SlideShare a Scribd company logo
1 of 18
A Day in the Life of a Cyber
Security Professional
Tim Holman, CEO of 2-sec
18th June 2015
Focus on:
• Typical day to day activities as CEO of 2-sec.
• The highlights (and lowlights) of my cyber
security career.
• How to develop YOUR career as a cyber security
professional.
• How can the ISSA created Cyber Security Career
Lifecycle™ help?
Tim Holman, CEO 2-sec
• 20 plus years security experience in Cyber security
including:
– auditing
– penetration testing
– credit card security
– ethical hacking
– training
– incident response
• Awarded Microsoft MVP Security in 2004, 2005 and 2006
• Director of the ISSA International Board, Fellow of ISSA
and Previous President of ISSA-UK
What do I do all day!?
• Work in a multi disciplinary team across the South
of England.
• Help many different types of UK businesses from
SMEs to large conglomerates.
• All market sectors, including retail, financial,
professional services hospitality.
• Penetration Testing, Audits and Assessments, PCI
DSS, CISO, Physical Security and Training.
What do I do all day!?
• Most of my time is ADVISING existing and new clients.
• Also responsible for projects including:
– Security assessments including pen testing/physical
– Card security
– Auditing companies to gain industry compliance e.g. PCI
DSS.
– Incident Response Planning
• Disaster management during data breaches.
• Managing ISSA.
• Each day is different.
Highs and Lows of my Career
Highs (or the good bits)
• Recognition
• Making a difference
• Helping others
• Defeating cyber
crime
Lows (or the bad bits)
• Box tickers
• Some vendors
• Sales guys
• Bootcamps
Why are we successful?
• Experience of our consultants who are
KNOWN to be experts in their fields.
• Experience in many different sectors.
• Our commercial understanding.
• We communicate well with our clients.
• We provide simple, cost effective solutions
in non technical language.
Cyber Security as a Profession
• Over 50 different career types within cyber
security.
• Reports of 300,000 and 1,000,000 current
cybersecurity positions are vacant.
• Demand is expected to rise as public, private and
government sectors face unprecedented numbers
of cybersecurity threats.
• The lack of cybersecurity talent can be an
organization's biggest vulnerability, exposing it to
serious risk.
Problems with the Profession
• The Information Security profession has
developed largely in reaction to threats.
• Now we are paying the price with an enormous
gap of skilled professionals and an entire “missing
generation.”
• No synergy around defining cyber security roles;
e.g Network Security Analysis in USA may not
have same responsibilities as those working for
other countries.
The profession has developed in
REACTION to threats
Somebody is trying to
get in – stop them
Somebody got in – find
out what they did
How do we stop somebody
from getting in?
Stop them at the border with
firewalls, then with intrusion
prevention/detection
• General IT support staff
(system managers, networks,
operators, etc.)
• Security Analysts
• Network Security Engineers
Locking down systems to
prevent further damage and
retrace the steps
• General IT support staff
(system managers, networks,
operators, etc.)
• Security Analyst
• Network Security Engineers
• Forensic Analysts
• Cyber law enforcement
• Cyber legal council
Locking down systems and
building the defense in layers
• General IT support staff
(system managers, networks,
operators, etc.)
• Security Analysts
• Network Security Engineers
• Forensic Analysts
• Cyber law enforcement
• Cyber legal council
• Security Architects
• GRC Specialists
• Secure Code Developers
There really IS a problem
• Our reactive development has not allowed for:
• Developing a professional career map.
• Building what we need to be proactive.
• “next generation”.
• Well rounded skill sets.
• Our industry has taken a knee jerk reaction:
• Tremendous push by governments to fill the gap through
formal education programs.
• New training and education programs are popping up
everywhere.
• No collaboration between entities or countries.
• No “voice” speaking for the profession/professional.
The Cyber Security Career Lifecycle™
The CSCL is a systematic approach that:
• Enables professionals to discover the areas of
weakness.
• Defines personalized career map.
• Provides guidance, resources, and a support
system to achieve skills and career goals.
www.issa.org/cscl
What is the CSCL?
The CSCL is a systematic approach that:
– Enables professionals to discover the areas of
weakness in their skill sets and aptitudes.
– Defines personalized career map according to the
individuals knowledge, skills, aptitudes and interest.
– Provides guidance, resources, and a support system
to achieve skills and career goals.
The Cyber Security Career Lifecycle™
Pre-
Professional
Entry
Mid-
Career
Senior
Leader
Understand your career!
Self -Assessment
Knowledge, Skills, Aptitudes
Career Mapping
Personal
Guidance
Understand your career!
Understand where you currently are in your career
• Career Mapping
• Self assessment using KSAs
ISSA resources to strengthen & grow
• Knowledge sharing
• Formalized training
• Networking
• Mentoring
Direct feedback for new services
ISSA Career Progression Continues…
• Focus on the “missing generation”
• Meet-ups (virtual & in person)
• Mentoring
• Continuing support of all phases
• Journal
• Webcasts
• International Conference/ CSCL Tracks
• New service development using CSCL phases
• International Consortium for Cyber Security Education
and Professional Development (ICCE&PD)
Thank you very much!
STAND BH514
tim.holman@2-sec.com
0844 502 2066
@2_secure
www.2-sec.com
Any Questions?

More Related Content

Viewers also liked (7)

Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]Vihiga  Members of County Assembly [Vihiga MCAs, 2013-18]
Vihiga Members of County Assembly [Vihiga MCAs, 2013-18]
 
Contabilidad
ContabilidadContabilidad
Contabilidad
 
High School Diploma_Pavel Mishev
High School Diploma_Pavel MishevHigh School Diploma_Pavel Mishev
High School Diploma_Pavel Mishev
 
Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016Emily Miketinac- Resume 2016
Emily Miketinac- Resume 2016
 
McKinsey Slides Examples
McKinsey Slides ExamplesMcKinsey Slides Examples
McKinsey Slides Examples
 
Ruc y rise
Ruc y riseRuc y rise
Ruc y rise
 
IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015IFLA-illustrated-presentation June2015
IFLA-illustrated-presentation June2015
 

Similar to 2-sec "A Day in the Life of a Cyber Security Professional" Interop London June 2015

(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
Ian Naumenko, CISSP, CRISC
 

Similar to 2-sec "A Day in the Life of a Cyber Security Professional" Interop London June 2015 (20)

2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
How To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk Analyst
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
Cyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San AntonioCyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
Cyber Job Fair Job Seeker Handbook April 19, 2018, San Antonio
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

2-sec "A Day in the Life of a Cyber Security Professional" Interop London June 2015

  • 1. A Day in the Life of a Cyber Security Professional Tim Holman, CEO of 2-sec 18th June 2015
  • 2. Focus on: • Typical day to day activities as CEO of 2-sec. • The highlights (and lowlights) of my cyber security career. • How to develop YOUR career as a cyber security professional. • How can the ISSA created Cyber Security Career Lifecycle™ help?
  • 3. Tim Holman, CEO 2-sec • 20 plus years security experience in Cyber security including: – auditing – penetration testing – credit card security – ethical hacking – training – incident response • Awarded Microsoft MVP Security in 2004, 2005 and 2006 • Director of the ISSA International Board, Fellow of ISSA and Previous President of ISSA-UK
  • 4. What do I do all day!? • Work in a multi disciplinary team across the South of England. • Help many different types of UK businesses from SMEs to large conglomerates. • All market sectors, including retail, financial, professional services hospitality. • Penetration Testing, Audits and Assessments, PCI DSS, CISO, Physical Security and Training.
  • 5. What do I do all day!? • Most of my time is ADVISING existing and new clients. • Also responsible for projects including: – Security assessments including pen testing/physical – Card security – Auditing companies to gain industry compliance e.g. PCI DSS. – Incident Response Planning • Disaster management during data breaches. • Managing ISSA. • Each day is different.
  • 6. Highs and Lows of my Career Highs (or the good bits) • Recognition • Making a difference • Helping others • Defeating cyber crime Lows (or the bad bits) • Box tickers • Some vendors • Sales guys • Bootcamps
  • 7. Why are we successful? • Experience of our consultants who are KNOWN to be experts in their fields. • Experience in many different sectors. • Our commercial understanding. • We communicate well with our clients. • We provide simple, cost effective solutions in non technical language.
  • 8. Cyber Security as a Profession • Over 50 different career types within cyber security. • Reports of 300,000 and 1,000,000 current cybersecurity positions are vacant. • Demand is expected to rise as public, private and government sectors face unprecedented numbers of cybersecurity threats. • The lack of cybersecurity talent can be an organization's biggest vulnerability, exposing it to serious risk.
  • 9. Problems with the Profession • The Information Security profession has developed largely in reaction to threats. • Now we are paying the price with an enormous gap of skilled professionals and an entire “missing generation.” • No synergy around defining cyber security roles; e.g Network Security Analysis in USA may not have same responsibilities as those working for other countries.
  • 10. The profession has developed in REACTION to threats Somebody is trying to get in – stop them Somebody got in – find out what they did How do we stop somebody from getting in? Stop them at the border with firewalls, then with intrusion prevention/detection • General IT support staff (system managers, networks, operators, etc.) • Security Analysts • Network Security Engineers Locking down systems to prevent further damage and retrace the steps • General IT support staff (system managers, networks, operators, etc.) • Security Analyst • Network Security Engineers • Forensic Analysts • Cyber law enforcement • Cyber legal council Locking down systems and building the defense in layers • General IT support staff (system managers, networks, operators, etc.) • Security Analysts • Network Security Engineers • Forensic Analysts • Cyber law enforcement • Cyber legal council • Security Architects • GRC Specialists • Secure Code Developers
  • 11. There really IS a problem • Our reactive development has not allowed for: • Developing a professional career map. • Building what we need to be proactive. • “next generation”. • Well rounded skill sets. • Our industry has taken a knee jerk reaction: • Tremendous push by governments to fill the gap through formal education programs. • New training and education programs are popping up everywhere. • No collaboration between entities or countries. • No “voice” speaking for the profession/professional.
  • 12. The Cyber Security Career Lifecycle™ The CSCL is a systematic approach that: • Enables professionals to discover the areas of weakness. • Defines personalized career map. • Provides guidance, resources, and a support system to achieve skills and career goals. www.issa.org/cscl
  • 13. What is the CSCL? The CSCL is a systematic approach that: – Enables professionals to discover the areas of weakness in their skill sets and aptitudes. – Defines personalized career map according to the individuals knowledge, skills, aptitudes and interest. – Provides guidance, resources, and a support system to achieve skills and career goals.
  • 14. The Cyber Security Career Lifecycle™ Pre- Professional Entry Mid- Career Senior Leader
  • 15. Understand your career! Self -Assessment Knowledge, Skills, Aptitudes Career Mapping Personal Guidance
  • 16. Understand your career! Understand where you currently are in your career • Career Mapping • Self assessment using KSAs ISSA resources to strengthen & grow • Knowledge sharing • Formalized training • Networking • Mentoring Direct feedback for new services
  • 17. ISSA Career Progression Continues… • Focus on the “missing generation” • Meet-ups (virtual & in person) • Mentoring • Continuing support of all phases • Journal • Webcasts • International Conference/ CSCL Tracks • New service development using CSCL phases • International Consortium for Cyber Security Education and Professional Development (ICCE&PD)
  • 18. Thank you very much! STAND BH514 tim.holman@2-sec.com 0844 502 2066 @2_secure www.2-sec.com Any Questions?