  to   Andreas   Athanasoulias!  
  • 17. Our  Constrains   Budget   •  Memberships   •  Sponsors   •  S)pend   •  Conferences   …  VAT  is  prerequisite  !   Resources  -­‐  Volunteers   •  Communica)ons  &  Social  Media   •  Webmaster   •  Events  Organiza)on   •  Newslejer   •  Educa)on  Programs     •  Community  Services   –  SSO  (2  Lead  Volunteers  iden)fied)   –  Mentorship   •  Regional  Coordinators  
  • 18. Agenda   • (ISC)2  &  Cer)fica)on  Programs   • (ISC)2  Founda)on   • (ISC)2  Hellenic  Chapter   About  (ISC)2   • Achievements   • Bylaws  Key  Issues   • Our  Sponsors   • Our  Constrains   Hellenic  Chapter  Forma)on  Status   Next  Ac)ons   New  Cer)fica)on  Renewal  Requirements  
  • 19. What’s  Next   Establishment  of  NPO  legal  en)ty   Bylaws  Final  Approval  by  Legal   Advisor   Signatories  (20  needed)   Approval  by  Government   Transla)on  in  English   NPO  Elec)ons  (February  2015)   Obtain  VAT  &  Bank  Account   Generate  income   (memberships,  sponsors,   s)pend…)   Volunteers  &  Other  Ac)vi)es   SSO   CISSP  Prepara)on  Workshop   Program   Student  Mentorship  Program   Establish  Sponsorship  Program   Chapter  Sponsors   SSO  Sponsors   Next  Chapter  Mee)ng   (February  2015)   Subject…  to  be  chosen  by  you!    
  • 20. Chapter  Support  for  Universi)es   •  Mentorship   –  Prepara)on  for  Industry  &  Guidance   –  Par)cipa)on  in  Chapter  working  groups   •  Reduce  (ISC)2  cer)fica)ons  cost   •  Support  in  (ISC)2  cer)fica)ons  prepara)on   •  Iden)fy  Scholarship  Opportuni)es   •  Organize  Students  in  Parallel  Ac)vi)es   •  Reduce  Educa)on  –  Workforce  Gap   •  Par)cipa)on  in  Volunteer  Programs  
  • 21. Agenda   • (ISC)2  &  Cer)fica)on  Programs   • (ISC)2  Founda)on   • (ISC)2  Hellenic  Chapter   About  (ISC)2   • Achievements   • Bylaws  Key  Issues   • Our  Sponsors   • Our  Constrains   Hellenic  Chapter  Forma)on  Status   Next  Ac)ons   New  Cer)fica)on  Renewal  Requirements  
  • 22. New  Cer)fica)on  Renewal   Requirements   Annual  CPE  requirements  will  be  evenly   distributed  over  the  three  year  renewal  period.         Ex.    CISSPs  will  need  to  earn  40  CPEs  per  year  instead  of  20   Total  number  of  CPEs  per  renewal  period  stays  the  same.     Ex.    CISSPs  will  need  to  earn  120  CPEs   within  the  3  year  renewal  period    
  • 23. New  Cer)fica)on  Renewal   Requirements   Requirements  effec4ve  as  of  January  1,  2015  or  at   the  beginning  of  the  member’s  next  three  year   cer4fica4on  cycle.   Ex.    CerHficaHon  expires  March  31,  2015,     the  new  requirements  will  apply  beginning  April  1,  2015     90-­‐day  grace  period  available  to  earn  and  submit  CPEs   the  first  two  years;  only  CPEs  earned  can  be  submi^ed  in   the  grace  period  a@er  the  third  year.   Ex.    CerHficaHon  expires  March  31,  2015,  only  CPEs     earned  prior  to  this  date  can  be  submiOed  
  • 24. New  Cer)fica)on  Renewal   Requirements   CPE  rollover  credits  are  now  limited  to  the  total  CPEs   required  each  year.         Ex.    CISSPs  will  only  be  able  to  rollover  up  to  40  Group  A  credits     earned  in  the  last  6  months  of  the  3  year  cycle   Associate  of  (ISC)²  yearly  CPE  requirement  has   changed  to  15  CPEs  regardless  of  the  creden4al   exam  that  was  passed.      Ex.    Associate  of  (ISC)2  for  the  CISSP  will  need  to     earn  15  CPEs  instead  of  20    
  • 25. Feel  free  to  contact  us     info{at}isc2-­‐chapter.gr   •  President:        Kostas  Papadatos   k.papadatos{at}isc2-­‐chapter.gr     •  Treasurer:        Christos  Ventouris   cventouris{at}is2-­‐chapter.gr     •  Secretary:        Andreas  Koidis   a.koidis{at}isc2-­‐chapter.gr       •  Membership  Chair:      Alex  Belsis   a.belsis{at}isc2-­‐chapter.gr