SlideShare a Scribd company logo
1 of 18
A Day in the Life of a Cyber
Security Professional
Tim Holman, CEO of 2-sec
18th June 2015
Focus on:
• Typical day to day activities as CEO of 2-sec.
• The highlights (and lowlights) of my cyber
security career.
• How to develop YOUR career as a cyber security
professional.
• How can the ISSA created Cyber Security Career
Lifecycle™ help?
Tim Holman, CEO 2-sec
• 20 plus years security experience in Cyber security
including:
– auditing
– penetration testing
– credit card security
– ethical hacking
– training
– incident response
• Awarded Microsoft MVP Security in 2004, 2005 and 2006
• Director of the ISSA International Board, Fellow of ISSA
and Previous President of ISSA-UK
What do I do all day!?
• Work in a multi disciplinary team across the South
of England.
• Help many different types of UK businesses from
SMEs to large conglomerates.
• All market sectors, including retail, financial,
professional services hospitality.
• Penetration Testing, Audits and Assessments, PCI
DSS, CISO, Physical Security and Training.
What do I do all day!?
• Most of my time is ADVISING existing and new clients.
• Also responsible for projects including:
– Security assessments including pen testing/physical
– Card security
– Auditing companies to gain industry compliance e.g. PCI
DSS.
– Incident Response Planning
• Disaster management during data breaches.
• Managing ISSA.
• Each day is different.
Highs and Lows of my Career
Highs (or the good bits)
• Recognition
• Making a difference
• Helping others
• Defeating cyber
crime
Lows (or the bad bits)
• Box tickers
• Some vendors
• Sales guys
• Bootcamps
Why are we successful?
• Experience of our consultants who are
KNOWN to be experts in their fields.
• Experience in many different sectors.
• Our commercial understanding.
• We communicate well with our clients.
• We provide simple, cost effective solutions
in non technical language.
Cyber Security as a Profession
• Over 50 different career types within cyber
security.
• Reports of 300,000 and 1,000,000 current
cybersecurity positions are vacant.
• Demand is expected to rise as public, private and
government sectors face unprecedented numbers
of cybersecurity threats.
• The lack of cybersecurity talent can be an
organization's biggest vulnerability, exposing it to
serious risk.
Problems with the Profession
• The Information Security profession has
developed largely in reaction to threats.
• Now we are paying the price with an enormous
gap of skilled professionals and an entire “missing
generation.”
• No synergy around defining cyber security roles;
e.g Network Security Analysis in USA may not
have same responsibilities as those working for
other countries.
The profession has developed in
REACTION to threats
Somebody is trying to
get in – stop them
Somebody got in – find
out what they did
How do we stop somebody
from getting in?
Stop them at the border with
firewalls, then with intrusion
prevention/detection
• General IT support staff
(system managers, networks,
operators, etc.)
• Security Analysts
• Network Security Engineers
Locking down systems to
prevent further damage and
retrace the steps
• General IT support staff
(system managers, networks,
operators, etc.)
• Security Analyst
• Network Security Engineers
• Forensic Analysts
• Cyber law enforcement
• Cyber legal council
Locking down systems and
building the defense in layers
• General IT support staff
(system managers, networks,
operators, etc.)
• Security Analysts
• Network Security Engineers
• Forensic Analysts
• Cyber law enforcement
• Cyber legal council
• Security Architects
• GRC Specialists
• Secure Code Developers
There really IS a problem
• Our reactive development has not allowed for:
• Developing a professional career map.
• Building what we need to be proactive.
• “next generation”.
• Well rounded skill sets.
• Our industry has taken a knee jerk reaction:
• Tremendous push by governments to fill the gap through
formal education programs.
• New training and education programs are popping up
everywhere.
• No collaboration between entities or countries.
• No “voice” speaking for the profession/professional.
The Cyber Security Career Lifecycle™
The CSCL is a systematic approach that:
• Enables professionals to discover the areas of
weakness.
• Defines personalized career map.
• Provides guidance, resources, and a support
system to achieve skills and career goals.
www.issa.org/cscl
What is the CSCL?
The CSCL is a systematic approach that:
– Enables professionals to discover the areas of
weakness in their skill sets and aptitudes.
– Defines personalized career map according to the
individuals knowledge, skills, aptitudes and interest.
– Provides guidance, resources, and a support system
to achieve skills and career goals.
The Cyber Security Career Lifecycle™
Pre-
Professional
Entry
Mid-
Career
Senior
Leader
Understand your career!
Self -Assessment
Knowledge, Skills, Aptitudes
Career Mapping
Personal
Guidance
Understand your career!
Understand where you currently are in your career
• Career Mapping
• Self assessment using KSAs
ISSA resources to strengthen & grow
• Knowledge sharing
• Formalized training
• Networking
• Mentoring
Direct feedback for new services
ISSA Career Progression Continues…
• Focus on the “missing generation”
• Meet-ups (virtual & in person)
• Mentoring
• Continuing support of all phases
• Journal
• Webcasts
• International Conference/ CSCL Tracks
• New service development using CSCL phases
• International Consortium for Cyber Security Education
and Professional Development (ICCE&PD)
Thank you very much!
STAND BH514
tim.holman@2-sec.com
0844 502 2066
@2_secure
www.2-sec.com
Any Questions?

More Related Content

Viewers also liked

Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]Albert Kenyani Inima
 
High School Diploma_Pavel Mishev
High School Diploma_Pavel MishevHigh School Diploma_Pavel Mishev
High School Diploma_Pavel MishevPavel Mishev
 
Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016Emily Miketinac
 
McKinsey Slides Examples
McKinsey Slides ExamplesMcKinsey Slides Examples
McKinsey Slides ExamplesLewis Lin 🦊
 
IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015Mary Minicka
 

Viewers also liked (7)

Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]
 
Contabilidad
ContabilidadContabilidad
Contabilidad
 
High School Diploma_Pavel Mishev
High School Diploma_Pavel MishevHigh School Diploma_Pavel Mishev
High School Diploma_Pavel Mishev
 
Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016
 
McKinsey Slides Examples
McKinsey Slides ExamplesMcKinsey Slides Examples
McKinsey Slides Examples
 
Ruc y rise
Ruc y riseRuc y rise
Ruc y rise
 
IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015
 

Similar to 2-sec "A Day in the Life of a Cyber Security Professional" Interop London June 2015

2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class OneFRSecure
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?PECB
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1FRSecure
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureSecurity Innovation
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1FRSecure
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small BusinessArt Ocain
 
Cyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San AntonioCyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San AntonioClearedJobs.Net
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018 David Germain
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueMurray Security Services
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptxBoni Yeamin
 

Similar to 2-sec "A Day in the Life of a Cyber Security Professional" Interop London June 2015 (20)

2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
How To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk Analyst
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
Cyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San AntonioCyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

2-sec "A Day in the Life of a Cyber Security Professional" Interop London June 2015

  • 1. A Day in the Life of a Cyber Security Professional Tim Holman, CEO of 2-sec 18th June 2015
  • 2. Focus on: • Typical day to day activities as CEO of 2-sec. • The highlights (and lowlights) of my cyber security career. • How to develop YOUR career as a cyber security professional. • How can the ISSA created Cyber Security Career Lifecycle™ help?
  • 3. Tim Holman, CEO 2-sec • 20 plus years security experience in Cyber security including: – auditing – penetration testing – credit card security – ethical hacking – training – incident response • Awarded Microsoft MVP Security in 2004, 2005 and 2006 • Director of the ISSA International Board, Fellow of ISSA and Previous President of ISSA-UK
  • 4. What do I do all day!? • Work in a multi disciplinary team across the South of England. • Help many different types of UK businesses from SMEs to large conglomerates. • All market sectors, including retail, financial, professional services hospitality. • Penetration Testing, Audits and Assessments, PCI DSS, CISO, Physical Security and Training.
  • 5. What do I do all day!? • Most of my time is ADVISING existing and new clients. • Also responsible for projects including: – Security assessments including pen testing/physical – Card security – Auditing companies to gain industry compliance e.g. PCI DSS. – Incident Response Planning • Disaster management during data breaches. • Managing ISSA. • Each day is different.
  • 6. Highs and Lows of my Career Highs (or the good bits) • Recognition • Making a difference • Helping others • Defeating cyber crime Lows (or the bad bits) • Box tickers • Some vendors • Sales guys • Bootcamps
  • 7. Why are we successful? • Experience of our consultants who are KNOWN to be experts in their fields. • Experience in many different sectors. • Our commercial understanding. • We communicate well with our clients. • We provide simple, cost effective solutions in non technical language.
  • 8. Cyber Security as a Profession • Over 50 different career types within cyber security. • Reports of 300,000 and 1,000,000 current cybersecurity positions are vacant. • Demand is expected to rise as public, private and government sectors face unprecedented numbers of cybersecurity threats. • The lack of cybersecurity talent can be an organization's biggest vulnerability, exposing it to serious risk.
  • 9. Problems with the Profession • The Information Security profession has developed largely in reaction to threats. • Now we are paying the price with an enormous gap of skilled professionals and an entire “missing generation.” • No synergy around defining cyber security roles; e.g Network Security Analysis in USA may not have same responsibilities as those working for other countries.
  • 10. The profession has developed in REACTION to threats Somebody is trying to get in – stop them Somebody got in – find out what they did How do we stop somebody from getting in? Stop them at the border with firewalls, then with intrusion prevention/detection • General IT support staff (system managers, networks, operators, etc.) • Security Analysts • Network Security Engineers Locking down systems to prevent further damage and retrace the steps • General IT support staff (system managers, networks, operators, etc.) • Security Analyst • Network Security Engineers • Forensic Analysts • Cyber law enforcement • Cyber legal council Locking down systems and building the defense in layers • General IT support staff (system managers, networks, operators, etc.) • Security Analysts • Network Security Engineers • Forensic Analysts • Cyber law enforcement • Cyber legal council • Security Architects • GRC Specialists • Secure Code Developers
  • 11. There really IS a problem • Our reactive development has not allowed for: • Developing a professional career map. • Building what we need to be proactive. • “next generation”. • Well rounded skill sets. • Our industry has taken a knee jerk reaction: • Tremendous push by governments to fill the gap through formal education programs. • New training and education programs are popping up everywhere. • No collaboration between entities or countries. • No “voice” speaking for the profession/professional.
  • 12. The Cyber Security Career Lifecycle™ The CSCL is a systematic approach that: • Enables professionals to discover the areas of weakness. • Defines personalized career map. • Provides guidance, resources, and a support system to achieve skills and career goals. www.issa.org/cscl
  • 13. What is the CSCL? The CSCL is a systematic approach that: – Enables professionals to discover the areas of weakness in their skill sets and aptitudes. – Defines personalized career map according to the individuals knowledge, skills, aptitudes and interest. – Provides guidance, resources, and a support system to achieve skills and career goals.
  • 14. The Cyber Security Career Lifecycle™ Pre- Professional Entry Mid- Career Senior Leader
  • 15. Understand your career! Self -Assessment Knowledge, Skills, Aptitudes Career Mapping Personal Guidance
  • 16. Understand your career! Understand where you currently are in your career • Career Mapping • Self assessment using KSAs ISSA resources to strengthen & grow • Knowledge sharing • Formalized training • Networking • Mentoring Direct feedback for new services
  • 17. ISSA Career Progression Continues… • Focus on the “missing generation” • Meet-ups (virtual & in person) • Mentoring • Continuing support of all phases • Journal • Webcasts • International Conference/ CSCL Tracks • New service development using CSCL phases • International Consortium for Cyber Security Education and Professional Development (ICCE&PD)
  • 18. Thank you very much! STAND BH514 tim.holman@2-sec.com 0844 502 2066 @2_secure www.2-sec.com Any Questions?