CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER...
Transcript of CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER...
![Page 1: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/1.jpg)
CREATING THE NEXT GENERATION CYBER PROFESSIONALS
BEST PRACTICES & LESSONS LEARNED
Prem JadhwaniPresident & CEOIntellectual Point
[email protected] 4, 2017
![Page 2: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/2.jpg)
Agenda
About Intellectual Point
Today’s Cyber Threat Landscape
Shortage of Cyber Security Skills
Tools, Best Practices and Skills for building Next-Gen Cyber Security Workforce.
Success Stories
![Page 3: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/3.jpg)
About Intellectual Point
• Workforce Development
• IT Training & Certification
• Authorized Testing Center
• Job Placement & Staff Augmentation
• Cyber Security Consulting
• Risk Assessment & Compliance
Intellectual Point is a Global InformationTechnology, Training, Consulting and SoftwareDevelopment Company. Intellectual Pointprovides professional hands-on computer andIT training and consulting to prepare you withthe skills and knowledge needed for today’scompetitive job market.
![Page 4: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/4.jpg)
Partnerships & Contracts
![Page 5: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/5.jpg)
ABOUT ME• CEO & Founder – Intellectual Point (IP) – IT Training
and Workforce Development & Consulting• CTO – Government Acquisitions Inc. (GAI) – IT
Solutions Provider to the Federal Government• 20+ years in IT Industry in various capacities• BS & MS (Computer Science), IIT, Chicago• MBA (Marketing and Strategy), IIT, Chicago• Completed Coursework in Ph.D. (Information
Assurance & Cyber Security), George Mason University (GMU)
• Hold 100+ certifications and advanced credentials including Security+, CISSP, CEH, CISM, CCNA, VCP, AWS, CCNP.
• Served as a Commissioner of the TechAmericaCommission for Big Data Analytics and Cloud Computing
• Speaker at reputable conferences and industry tradeshows and author of many publications.
PREM JADHWANICEO & PRESIDENT
[email protected]: 703-554-3827
![Page 6: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/6.jpg)
STATE OF THE CYBER SECURITY LANDSCAPE
MARKET SURVEY
![Page 7: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/7.jpg)
New Threat Landscape and Advanced Targeted Attacks
• Malware has gone beyond most existing signature based security controls
• Organizations largely unaware of the problem
• They are actively and silently sending data out the door
• We MUST change our strategy to match the problem
• Random Attack:
• Viruses / Worms
• Port Scans
• Phishing
• Targeted Attack:
• Denial of service
• Theft of service
• Information theft
• IP theft
• Ransomware
![Page 8: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/8.jpg)
Traditional Defenses Don’t Work
8
• The new breed of attacks evade signature-based defenses
![Page 9: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/9.jpg)
The Future of Security
Past Present Future
AV Hips / Anti-Exploitation
Sandboxing Isolation EDR AI
Specialized Humans NeededPost-Execution
Highly skilled Humans + Machine IntelligencePre-Execution
Humans Needed
![Page 10: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/10.jpg)
New Mindset for Information Security
• Old Mindset
• Signatures
• Point solutions
• Fixed perimeters
• Ownership = trust
• Security “Boxes”
• Security solution silos
• Manual policy config
• Block and prevent
• Incident response
• Protect devices / networks
• New Realities
• Algorithms
• Platforms that correlate and share
• Adaptive perimeters
• Repudiation services
• Security software, some in HW
• Security as an adaptive system
• Security automation
• Detect and Respond
• Continuous response
• Protect information
![Page 11: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/11.jpg)
Security Technologies and Skills Spectrum
Fundamentals Lean ForwardAdvanced Technology
SEIM
Mobile Device Security
App White/Black Listing
Next Gen Firewall
NAC
Endpoint protection
Network Segmentation
Firewall/IPS
Secure Web Gtw
Network Traffic Analysis
Payload Analysis
Forensics
Endpoint Threat
Detection Response
High Trust User Auth
ProcessVulnerability Management Privilege Management
Incident ResponseChange Control
![Page 12: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/12.jpg)
SHORTAGE OF CYBER SECURITY SKILLS
MARKET SURVEY
![Page 13: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/13.jpg)
![Page 14: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/14.jpg)
![Page 15: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/15.jpg)
![Page 16: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/16.jpg)
![Page 17: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/17.jpg)
![Page 18: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/18.jpg)
Various Cyber Job Roles within the SOC
![Page 19: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/19.jpg)
![Page 20: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/20.jpg)
![Page 21: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/21.jpg)
Roadmap from Entry Level to Mid Level Cyber Jobs (Cyberseek.org)
![Page 22: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/22.jpg)
Mapping Job Roles to NIST NICE Cybersecurity Workforce Framework (SP 800-181)
(7 Categories, 33 Specialty Areas, 52 Work Roles)
![Page 23: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/23.jpg)
TOOLS, SKILLS & BEST PRACTICES TO CREATE NEXT GEN CYBER SECURITY PROFESSIONALS
BASED ON INTELLECTUAL POINT EXPERIENCES
![Page 24: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/24.jpg)
Essential Skills for Next Gen SOC Analyst
![Page 25: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/25.jpg)
Essential Skills for Next Gen Cyber Security Professional (NEXT GEN CYBER WARRIORS)
BUSINESS SKILLS, COMMUNICATION SKILLS, REPORT WRITING SKILLS, ANALYTICAL SKILLS, INVESTIGATION & TROUBLESHOOTING SKILLS
WINDOWS & LINUX OPERATING SYSTEMS
FIREWALL, IDS/IPS & PERIMETER DEFENSES
VULNERABILITY SCANNING & PEN TESTING
N/W TRAFFIC MONITORING & PACKET ANALYSIS
INCIDENT RESPONSE PROCEDURES
SECURITY POLICIES & PROCEDURES
SIEM TOOLS & CONTINUOUS THREAT MONITORING
DLP, ENDPOINT PROTECTION FOR ZERO DAY & APT
AUTOMATING COMPLIANCE & RISK (FISMA, RMF, FEDRAMP)
CYBER THREAT & IOC & IOT LANDSCAPE AWARENESS
USER BEHAVIOR ANALYTICS & INSIDER THREAT
SECURITY CONTROLS USING MACHINE LEARNING & NLP
HELP DESK / TECH SUPPORT EXPERIENCE
UNDERSTANDING SOCIAL ENGINEERING
COMMERCIAL SECURITY CONTROLS DEFENSE IN DEPTH
SCRIPTING SKILLS WITH PYTHON
OPEN SOURCE TOOLS & THREAT INTELLIGENCE
TCP/IP, NETWORKING, ROUTING & SWITCHING
IT CERTIFICATIONS & EDUCATION
![Page 26: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/26.jpg)
Security & Networking Concepts
& Hands-On Cyber Analysis &
Troubleshooting Skills Are Good Place
to Start
![Page 27: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/27.jpg)
Next Gen Cyber Professionals need a solid grasp on Open Source Cyber Security Tools
![Page 28: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/28.jpg)
Hands-On Skills for Network Traffic Analysis with Wireshark Are Extremely Valuable
• Fundamentals of network traffic flow• Structure of network traffic• Common protocols• How to use Wireshark for traffic analysis
![Page 29: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/29.jpg)
Ethical Hacking & Exploitation Skills using Kali Linux and Metasploit in a Virtual Environment
![Page 30: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/30.jpg)
Cyber Analysts need to learn Open Source Intelligence Tools that can be leveraged on the job
Hidden Social Network ContentCell Phone Subscriber InformationDeleted Websites & PostsMissing Facebook Profile DataFull Twitter Account DataAlias Social Network ProfilesFree Investigative SoftwareUseful Browser ExtensionsAlternative Search Engine ResultsWebsite Owner InformationPhoto GPS & MetadataLive Streaming Social ContentSocial Content by LocationIP Addresses of UsersAdditional User AccountsSensitive Documents & Photos
![Page 31: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/31.jpg)
Next Gen Cyber Security Professionals have hands-on knowledge of Commercial SOC Tools
![Page 32: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/32.jpg)
• 18 Security Control Families
• 256 Controls to Monitor
• Requires Continuous Monitoring of hundreds of metrics
• Across a range of of Data Sources (Applications, Servers, Endpoints, VMs)
• Huge Volumes - Terabytes of data to be collected, indexed and searched daily
• Create Authorization Package (System Security Plan, Security Assessment Report, Plan of Action & Milestones)
• Requires real-time visualization dashboards
• Requires ad-hoc search and forensic navigation across all IT data.
Knowledge of FISMA/RMF Compliance is necessary for Public Sector Cyber Security Jobs
![Page 33: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/33.jpg)
Cyber Professionals should know how to Analyze Vulnerability Scan Reports
![Page 34: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/34.jpg)
Cyber Professionals need to know how to Read and Write Plan of Action & Milestones (POAM) & SSP & SAR
![Page 35: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/35.jpg)
Teaching Students Valuable Cyber Threat Hunting Skills
![Page 36: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/36.jpg)
Teaching Students how to Mine Machine Data
![Page 37: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/37.jpg)
Tracking RMF Reports Across Security Control Families
![Page 38: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/38.jpg)
Cyber Forensic Analysis Skills for Incident Responders
![Page 39: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/39.jpg)
39
Teaching Students how to track SOC KPIs & IOCs
![Page 40: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/40.jpg)
Skills to Visualize Security Posture & Cyber IOCs
![Page 41: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/41.jpg)
Skills to Create Dashboards for Tracking FISMA Compliance Trends
![Page 42: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/42.jpg)
Teaching Students Incident Investigation Techniques
![Page 43: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/43.jpg)
Teaching Students how to create Real Time Dashboards for Compliance Reports
![Page 44: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/44.jpg)
Skills for Monitoring Known Threats
![Page 45: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/45.jpg)
Customizing Dashboards for Monitoring Unknown Threats using Data Correlation
![Page 46: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/46.jpg)
Valuable skills on Indicators of Compromise
![Page 47: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/47.jpg)
Valuable Skills to understand IOCs & Ability to perform Correlations with Context
![Page 48: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/48.jpg)
Learning Valuable Skills on Next Generation Firewalls (NGFW) Security Platform
![Page 49: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/49.jpg)
User Behavior Analytics Skills for Insider Threat Detection
![Page 50: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/50.jpg)
Risk Management on Unstructured Human Generated Data
![Page 51: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/51.jpg)
DoD ACAS Solution Skills Are Very Valuable for the Public Sector Cyber Jobs
• In 2012, the Defense Information Systems Agency (DISA) awarded theAssured Compliance Assessment Solution (ACAS) to HP Enterprise Servicesand Tenable Network Security. The ACAS mission is simple: Assess DoDenterprise networks and connected IT systems against DoD standards, as wellas identify any known system vulnerabilities.
• ACAS provides complete visibility and prioritized, actionable data throughcustomized reporting. It’s also Security Content Automation Protocol (SCAP)1.2 compliant and is a follow-on capability to the Secure ConfigurationCompliance Validation Initiative (SCCVI) tool commonly referred to as“Retina.”
![Page 52: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/52.jpg)
DoD HBSS / ESS Skills are very valuable for the Public Sector Cyber Jobs
• The DOD Endpoint Security Solutions (ESS) is an integrated set ofcapabilities that work together to detect, deter, protect, and report oncyber threats across all DOD networks. Endpoint security is a DOD-wideeffort that leverages the collaborative capabilities of the NSA, Services,DOD CYBER Range, Red Team support, and continuous market researchthrough components and the MITRE corporation.
• The Endpoint ecosystem includes integrated solutions such as Comply toConnect (C2C), Containment, Visibility, and Assessment tools.
• Evolve DOD HBSS to Endpoint Security and integrate endpoint data tosituational awareness tools such as SECDEF CYBER SCORE CARD.
![Page 53: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/53.jpg)
eMASS Skills for RMF Automation are very valuable for the Public Sector Cyber Jobs
• eMASS (Enterprise Mission AssuranceSupport Service) is a government-ownedweb-based application which supportscybersecurity program management.
• The students learn the features of eMASSspecific to their roles. It describes the roleof eMASS in the Risk ManagementFramework for Information Technology;defines eMASS’s implementation of theAuthorization Process; and covers how tooperate through eMass in order to supportthe creation, assessment, and authorizationof a completed RMF A&A package.
![Page 54: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/54.jpg)
Hands-on Python Skills are highly valued for Cyber Jobs
• It's easy to learn and it is a great language to know when working inInfoSec and Cybersecurity
• Programming knowledge is crucial for analyzing software forvulnerabilities, identifying malicious software and other tasks required forcyber security analysts
• It is a very popular language used to create many security tools
• Python on your resume helps you stand out from other candidates andindustry professionals
• Employers are looking for fully stacked programmers. you can automatedaily tasks with scripts written in Python
• Introduction to Python Concepts• Advanced use of Python• Web Recon• Port Scanning• TCP Packet Sniffing• Perform Forensic Analysis• Evasion of Antivirus Software
![Page 55: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/55.jpg)
Intellectual Point hosts free Meetups to educate the workforce and spread Cyber Awareness
![Page 56: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/56.jpg)
Our attendees are from various backgrounds
Business, Arts, Science, Math
We welcome all!
![Page 57: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/57.jpg)
We love keeping them updated with emerging technologies
And we’re dedicated to
spreading the knowledge
![Page 58: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/58.jpg)
Career Counseling is important step to success and launch of Cyber Professionals
• Pre & Post Career Counseling
• Discuss career options, job roles,pay-scales, growth opportunities
• Helping candidates pick the rightcourses and make informeddecisions aligned with their skills& career aspirations
• Mentoring students throughoutthe course and after the coursecompletion.
• Part of Intellectual Point Culture
![Page 59: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/59.jpg)
Overcoming Skills Gap via Career Counseling is very critical
![Page 60: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/60.jpg)
Utilizing Cybersecurity Career Pathway at Cyberseek.org to mentor students
![Page 61: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/61.jpg)
Assisting Clients with writing a cyber oriented resume leveraging past skills like Help Desk, QA, Breakfix etc.
![Page 62: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/62.jpg)
On-The-Job (OJT) Training is Extremely Valuable for workers entering Cyber Workforce.
• On-the-job training, alsoknown as OJT, is teaching theskills, knowledge, andcompetencies that areneeded for employees toperform a specific job withinthe workplace and workenvironment.
• Employees learn in anenvironment in which theywill need to practice theknowledge and skills taughtin the on-the-job training.
![Page 64: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/64.jpg)
![Page 65: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/65.jpg)
CYBER SECURITY CAREER PATHWAY
![Page 66: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/66.jpg)
CAREER TRANSFORMATIONSUCCESS STORIES
![Page 67: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/67.jpg)
How 2015 CEHRT Automates Permitted Uses and Patient Access
Career Transformation• We get many students that come from a non-IT backgroud.• We ascertain that they have analytical skills, writing skills,
communication skills, teamwork skills, quick learning ability.• We put them through the cyber programs, short courses, workshops and
certifications and get them into successful cyber security careers.
New Profession
• Cyber Security Analysts• SOC Analysts• Firewall Engineers• Incident Responders• Tech Support• Jr. Network Engineers• Help Desk Support• Security Engineer• Technical Project Managers
Current Profession
• Accountants• Technical Writers• Banking • ATM Tellers• QA / Testing• Uber Drivers• Help Desk / Tech Support• Network Engineers• Project Managers• Business Analyst
67
Putting People into Cyber Security Careers
![Page 68: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/68.jpg)
Eric Jennings’ Success Story
• Name: Eric Jennings• Previous Profession: Business Analyst• New Profession : Cyber Security Analyst• Program: WIOA J4VETS• Certifications Completed: Security+, CEH, CISSP
![Page 69: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/69.jpg)
Mary Clark’s Success Story• Lost her job at BT as Config Specialist
• Came as a referral from FairfaxSkillsource Center under WIOAprogram.
• Completed the following certificationsat Intellectual Point– CompTIA Security+ & Cloud+
– ITIL Foundation
– Cisco CCNA
– Certified Ethical Hacker (CEH)
• Got placed at ASM Research(Accenture Federal Services Companyin Fairfax) in June 2015 as a CyberSecurity Analyst in record time.
![Page 70: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/70.jpg)
John Leach’s Success Story
• Name: John Leach
• Profession: Accountant
• Program: WIOA J4VETS
• Certifications Completed:CAPM, ITIL, Security+,Cloud+
• Went from unemployedaccountant through a fullcareer change and nowgainfully employed atAccenture as a SoftwareEngineering Associate
![Page 71: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/71.jpg)
Doug Pedersen’s Success Story
• Name: Doug Pedersen• Degree: Liberal Arts• Previous Profession: Help Desk Lead• New Career : Cyber Security• Certifications Earned: Sec+, Cloud+,
ITIL, CISSP, CEH, CCNA, Splunk PowerUser, CISM, AWS Cloud Architect
• Current Title : Global ManagingConsultant at IBM (Cyber Intelligence& Operations).
• Went from Help Desk Lead to cybersecurity intelligence and operationsmanaging consultant atIBM/Trustwave in 6 months. Almostdoubled his salary in 6 months.
![Page 72: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/72.jpg)
• Special Honor Trophies for students successfully completing multiple certifications in the cyber program and getting placed in cyber analyst roles from help desk positions.
Cyber Security Pathways to Success Program Success
![Page 73: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/73.jpg)
Summary & Key Take-Aways
• Cyber Threat Landscape around us has changed dramatically.
• Traditional point products and security tools are no longer effective and there isan acute shortage of trained and skilled cyber professionals.
• IT Certifications are extremely valuable in today’s market.
• Hands-on experience and On the Job Training are extremely valuable.
• Providing a continuous learning environment to workforce with access to opensource and commercial cyber security tools is critical in building the next gencyber workforce.
• Non-technical skills such as communication, writing, analytical & investigativeskills are equally important as technical skills for a successful cyber career.
• Automation, Machine Learning, Co-relating events with Big Data Tools & AI ischanging the way we all deal with massive amounts of cyber events.
• Mentoring and career counseling is a critical element to guide the workforcetransitioning from non-IT and non-cyber jobs into highly lucrative nextgeneration cyber security careers.
![Page 74: CREATING THE NEXT GENERATION CYBER PROFESSIONALS … · CREATING THE NEXT GENERATION CYBER PROFESSIONALS ... –ITIL Foundation ... Global Managing Consultant at IBM ...](https://reader030.fdocuments.us/reader030/viewer/2022020204/5adb118e7f8b9a86378e321c/html5/thumbnails/74.jpg)
How to Contact Us
Prem JadhwaniPresident and CEOIntellectual Point
http://www.intellectualpoint.com