Vous êtes sur la page 1sur 27

Creating

Leaders in
Cybersecurity

Leadership in Cybersecurity:
From Practitioner to Leader
Presented by Jay Bavisi
President and CEO of EC-Council

Cyberspace; is a dynamic Landscape!


Increase
d Cyber
legislatio
n

Increase
d
mobility
44.5

hours
spend online

8 hours per day for

Increased
Connectivi
ty
teens

Individuals constant
connectivity and
organizational dependency
on staying connecting sets
entities vulnerable to cyber
attacks anytime and
anywhere

Almost 3 times of the


worlds population will
amount the number of
connected devices.

26
billion
devices
for only

8 billion
people
connected by
2020

Continuously toughening
legislation requires
organizations to comply with
new cybersecurity policies

Evolving
Technolog
y
Cyberspace is changing the
rules of the game every day.
What is in today, it is already
outdated tomorrow.
As such, the ability to
research is Key to Success !

More than

50 bills

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Cybercrime; a persistent threat!


Constant change though enabled:

20 million CYBER ATTACKS PER


DAY
In Particular:

144% INCREASE IN SUCCESSFUL CYBER ATTACKS ON BUSINESSES


98% OF TESTED WEB APPS ARE VULNERABLE TO ATTACK
90% OF LARGE ORGANISATIONS REPORTED SUFFERING A SECURITY BREACH.
48% INCREASE PER YEAR FOR ONLINE BANKING FRAUD
92%OF EUROPEAN CORPORATIONS HAVE BEEN HACKED
85%OF FIRMS HAVE BEEN HACKED ACROSS ASIA, AFRICA & LATIN AMERICA
2015Trustwav
83% OF THE RESPONDENTS BELIEVE THAT CYBER ATTACKS ARE AMONG THE 3 BIGGEST THREATS es
FACING ORGANISATIONS TODAY

Global Security
Report
Copyrights 2016 by EC-Council.
All Rights Reserved. Reproduction is
Strictly Prohibited

Only
recently
1 in 3
companies have
experienced a data breach

Total of

$551k
losses incurred for
enterprises
Number is expected to
reach

$90 trillion
by 2030

With such high stakes, most would


agree that information security
deserves full attention at the
highest levels of the company.
Copyrights 2016 by EC-Council.
All Rights Reserved. Reproduction is
Strictly Prohibited

And theyve been hacked

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Here are some


quick facts:

WHY?

1. Cyberspace is the
21st century's
greatest engine of
change.
2. Cybersecurity market
is worth an estimated
$75 billion and by
2020, thats
predicted to swell to
$170 billion.
3. Cybersecurity is the
top concern of
organizations
globally!
Copyrights 2016 by EC-Council.
All Rights Reserved. Reproduction is
Strictly Prohibited

Cybersecuri
ty is a
growing
field
Today, cyber security
professionals are in high
demand. In fact, the demand
for cyber security professionals
is estimated to reach 6 million
globally by 2019. Yet, the
demand for cyber security
professionals is far out pacing
the supply, because there
arent nearly enough highly
educated and qualified
professionals to fill the demand,
which is one of the many
reasons a degree in cyber
security can be so beneficial.

Technical &
Managerial

Diver
se
skills

Growt
h
oppor
tuniti
es
CISO: Chief
Information
Security
Officer

Job
Securi
ty

One of
the
Fastest
growin
g
industr
y!

Elite
comm
unity

91%
increase in
job
posting

Multip
le
Caree
r
optio
ns
Comp
etitiv
e
salari
es

Listed as
8th best
job for
2015

Analyst,
Investiga
tor,
Architect
,
Manager
etc.
9%
annua
l
salary
increa
se

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Cybersecurity experts:
1. Are only technical or
2. Are long time
practitioners or
3. Have no future in the
board room or
4 young
myths
about
4. Are
& self-trained
(Basement Experts).

Cybersecurity

Cybersecurity Experts:
1. Should have technical
and managerial skills.
2. Are aimed to be part of
the decision making
process and C-Level
Suite!
3. Should
be
cultivated
and
The Truth
educated in an
academic level equally
as CFOs, CMOs, COOs
etc., hence boardroom
material.

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Cybersecurity; is the new global


business priority!
1. Cybersecurity experts are
more than essential in every
corporation across all
industries!
2. Cybersecurity field is not only
IT. It is strategy, it is
compliance, it is leadership
and it is finance.
3. Cybersecurity sector
compared to other sectors is
the least saturated!
4. Cybersecurity salaries are
skyrocketing every year!

The New Business


Priority

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Cybersecurity; Workforce Shortage


Despite the evolving cyberspace:

6 million Cybersecurity
Professionals in DEMAND by 2019
In Particular:

1,5 million CYBERSECURITY WORKFORCE SHORTAGE BY 2019


74% INCREASE ON CYBERSECURITY JOB POSTINGS THE PAST 5 YEARS
86% OF BUSINESS AND IT PROFESSIONALS GLOBALLY FACE SHORTAGE OF CYBERSECURITY
PROFESSIONALS

54% ADMIT THAT IT IS DIFFICULT TO IDENTIFY WHO HAS ADEQUATE SKILLS AND
KNOWLEDGE WHEN HIRING NEW GRADUATES FOR ENTRY-LEVEL CYBER SECURITY POSITIONS

34% EXPECT IT WILL BE DIFFICULT TO FIND SKILLED CANDIDATES

2015Trustwav
es
Global Security
Report
Copyrights 2016 by EC-Council.
All Rights Reserved. Reproduction is
Strictly Prohibited

CyberSecurity; is a booming
career
Job Outlook and Average Salary Expectations
Information Security Administrator $61,000
Information Security Auditor $67,000
Information Security Analyst $69,000
Information Security Specialist $75,000
Information Security Investigator
Information security Consultant $81,000
Information Assurance Engineer $85,000
Information Security Manager
Information Security Director
Chief Information Security Officer

$76,000
$150,782
$198,942
$235,011

*per PayScale.com

1.Salary
Increase
2.Job Security
3.Job
Satisfaction
Are the top reasons
for entering &
staying in the
CYBERSECURITY
profession.

Cybersecurity workers with an average salary of nearly $6,500


gain 9% more than the IT workers.
Job Market Intelligence: Cybersecurity Jobs 2015 which is published by Burning Glass Technologies.
Copyrights 2016 by EC-Council.
All Rights Reserved. Reproduction is
Strictly Prohibited

I am too old to go back to


school.
I am too busy working fulltime to even study parttime.
I have too many
responsibilities to quit my
job for studies.
My company will not
support me financially for
my studies if I have to take
time off.

E
S

U
C
X
Your
Thoughts
S
E

1. Any other typical master degree will


require either way 2-5 years of
professional experience.
2. Online studies are designed
especially for those who are active
in the workforce.
3. You do not need to quit your job to
obtain a Master
degree do it
Reality
simultaneously. But if you dont
evolve, job might quit on you.
4. Companies are striving to find the
right talent in Cybersecurity and
they invest heavily in developing
the skilled ones.

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

If any college student asked me what career


would most assure 30 years of steady, wellpaying employment, I would respond,
cybersecurity.
Alec Ross,
Senior Adviser for innovation,

Were producing about two-thirds of the IT


people that we need nationwide, and were
way behind in cybersecurity.

State Department

Janice Cuny,
Program Director,
National Science Foundation (NSF)

Cybersecurity is more about finding human


talent than it is about the latest monitoring
tools
Jack Harrington,
Raytheon, Cybersecurity vendor
of US 2016
government.
Copyrights
by EC-Council.
All Rights Reserved. Reproduction is
Strictly Prohibited

Your Possible Career


Roadmap

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Your education path


Post-Graduate Program:
MSS: Master of Science in Security

Graduate Programs:
GCP: Graduate Certificate
Information Security
Professional
IT Analyst
Digital Forensics
Disaster Recovery
Executive Leadership in
Information Assurance

Undergraduate Program:
BSIS: Bachelor of Science in Information
Security Assurance

+
Industria
l Training
&
Certificat
ion at
the same
time
Copyrights 2016 by EC-Council.
All Rights Reserved. Reproduction is
Strictly Prohibited

Traditional Education:
1. Entails huge financial
obligations.
2. Requires prescheduled
attendance regardless
personal activities, limited
time, work commitments
or health status.
3. Sometimes requires
relocation of the
student.
4. It is live
and face-to-face
Traditional
but it cannot be
retrieved if missed.
5. It is a fast-paced and
competitive arena for
introvert students.

Online degrees:
1. Are 3 times less expensive than
on campus.
2. Require no living and
transportation costs
3. Allow you to manage your time
they way it best suits you.
4. Encourage you to work at the
same time.
5. Allow you 24/7 access to course
material, training tutorials and
library at any time.
6. Allow you to revisit lectures and
training tutorials to ensure you
didnt miss anything.
7. Provide you diverse classroom
experience by interacting with
classmates from all over the world.
8. Prepare you to lead the digital
world by getting accustomed with
remote environments.
Copyrightssupport
2016 by EC-Council.
9. Offer Lifetime Career
Allare.
Rights Reserved. Reproduction is
wherever you

Online

Strictly Prohibited

Why Online with ECCU?


Look beyond mobility and catch up with the global movement that
supports remote environments.
Heading to a new reality where you are no longer chasing your education, but education
comes to you.

Your
Fight
is
Online

Learn
while You
Earn

24/7
Cyber
Rang
e

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Skills Based

Singular ContextCertificate:
1. 2-5 days intensive
training
2. 2-3 years lifespan
3. Helps you get-in.
4. Its an add-on
experience.
5. It helps you stay
relevant and up-todate

Certification

Academic Degree:
1. 2-4 years education
2. No expiration date
3. Helps you go-up
4. Its a cross-sectional
study
5. Tests skills under
conceptual diversity
6. It helps you grow and
evolve through the
executive ranks
Knowledge Based

Multiple Contexts

Academic Degree

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

What is Multiple Context ?

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Academic Pedagogy Applied MSS


example
Internship Opportunity
where you learn about
Observing, Identifying,
Analyzing, Evaluating
and eventually Reporting
to senior management
Projects and
group
assignments to
practice and test
your skills

Training material
and courseware to
read and study on
your own

C
r
e
a
t
Evaluat
e
e
Analyze
Apply

Research and thesis


project where you are
challenged to
contribute with your
own and unique
positioning
Case studies to
identify and
examine various of
past incidents.
Industry
practitioners as
teachers to explain
and demonstrate
you live examples

Understand
Remember
Copyrights 2016 by EC-Council.
All Rights Reserved. Reproduction is
Strictly Prohibited

While on MSS

Certificati
on
Training

Internatio
nal
Training

Core Differentiations
Points

Examin
Evolve
e

Practice
Practice
Practice

Manageri
al
Training

Business
Preparation
Ready to work!

Emphasis on
Research

Cyber Range Live


Access

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Why ECCU?
US National
Accreditation
Global Recognition
Industry links
worldwide
Industry
Certifications
World-class
Education

149

700
+

200,00
0

ECCU enjoys allpartner


advantages
of
Certified
s
EC-Council
Organization
Hands on
Experience

Online & Flexible


Practitioners as
Teachers
Lifetime Student
Support

Countri
es

40+

Certifica
te
Program
s

Connected
to all
Fortune

500

7+
Degree
Programs

20+

companies

Expert
Teachers

Picking ECCU gets you into the right educational institute and
program curricula that is the most important investment in pursuing
and managing a successful career in cybersecurity.

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Why ECCU?
1. Provides both Academic & Technical Training.
2. Prepares you to be part of the workforce of one of the fastest growing
professions in the world.
3. Offers diverse skills; theoretical, practical, technical, managerial, critical
and reasoning abilities cultivated.
4. World class education that is Online and flexible, while you earn!
5. Relevant, real-world experience training.
6. Real-time access to training, material, courseware and tools provided by
ECCU.
7. Positive career advancements for the majority of our graduates.
8. Renowned faculty members who are all practitioners.
9. Certification credits can be earned or transferred.
10.Strong connections with EC-Council organization, the global leader in
InfoSec training and certification.
Copyrights 2016 by EC-Council.
All Rights Reserved. Reproduction is
Strictly Prohibited

Cybersecuri
ty Degrees:
Does it help
advance
salaries &
careers?

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Imagine your name here


Chief Information Security Officer (CISO)
MSc in Information Security

Email: name@company.org
Tel: +1.234.567.890
Address: Company Address

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Q&A

Copyrights 2016 by EC-Council.


All Rights Reserved. Reproduction is
Strictly Prohibited

Thank you

US Office
101 C Sun Ave NE
Albuquerque, NM, 87109, USA
Phone: 1.505.922.2886
Fax: 1.505.856.8267

International Office
Phileo Damansara 1, Block g, 606
Petaling Jaya, 46350, Selangor, Malaysia
Tel: 603-79546896/6873/6361, Fax: 603-79566585

Vous aimerez peut-être aussi