SlideShare une entreprise Scribd logo
1  sur  64
Télécharger pour lire hors ligne
2019 CISSP MENTOR
PROGRAM
April 8, 2019
-----------
Class 1 – April 8, 2019
Instructors:
• Brad Nigh, FRSecure Director of Professional Services & Innovation
• Evan Francen, FRSecure & SecurityStudio CEO
• Maybe some others later…
CISSP® MENTOR PROGRAM – SESSION ONE
1
INTRODUCTION
Just kidding! This will be awesome!
• What is the CISSP Mentor Program?
• History
• 2010 – 1st Class – 6 students
• Today – 10th Class – 400+ students!
• Why do we do it?
• Success stories
• Heck, it’s free! What have you got to lose?
CISSP® MENTOR PROGRAM – SESSION ONE
2
INTRODUCTION
Welcome!
We have a severe talent shortage problem in our industry. Good news for you…
• Introduction
• Our severe talent shortage problem…
• Mentor Program Schedule & Class structure
• What is a CISSP?
• The book. **TIPS**
• Chapter 1 – Introduction (the other one).
CISSP® MENTOR PROGRAM – SESSION ONE
3
INTRODUCTION
Welcome – Today’s Agenda
2019 INFORMATION SECURITY PROJECTS
INTRODUCTION
Let’s get started, but first a joke.
4
What do you call
fake spaghetti?
2019 INFORMATION SECURITY PROJECTS
INTRODUCTION
Let’s get started, but first a joke.
5
What do you call
fake spaghetti?
An impasta.
• Co-founder and CEO of FRSecure LLC/Co-founder and CEO of
SecurityStudio®
• More than 25 years of “practical” information security experience.
• Ambitious mission; fix the broken industry.
• Co-inventor of SecurityStudio®, the platform for managing
information security risk.
• Co-inventor of FISA™, the Fiducial Information Security
Assessment. FISA™ is used by more than 800 companies across 28
industries to assess and manage information security risk.
• Co-inventor of FISASCORE®, the definitive measurement of
information security and vendor risk.
CISSP® MENTOR PROGRAM – SESSION ONE
6
INTRODUCTION
About Evan
Me, on most days
When they make
me clean up (a bit)
“Evan’s straightforward analysis of information security risk as fractured, incomplete
and disconnected is spot on.” – CISO, University of Miami
@evanfrancen
• Advised legal counsel in high-profile breaches including Target and
Blue Cross/Blue Shield.
• 2014/2015 - Consultant to the Special Litigation Committee of the
Board of Directors of Target Corporation; derivative action related to
the “Target Breach”.
• 2015/2016 – Consultant to legal counsel and Blue Cross/Blue Shield related to
remediation efforts (post-breach).
• Served as an expert witness is multiple federal criminal cases, mostly involving
alleged stolen trade secrets
• Served 100s of companies; big (Wells Fargo, Target, US Bank,
UnitedHealth, etc.) and small.
• Lots of television and radio, lots of information security talks at
conferences, and 750+ published articles about a variety of
information security topics.
CISSP® MENTOR PROGRAM – SESSION ONE
7
INTRODUCTION
About Evan
Me, on most days
When they make
me clean up (a bit)
“I don’t think I’ve met a more successful guy in this industry with less bullshit.” –
Roger Grimes
@evanfrancen
And then…
There’s a book. You should get your copy. I think it’s good for you.
CISSP® MENTOR PROGRAM – SESSION ONE
8
INTRODUCTION
About Evan
Me, on most days
When they make
me clean up (a bit)
https://www.amazon.com/Unsecurity-Information-security-failing-
epidemic/dp/164343974X/
@evanfrancen
But…
My FAVORITE THREE THINGS are…
CISSP® MENTOR PROGRAM – SESSION ONE
9
INTRODUCTION
About Evan
Me, on most days
(too)
People…
My people!
Information security isn’t as much about information or
security as it is about people.
@evanfrancen
But…
My FAVORITE THREE THINGS are…
CISSP® MENTOR PROGRAM – SESSION ONE
10
INTRODUCTION
About Evan
Me, on most days
(too)
The Unsecurity Podcast with Brad Nigh!
@evanfrancen
But…
My FAVORITE THREE THINGS are…
CISSP® MENTOR PROGRAM – SESSION ONE
11
INTRODUCTION
About Evan
Me, on most days
(too)
The CISSP Mentor Program!
2010 – Six(6) students.
2019 – More than four hundred(400+)
@evanfrancen
• 20+ years of overall IT experience, started with FRSecure in 2016
• CISSP Mentor Program Lead
• FRSecure Workshop Series Lead
• Co-host of UNSECURITY Podcast with Evan
• CISM, CISSP, CCSFP, CSSA, MCSA: Windows Server 2012, ITIL v.3
Foundations
• ISC2 Safe and Secure Online volunteer
• Wayzata Schools COMPASS program CyberSecurity Mentor
• Passionate about information security and happy to be here!
CISSP® MENTOR PROGRAM – SESSION ONE
12
INTRODUCTION
About Brad
@BradNigh
Expert-level, product agnostic information security management and
consulting firm.
• Established in 2008, but didn’t really start until 2010.
• Started by a security guy who was tired of taking shortcuts, tired of the money grab,
and tired of checking boxes.
• Information security is about people, and it’s a lot of hard work.
• Eight core values, and ten security principles.
• Core services include:
• Security Risk Analysis – using FISASCORE®
• Social Engineering Services
• Penetration Testing Services
• PCI QSA Services
• Incident Management Services
• HITRUST Services
• Information Security Training & Awareness
• vServices (vCISO, vISO, and vISA)
CISSP® MENTOR PROGRAM – SESSION ONE
13
INTRODUCTION
About FRSecure
Like 70+ unicorns.
CISSP® MENTOR PROGRAM – SESSION ONE
14
INTRODUCTION
About FRSecure
Cool, right?!
• Chapter 10 – Unsecurity
• No shortage of stories about our impending doom.
• Another take (from me) - No Easy Button Solution To Cybersecurity’s
Skills Shortage (https://www.cybersecurityintelligence.com/blog/no-
easy-button-solution-to-cybersecuritys-skills-shortage-4150.html)
• Some people claim that there is no shortage, or that it’s overhyped.
• The truth is probably somewhere in the middle, but there is plenty of
opportunity!
CISSP® MENTOR PROGRAM – SESSION ONE
15
OUR SEVERE TALENT SHORTAGE PROBLEM…
CISSP® MENTOR PROGRAM – SESSION ONE
16
OUR SEVERE TALENT SHORTAGE PROBLEM…
Some truth.
Source: CyberSeek – www.cyberseek.org
CISSP® MENTOR PROGRAM – SESSION ONE
17
OUR SEVERE TALENT SHORTAGE PROBLEM…
Some truth.
Source: CyberSeek – www.cyberseek.org
CISSP® MENTOR PROGRAM – SESSION ONE
18
OUR SEVERE TALENT SHORTAGE PROBLEM…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Some truth.
Source: CyberSeek – www.cyberseek.org
Source: United States Census Bureau
• Report from Cybersecurity Ventures estimates there will
be 3.5 million unfilled cybersecurity jobs by 2021, up from
1 million openings last year.
• ISACA predicts there will be a global shortage of two
million cyber security professionals by 2019.
• National Association of Software and Services
Companies (NASSCOM) estimates India will need 1
million cybersecurity professionals by 2020.
• Cyber crime is expected to cost the world $6 trillion by
2021.
CISSP® MENTOR PROGRAM – SESSION ONE
19
OUR SEVERE TALENT SHORTAGE PROBLEM…
Some truth.
• One of the most in-demand cyber security roles is security analyst.
• In 2012 there were 72,670 security analyst jobs in the U.S., with
median earnings of $86,170. Three years later, there were 88,880
such analysts making $90,120.
• Compensation for the most senior roles in cyber security, like chief
information security officer, can reach $400,000.
• 70 percent of cybersecurity professionals say the cybersecurity skills
shortage has had an impact on their organization.
• More than two-thirds (67 percent) of cybersecurity professionals
claim they are too busy with their jobs to keep up with skills
development and training.
• 49 percent of cybersecurity professionals are solicited to consider
other cybersecurity jobs by various types of recruiters at least once
per week.
CISSP® MENTOR PROGRAM – SESSION ONE
20
OUR SEVERE TALENT SHORTAGE PROBLEM…
Some truth.
• There is no shortage of bad advice, and some of it can be attributed
to the “talent” shortage.
• “Information security training and awareness is a waste of time
and resources”
• “An information security risk assessment is not necessary for a
well-run security program”
• “You must get an information security degree to become a good
information security professional”
• “Information security is an IT issue, not a business issue”
CISSP® MENTOR PROGRAM – SESSION ONE
21
OUR SEVERE TALENT SHORTAGE PROBLEM…
Bad Advice
Consider the source
• What makes a “good”
information security
professional?
• Recent backlash from the
Equifax Breach, noted that
Susan Mauldin (former Chief
Security Officer) had a music
degree; therefore, she must
have been unqualified.
CISSP® MENTOR PROGRAM – SESSION ONE
22
OUR SEVERE TALENT SHORTAGE PROBLEM…
“Good” Security Talent
“a problem emerges: according to LinkedIn,
Mauldin’s stated educational background has no
security or technology credentials, and consists
of.... a bachelor’s degree in music composition
(magna cum laude) and a Master of Fine Arts
degree in music composition (summa cum laude),
both from the University of Georgia. Once again,
this is the person who was in charge of keeping
your personal and financial data safe — and
whose failure to do that have put 143 million at
risk from identity theft and fraud.”
(Source: https://www.zerohedge.com/news/2017-09-15/another-
equifax-coverup-did-company-scrub-its-chief-security-officer-was-
music-major)
• What makes a “good”
information security
professional?
• Recent backlash from the
Equifax Breach, noted that
Susan Mauldin (former Chief
Security Officer) had a music
degree; therefore, she must
have been unqualified.
CISSP® MENTOR PROGRAM – SESSION ONE
23
OUR SEVERE TALENT SHORTAGE PROBLEM…
“Good” Security Talent
When Congress hauls in Equifax CEO Richard
Smith to grill him, it can start by asking why he put
someone with degrees in music in charge of the
company’s data security.
And then they might also ask him if anyone at the
company has been involved in efforts to cover up
Susan Mauldin’s lack of educational qualifications
since the data breach became public.
It would be fascinating to hear Smith try to explain
both of those extraordinary items.
(Source: https://www.marketwatch.com/story/equifax-ceo-hired-a-
music-major-as-the-companys-chief-security-officer-2017-09-15)
• What makes a “good” information security professional?
• Some people believe that you cannot be “good” without a technical degree, others
believe that you cannot be “good” without certifications like a CISSP, CISM, etc.
• There are thousands of awesome security practitioners who have no information
security degree whatsoever.
CISSP® MENTOR PROGRAM – SESSION ONE
24
OUR SEVERE TALENT SHORTAGE PROBLEM…
“Good” Security Talent
Defining “Good”
• At FRSecure we “grow unicorns”.
• There are three things that make a unicorn:
• Intangibles – the things you can’t teach.
• Education – the “book smarts”. Education can come in a variety of forms; degree
programs, books, in-person instruction, mentorship, certification preparation, etc.
• Experience – the “street smarts”. The best way to gain experience is by doing.
• The three ingredients are not mutually exclusive and there are all sorts of ways.
• Supply – we don’t have enough information security people.
• Acquisition – we can’t find enough good information security
people for ourselves.
• Retention – we can’t keep good information security people for
ourselves (and in some cases, in our industry).
• Culture – we have a “bro culture” problem that isn’t helping.
CISSP® MENTOR PROGRAM – SESSION ONE
25
OUR SEVERE TALENT SHORTAGE PROBLEM…
Supply and Demand - acquisition, retention, and our culture
• Two sources; people willing to change careers, and younger people entering the
workforce.
• Career Changers - If you were interested in getting into our field, where would
you start?
• A bachelor’s degree in cyber security will cost somewhere between $20,000 -
$60,000, or more. This might get you an entry-level job. A master’s degree
will cost much more. (Source: https://www.onlineu.org/most-affordable-colleges/cyber-
security-degrees)
• Certification? Training to pass the CISSP® exam can range from $3,000 -
$5,000, or more, and the exam itself will set you back another $699.
• Cost is a barrier to entry. Most people don’t have this amount of money lying
around.
• Younger People – Not enough education options (getting better, but not fast
enough).
CISSP® MENTOR PROGRAM – SESSION ONE
26
OUR SEVERE TALENT SHORTAGE PROBLEM…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Supply and Demand - acquisition, retention, and our culture
• Early Education – schools are starting programs, and they’re working. Many
examples.
• Free Education
• FRSecure’s Mentor Program (https://frsecure.com/cissp-mentor-program/)
• SANS Cyber Aces Online (http://www.cyberaces.org/courses/)
• Cybrary (https://www.cybrary.it/catalog/)
• Cyber Degrees (https://www.cyberdegrees.org/)
• Mentorship – no single dominant program; this requires more of us giving back.
• Hire Intangibles – and train/educate for the rest. Can be a good acquisition
strategy too.
• Internships – becoming more popular, but we need more.
CISSP® MENTOR PROGRAM – SESSION ONE
27
OUR SEVERE TALENT SHORTAGE PROBLEM…
Supply and Demand - acquisition, retention, and our culture
• Our industry culture is not always conducive to attracting and retaining talent.
• Some of the results of our culture are gender inequity and minority inequity.
• Women make up 49.56% of the world’s population, but only make up 11% of
the information security workforce.
• 26% of our workforce is non-Caucasian (or “white”) male.
CISSP® MENTOR PROGRAM – SESSION ONE
28
OUR SEVERE TALENT SHORTAGE PROBLEM…
Supply and Demand - acquisition, retention, and our culture
“In a survey of 580 scheduled attendees of the
Black Hat 2017 conference to be held in Las Vegas,
Black Hat found that 71% of respondents felt their
companies lacked sufficient staff to defend itself
against current cyberthreats. And, although less
than half of respondents (45%) were "concerned"
about the shortage of women and minorities in
the information security”
• Since our industry is so male dominated, there’s a “bro culture” that exists.
• “It’s a very male-dominated culture.” “It can be a little more crass, a little bit
more rough and maybe some … females don’t like that, and it is off-putting.”
– Ellison Anne Williams, Ph.D., founder and chief executive of Enveil, a
Fulton, Md., data security company.
• It’s not only the people in our industry that contribute to the problem. Customers,
clients, and other normal people also assume that information security is a male
sport.
• “They have clients who won’t speak directly to them, It’s the assumption that
the woman is not the lead on the project. They just default to speaking to the
men.” - Leah Figueroa, lead data engineer at Gravwell, a data analytics
company out of Coeur D’Alene, Idaho (Source:
http://www.govtech.com/workforce/Why-Are-So-Few-Women-in-Cybersecurity.html)
• This culture didn’t start in our industry and it’s not exclusive to our industry either.
CISSP® MENTOR PROGRAM – SESSION ONE
29
OUR SEVERE TALENT SHORTAGE PROBLEM…
Supply and Demand - acquisition, retention, and our culture
• Promote and participate in more diversity initiatives and programs.
• Studies prove the more diverse work groups produce more creative a better
results.
• A partial list of resources for women:
• SANS CyberTalent Immersion Academy for Women -
https://www.sans.org/cybertalent/immersion-academy
• Computer Science for Cyber Security (CS4CS) Summer Program for High
School Women - http://engineering.nyu.edu/k12stem/cs4cs/
• Women’s Society of Cyberjutsu (WSC) - http://womenscyberjutsu.org/
• Women in Cyber Security (WiCyS) - https://www.wicys.net/
CISSP® MENTOR PROGRAM – SESSION ONE
30
OUR SEVERE TALENT SHORTAGE PROBLEM…
Supply and Demand - acquisition, retention, and our culture
• One more thing.
• Go get this.
• It’s free.
CISSP® MENTOR PROGRAM – SESSION ONE
31
INTRODUCTION
Our severe talent shortage problem…
CISSP® MENTOR PROGRAM – SESSION ONE
32
MENTOR PROGRAM SCHEDULE & CLASS
STRUCTURE
Syllabus (not really), but close.
• Online, FRSecure homepage  Events  2019 CISSP Mentor
Program
CISSP® MENTOR PROGRAM – SESSION ONE
33
MENTOR PROGRAM SCHEDULE & CLASS STRUCTURE
Class schedule
• There is a boatload of information to memorize for the
exam, and you’ll appreciate the breaks; we’ve built in
three of them (4/22, 5/8, and 5/27).
• Evan and/or Brad will lead classes, switching things up to
keep things fresh.
• We’re easing into things this first week; only this
introduction and one domain (Domain 1: Security and
Risk Management).
NOTE: We do have some volunteers to teach. We’ll figure
out how to use them. 
CISSP® MENTOR PROGRAM – SESSION ONE
34
MENTOR PROGRAM SCHEDULE & CLASS STRUCTURE
Class schedule
• Every class is structured similarly, starting with a brief
recap of the previous content/session, then:
• Questions.
• Quiz.
• Current Events.
• Lecture.
• Homework (you’ll appreciate the breaks…)
• If you’re interested in organizing a study group, send us
an email.
CISSP® MENTOR PROGRAM – SESSION ONE
35
MENTOR PROGRAM SCHEDULE & CLASS STRUCTURE
Class schedule
• We are here to help!
• If you have any questions, at any time, please send them
to Brandon bmatis@frsecure.com. Is that right?
• Content will be made available to all students, including
slides, handouts, and video recordings.
CISSP® MENTOR PROGRAM – SESSION ONE
36
MENTOR PROGRAM SCHEDULE & CLASS STRUCTURE
Class schedule
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
37
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
38
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
39
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
40
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
41
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
42
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
43
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
44
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
45
WHAT IS A CISSP?
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
46
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
CISSP® MENTOR PROGRAM – SESSION ONE
47
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
• For the latest (and official) information about the CISSP,
refer to the (ISC)2 website;
https://www.isc2.org/Certifications/CISSP
• The four steps to the CISSP:
1. Meet CISSP Eligibility
2. Schedule the Exam
3. Pass the Exam
4. Agree to the Code of Ethics and get endorsed.
CISSP® MENTOR PROGRAM – SESSION ONE
48
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
• Title: CISSP Study Guide, Third Edition (Paperback) by
Eric Conrad, Seth Misenar, & Joshua Feldman.
• ISBN-10: 0128024372
• ISBN-13: 978-0128024379
CISSP® MENTOR PROGRAM – SESSION ONE
49
THE BOOK
CISSP Study Guide – Third Edition
• If you don’t have it, you can
get it in a variety of place;
Amazon, Elsevier, Borders,
etc.
• I prefer the book in Adobe
Acrobat format; easy
reference and copy/paste
capabilities.
CISSP® MENTOR PROGRAM – SESSION ONE
50
THE BOOK
CISSP Study Guide – Third Edition
CISSP® MENTOR PROGRAM – SESSION ONE
51
READY?! LET’S DIG IN.
• How to prepare for the Exam
• How to take the Exam
• Sticking with it!
CISSP® MENTOR PROGRAM – SESSION ONE
52
CHAPTER 1 - INTRODUCTION
EXAM OBJECTIVES IN THIS CHAPTER
• Used to be six hours and 250 questions.
• Now it’s three hours and 150 questions! (not in the book)
• Computer-based testing (“CBT”) at Pearson Vue, used to
be paper and pencil (Evan’s old!)
• Two (sort of four) types of questions:
• Multiple Choice (four options, two are almost obviously wrong)
• “Advanced Innovative”
• Scenario
• Drag/Drop
• Hotspot
CISSP® MENTOR PROGRAM – SESSION ONE
53
CHAPTER 1 - INTRODUCTION
How to take the Exam
• This is a question for you.
• This is a question that our industry still struggles with.
• Don’t forget this…
CISSP® MENTOR PROGRAM – SESSION ONE
54
BONUS – INFORMATION SECURITY FUNDAMENTALS
What is Information Security?
Information security is managing risks to the confidentiality,
integrity, and availability of information using administrative,
physical and technical controls.
• This is a question for you.
• This is a question that our industry still struggles with.
• Don’t forget this…
CISSP® MENTOR PROGRAM – SESSION ONE
55
BONUS – INFORMATION SECURITY FUNDAMENTALS
What is Information Security?
Information security is managing risks to the confidentiality,
integrity, and availability of information using administrative,
physical and technical controls.
• This is a question for you.
• This is a question that our industry still struggles with.
• Don’t forget this…
CISSP® MENTOR PROGRAM – SESSION ONE
56
BONUS – INFORMATION SECURITY FUNDAMENTALS
What is Information Security?
Information security is managing risks to the confidentiality,
integrity, and availability of information using administrative,
physical and technical controls.
• This is a question for you.
• This is a question that our industry still struggles with.
• Don’t forget this…
CISSP® MENTOR PROGRAM – SESSION ONE
57
BONUS – INFORMATION SECURITY FUNDAMENTALS
What is Information Security?
Information security is managing risks to the confidentiality,
integrity, and availability of information using administrative,
physical and technical controls.
• This is a question for you.
• This is a question that our industry still struggles with.
• Don’t forget this (either)…
CISSP® MENTOR PROGRAM – SESSION ONE
58
BONUS – INFORMATION SECURITY FUNDAMENTALS
What is Risk?
• This is a question for you.
• This is a question that our industry still struggles with.
• Don’t forget this (either)…
CISSP® MENTOR PROGRAM – SESSION ONE
59
BONUS – INFORMATION SECURITY FUNDAMENTALS
What is Risk?
Risk is the likelihood of something bad happening and the
impact if it did.
1. A business is in business to make money.
2. Information Security is a business issue.
3. Information Security is fun.
4. People are the biggest risk.
5. “Compliant” and “secure” are different.
CISSP® MENTOR PROGRAM – SESSION ONE
60
BONUS – INFORMATION SECURITY FUNDAMENTALS
Ten Information Security Principles
6. There is no common sense in Information
Security.
7. “Secure” is relative.
8. Information Security should drive business.
9. Information Security is not one size fits all.
10.There is no “easy button”.
CISSP® MENTOR PROGRAM – SESSION ONE
61
BONUS – INFORMATION SECURITY FUNDAMENTALS
Ten Information Security Principles
• We’re very excited that we get to be a part of your
information security career journey!
• This will be a rewarding experience.
For most of you:
This will get hard. This will seem dry. This will seem
overwhelming.
Don’t give up!
CISSP® MENTOR PROGRAM – SESSION ONE
62
THAT’S IT. NEXT?
That’s it for today…
• Homework for Wednesday (4/10):
• Please get the book if you haven’t already.
• Please read Chapter 1 (pages 1 – 10).
• We will be covering Chapter 2 Domain 1: Security and
Risk Management (e.g., Security, Risk, Compliance,
Law, Regulations, Business Continuity) on
Wednesday.
CISSP® MENTOR PROGRAM – SESSION ONE
63
THAT’S IT. NEXT?
That’s it for today…
See you Wednesday!
Evan Francen Brad Nigh
@evanfrancen @BradNigh

Contenu connexe

Tendances

2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Eight
2019  FRSecure CISSP Mentor Program: Class Eight2019  FRSecure CISSP Mentor Program: Class Eight
2019 FRSecure CISSP Mentor Program: Class EightFRSecure
 
2018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 82018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 8FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 92020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 9FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 62020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 6FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class ElevenFRSecure
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017FRSecure
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramFRSecure
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 82020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 8FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3 2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3 FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 52020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 5FRSecure
 
Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingFRSecure
 
2020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 112020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 11FRSecure
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6FRSecure
 
2018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 92018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 9FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class FourFRSecure
 

Tendances (20)

2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 
2019 FRSecure CISSP Mentor Program: Class Eight
2019  FRSecure CISSP Mentor Program: Class Eight2019  FRSecure CISSP Mentor Program: Class Eight
2019 FRSecure CISSP Mentor Program: Class Eight
 
2018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 82018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 8
 
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4
 
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 92020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 9
 
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 62020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 6
 
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
 
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 82020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 8
 
2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3 2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3
 
2020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 52020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 5
 
Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration Testing
 
2020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 112020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 11
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6
 
2018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 92018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 9
 
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four
 

Similaire à 2019 FRSecure CISSP Mentor Program: Class One

2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureSecurity Innovation
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1FRSecure
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Brad Deflin
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramTyrone Grandison
 
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyberskills shortage:Where is the cyber workforce of tomorrowCyberskills shortage:Where is the cyber workforce of tomorrow
Cyberskills shortage: Where is the cyber workforce of tomorrowStephen Cobb
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferMAX Technical Training
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?PECB
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 

Similaire à 2019 FRSecure CISSP Mentor Program: Class One (20)

2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity Program
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyberskills shortage:Where is the cyber workforce of tomorrowCyberskills shortage:Where is the cyber workforce of tomorrow
Cyberskills shortage: Where is the cyber workforce of tomorrow
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson Helfer
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 

Plus de FRSecure

2020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 72020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 7FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Seven2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class SevenFRSecure
 
2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Six2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class SixFRSecure
 
2018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 112018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 11FRSecure
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5FRSecure
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4FRSecure
 

Plus de FRSecure (7)

2020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 72020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 7
 
2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Seven2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Seven
 
2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Six2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Six
 
2018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 112018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 11
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4
 

Dernier

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

2019 FRSecure CISSP Mentor Program: Class One

  • 1. 2019 CISSP MENTOR PROGRAM April 8, 2019 ----------- Class 1 – April 8, 2019 Instructors: • Brad Nigh, FRSecure Director of Professional Services & Innovation • Evan Francen, FRSecure & SecurityStudio CEO • Maybe some others later…
  • 2. CISSP® MENTOR PROGRAM – SESSION ONE 1 INTRODUCTION Just kidding! This will be awesome!
  • 3. • What is the CISSP Mentor Program? • History • 2010 – 1st Class – 6 students • Today – 10th Class – 400+ students! • Why do we do it? • Success stories • Heck, it’s free! What have you got to lose? CISSP® MENTOR PROGRAM – SESSION ONE 2 INTRODUCTION Welcome! We have a severe talent shortage problem in our industry. Good news for you…
  • 4. • Introduction • Our severe talent shortage problem… • Mentor Program Schedule & Class structure • What is a CISSP? • The book. **TIPS** • Chapter 1 – Introduction (the other one). CISSP® MENTOR PROGRAM – SESSION ONE 3 INTRODUCTION Welcome – Today’s Agenda
  • 5. 2019 INFORMATION SECURITY PROJECTS INTRODUCTION Let’s get started, but first a joke. 4 What do you call fake spaghetti?
  • 6. 2019 INFORMATION SECURITY PROJECTS INTRODUCTION Let’s get started, but first a joke. 5 What do you call fake spaghetti? An impasta.
  • 7. • Co-founder and CEO of FRSecure LLC/Co-founder and CEO of SecurityStudio® • More than 25 years of “practical” information security experience. • Ambitious mission; fix the broken industry. • Co-inventor of SecurityStudio®, the platform for managing information security risk. • Co-inventor of FISA™, the Fiducial Information Security Assessment. FISA™ is used by more than 800 companies across 28 industries to assess and manage information security risk. • Co-inventor of FISASCORE®, the definitive measurement of information security and vendor risk. CISSP® MENTOR PROGRAM – SESSION ONE 6 INTRODUCTION About Evan Me, on most days When they make me clean up (a bit) “Evan’s straightforward analysis of information security risk as fractured, incomplete and disconnected is spot on.” – CISO, University of Miami @evanfrancen
  • 8. • Advised legal counsel in high-profile breaches including Target and Blue Cross/Blue Shield. • 2014/2015 - Consultant to the Special Litigation Committee of the Board of Directors of Target Corporation; derivative action related to the “Target Breach”. • 2015/2016 – Consultant to legal counsel and Blue Cross/Blue Shield related to remediation efforts (post-breach). • Served as an expert witness is multiple federal criminal cases, mostly involving alleged stolen trade secrets • Served 100s of companies; big (Wells Fargo, Target, US Bank, UnitedHealth, etc.) and small. • Lots of television and radio, lots of information security talks at conferences, and 750+ published articles about a variety of information security topics. CISSP® MENTOR PROGRAM – SESSION ONE 7 INTRODUCTION About Evan Me, on most days When they make me clean up (a bit) “I don’t think I’ve met a more successful guy in this industry with less bullshit.” – Roger Grimes @evanfrancen
  • 9. And then… There’s a book. You should get your copy. I think it’s good for you. CISSP® MENTOR PROGRAM – SESSION ONE 8 INTRODUCTION About Evan Me, on most days When they make me clean up (a bit) https://www.amazon.com/Unsecurity-Information-security-failing- epidemic/dp/164343974X/ @evanfrancen
  • 10. But… My FAVORITE THREE THINGS are… CISSP® MENTOR PROGRAM – SESSION ONE 9 INTRODUCTION About Evan Me, on most days (too) People… My people! Information security isn’t as much about information or security as it is about people. @evanfrancen
  • 11. But… My FAVORITE THREE THINGS are… CISSP® MENTOR PROGRAM – SESSION ONE 10 INTRODUCTION About Evan Me, on most days (too) The Unsecurity Podcast with Brad Nigh! @evanfrancen
  • 12. But… My FAVORITE THREE THINGS are… CISSP® MENTOR PROGRAM – SESSION ONE 11 INTRODUCTION About Evan Me, on most days (too) The CISSP Mentor Program! 2010 – Six(6) students. 2019 – More than four hundred(400+) @evanfrancen
  • 13. • 20+ years of overall IT experience, started with FRSecure in 2016 • CISSP Mentor Program Lead • FRSecure Workshop Series Lead • Co-host of UNSECURITY Podcast with Evan • CISM, CISSP, CCSFP, CSSA, MCSA: Windows Server 2012, ITIL v.3 Foundations • ISC2 Safe and Secure Online volunteer • Wayzata Schools COMPASS program CyberSecurity Mentor • Passionate about information security and happy to be here! CISSP® MENTOR PROGRAM – SESSION ONE 12 INTRODUCTION About Brad @BradNigh
  • 14. Expert-level, product agnostic information security management and consulting firm. • Established in 2008, but didn’t really start until 2010. • Started by a security guy who was tired of taking shortcuts, tired of the money grab, and tired of checking boxes. • Information security is about people, and it’s a lot of hard work. • Eight core values, and ten security principles. • Core services include: • Security Risk Analysis – using FISASCORE® • Social Engineering Services • Penetration Testing Services • PCI QSA Services • Incident Management Services • HITRUST Services • Information Security Training & Awareness • vServices (vCISO, vISO, and vISA) CISSP® MENTOR PROGRAM – SESSION ONE 13 INTRODUCTION About FRSecure
  • 15. Like 70+ unicorns. CISSP® MENTOR PROGRAM – SESSION ONE 14 INTRODUCTION About FRSecure Cool, right?!
  • 16. • Chapter 10 – Unsecurity • No shortage of stories about our impending doom. • Another take (from me) - No Easy Button Solution To Cybersecurity’s Skills Shortage (https://www.cybersecurityintelligence.com/blog/no- easy-button-solution-to-cybersecuritys-skills-shortage-4150.html) • Some people claim that there is no shortage, or that it’s overhyped. • The truth is probably somewhere in the middle, but there is plenty of opportunity! CISSP® MENTOR PROGRAM – SESSION ONE 15 OUR SEVERE TALENT SHORTAGE PROBLEM…
  • 17. CISSP® MENTOR PROGRAM – SESSION ONE 16 OUR SEVERE TALENT SHORTAGE PROBLEM… Some truth. Source: CyberSeek – www.cyberseek.org
  • 18. CISSP® MENTOR PROGRAM – SESSION ONE 17 OUR SEVERE TALENT SHORTAGE PROBLEM… Some truth. Source: CyberSeek – www.cyberseek.org
  • 19. CISSP® MENTOR PROGRAM – SESSION ONE 18 OUR SEVERE TALENT SHORTAGE PROBLEM… This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Some truth. Source: CyberSeek – www.cyberseek.org Source: United States Census Bureau
  • 20. • Report from Cybersecurity Ventures estimates there will be 3.5 million unfilled cybersecurity jobs by 2021, up from 1 million openings last year. • ISACA predicts there will be a global shortage of two million cyber security professionals by 2019. • National Association of Software and Services Companies (NASSCOM) estimates India will need 1 million cybersecurity professionals by 2020. • Cyber crime is expected to cost the world $6 trillion by 2021. CISSP® MENTOR PROGRAM – SESSION ONE 19 OUR SEVERE TALENT SHORTAGE PROBLEM… Some truth.
  • 21. • One of the most in-demand cyber security roles is security analyst. • In 2012 there were 72,670 security analyst jobs in the U.S., with median earnings of $86,170. Three years later, there were 88,880 such analysts making $90,120. • Compensation for the most senior roles in cyber security, like chief information security officer, can reach $400,000. • 70 percent of cybersecurity professionals say the cybersecurity skills shortage has had an impact on their organization. • More than two-thirds (67 percent) of cybersecurity professionals claim they are too busy with their jobs to keep up with skills development and training. • 49 percent of cybersecurity professionals are solicited to consider other cybersecurity jobs by various types of recruiters at least once per week. CISSP® MENTOR PROGRAM – SESSION ONE 20 OUR SEVERE TALENT SHORTAGE PROBLEM… Some truth.
  • 22. • There is no shortage of bad advice, and some of it can be attributed to the “talent” shortage. • “Information security training and awareness is a waste of time and resources” • “An information security risk assessment is not necessary for a well-run security program” • “You must get an information security degree to become a good information security professional” • “Information security is an IT issue, not a business issue” CISSP® MENTOR PROGRAM – SESSION ONE 21 OUR SEVERE TALENT SHORTAGE PROBLEM… Bad Advice Consider the source
  • 23. • What makes a “good” information security professional? • Recent backlash from the Equifax Breach, noted that Susan Mauldin (former Chief Security Officer) had a music degree; therefore, she must have been unqualified. CISSP® MENTOR PROGRAM – SESSION ONE 22 OUR SEVERE TALENT SHORTAGE PROBLEM… “Good” Security Talent “a problem emerges: according to LinkedIn, Mauldin’s stated educational background has no security or technology credentials, and consists of.... a bachelor’s degree in music composition (magna cum laude) and a Master of Fine Arts degree in music composition (summa cum laude), both from the University of Georgia. Once again, this is the person who was in charge of keeping your personal and financial data safe — and whose failure to do that have put 143 million at risk from identity theft and fraud.” (Source: https://www.zerohedge.com/news/2017-09-15/another- equifax-coverup-did-company-scrub-its-chief-security-officer-was- music-major)
  • 24. • What makes a “good” information security professional? • Recent backlash from the Equifax Breach, noted that Susan Mauldin (former Chief Security Officer) had a music degree; therefore, she must have been unqualified. CISSP® MENTOR PROGRAM – SESSION ONE 23 OUR SEVERE TALENT SHORTAGE PROBLEM… “Good” Security Talent When Congress hauls in Equifax CEO Richard Smith to grill him, it can start by asking why he put someone with degrees in music in charge of the company’s data security. And then they might also ask him if anyone at the company has been involved in efforts to cover up Susan Mauldin’s lack of educational qualifications since the data breach became public. It would be fascinating to hear Smith try to explain both of those extraordinary items. (Source: https://www.marketwatch.com/story/equifax-ceo-hired-a- music-major-as-the-companys-chief-security-officer-2017-09-15)
  • 25. • What makes a “good” information security professional? • Some people believe that you cannot be “good” without a technical degree, others believe that you cannot be “good” without certifications like a CISSP, CISM, etc. • There are thousands of awesome security practitioners who have no information security degree whatsoever. CISSP® MENTOR PROGRAM – SESSION ONE 24 OUR SEVERE TALENT SHORTAGE PROBLEM… “Good” Security Talent Defining “Good” • At FRSecure we “grow unicorns”. • There are three things that make a unicorn: • Intangibles – the things you can’t teach. • Education – the “book smarts”. Education can come in a variety of forms; degree programs, books, in-person instruction, mentorship, certification preparation, etc. • Experience – the “street smarts”. The best way to gain experience is by doing. • The three ingredients are not mutually exclusive and there are all sorts of ways.
  • 26. • Supply – we don’t have enough information security people. • Acquisition – we can’t find enough good information security people for ourselves. • Retention – we can’t keep good information security people for ourselves (and in some cases, in our industry). • Culture – we have a “bro culture” problem that isn’t helping. CISSP® MENTOR PROGRAM – SESSION ONE 25 OUR SEVERE TALENT SHORTAGE PROBLEM… Supply and Demand - acquisition, retention, and our culture
  • 27. • Two sources; people willing to change careers, and younger people entering the workforce. • Career Changers - If you were interested in getting into our field, where would you start? • A bachelor’s degree in cyber security will cost somewhere between $20,000 - $60,000, or more. This might get you an entry-level job. A master’s degree will cost much more. (Source: https://www.onlineu.org/most-affordable-colleges/cyber- security-degrees) • Certification? Training to pass the CISSP® exam can range from $3,000 - $5,000, or more, and the exam itself will set you back another $699. • Cost is a barrier to entry. Most people don’t have this amount of money lying around. • Younger People – Not enough education options (getting better, but not fast enough). CISSP® MENTOR PROGRAM – SESSION ONE 26 OUR SEVERE TALENT SHORTAGE PROBLEM… This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Supply and Demand - acquisition, retention, and our culture
  • 28. • Early Education – schools are starting programs, and they’re working. Many examples. • Free Education • FRSecure’s Mentor Program (https://frsecure.com/cissp-mentor-program/) • SANS Cyber Aces Online (http://www.cyberaces.org/courses/) • Cybrary (https://www.cybrary.it/catalog/) • Cyber Degrees (https://www.cyberdegrees.org/) • Mentorship – no single dominant program; this requires more of us giving back. • Hire Intangibles – and train/educate for the rest. Can be a good acquisition strategy too. • Internships – becoming more popular, but we need more. CISSP® MENTOR PROGRAM – SESSION ONE 27 OUR SEVERE TALENT SHORTAGE PROBLEM… Supply and Demand - acquisition, retention, and our culture
  • 29. • Our industry culture is not always conducive to attracting and retaining talent. • Some of the results of our culture are gender inequity and minority inequity. • Women make up 49.56% of the world’s population, but only make up 11% of the information security workforce. • 26% of our workforce is non-Caucasian (or “white”) male. CISSP® MENTOR PROGRAM – SESSION ONE 28 OUR SEVERE TALENT SHORTAGE PROBLEM… Supply and Demand - acquisition, retention, and our culture “In a survey of 580 scheduled attendees of the Black Hat 2017 conference to be held in Las Vegas, Black Hat found that 71% of respondents felt their companies lacked sufficient staff to defend itself against current cyberthreats. And, although less than half of respondents (45%) were "concerned" about the shortage of women and minorities in the information security”
  • 30. • Since our industry is so male dominated, there’s a “bro culture” that exists. • “It’s a very male-dominated culture.” “It can be a little more crass, a little bit more rough and maybe some … females don’t like that, and it is off-putting.” – Ellison Anne Williams, Ph.D., founder and chief executive of Enveil, a Fulton, Md., data security company. • It’s not only the people in our industry that contribute to the problem. Customers, clients, and other normal people also assume that information security is a male sport. • “They have clients who won’t speak directly to them, It’s the assumption that the woman is not the lead on the project. They just default to speaking to the men.” - Leah Figueroa, lead data engineer at Gravwell, a data analytics company out of Coeur D’Alene, Idaho (Source: http://www.govtech.com/workforce/Why-Are-So-Few-Women-in-Cybersecurity.html) • This culture didn’t start in our industry and it’s not exclusive to our industry either. CISSP® MENTOR PROGRAM – SESSION ONE 29 OUR SEVERE TALENT SHORTAGE PROBLEM… Supply and Demand - acquisition, retention, and our culture
  • 31. • Promote and participate in more diversity initiatives and programs. • Studies prove the more diverse work groups produce more creative a better results. • A partial list of resources for women: • SANS CyberTalent Immersion Academy for Women - https://www.sans.org/cybertalent/immersion-academy • Computer Science for Cyber Security (CS4CS) Summer Program for High School Women - http://engineering.nyu.edu/k12stem/cs4cs/ • Women’s Society of Cyberjutsu (WSC) - http://womenscyberjutsu.org/ • Women in Cyber Security (WiCyS) - https://www.wicys.net/ CISSP® MENTOR PROGRAM – SESSION ONE 30 OUR SEVERE TALENT SHORTAGE PROBLEM… Supply and Demand - acquisition, retention, and our culture
  • 32. • One more thing. • Go get this. • It’s free. CISSP® MENTOR PROGRAM – SESSION ONE 31 INTRODUCTION Our severe talent shortage problem…
  • 33. CISSP® MENTOR PROGRAM – SESSION ONE 32 MENTOR PROGRAM SCHEDULE & CLASS STRUCTURE Syllabus (not really), but close.
  • 34. • Online, FRSecure homepage  Events  2019 CISSP Mentor Program CISSP® MENTOR PROGRAM – SESSION ONE 33 MENTOR PROGRAM SCHEDULE & CLASS STRUCTURE Class schedule
  • 35. • There is a boatload of information to memorize for the exam, and you’ll appreciate the breaks; we’ve built in three of them (4/22, 5/8, and 5/27). • Evan and/or Brad will lead classes, switching things up to keep things fresh. • We’re easing into things this first week; only this introduction and one domain (Domain 1: Security and Risk Management). NOTE: We do have some volunteers to teach. We’ll figure out how to use them.  CISSP® MENTOR PROGRAM – SESSION ONE 34 MENTOR PROGRAM SCHEDULE & CLASS STRUCTURE Class schedule
  • 36. • Every class is structured similarly, starting with a brief recap of the previous content/session, then: • Questions. • Quiz. • Current Events. • Lecture. • Homework (you’ll appreciate the breaks…) • If you’re interested in organizing a study group, send us an email. CISSP® MENTOR PROGRAM – SESSION ONE 35 MENTOR PROGRAM SCHEDULE & CLASS STRUCTURE Class schedule
  • 37. • We are here to help! • If you have any questions, at any time, please send them to Brandon bmatis@frsecure.com. Is that right? • Content will be made available to all students, including slides, handouts, and video recordings. CISSP® MENTOR PROGRAM – SESSION ONE 36 MENTOR PROGRAM SCHEDULE & CLASS STRUCTURE Class schedule
  • 38. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 37 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 39. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 38 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 40. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 39 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 41. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 40 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 42. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 41 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 43. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 42 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 44. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 43 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 45. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 44 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 46. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 45 WHAT IS A CISSP? This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. The Certified Information Systems Security Professional (or “CISSP”)
  • 47. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 46 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 48. Get your Ultimate Guide to the CISSP @ https://www.isc2.org/Certifications/Ultimate-Guides/CISSP? CISSP® MENTOR PROGRAM – SESSION ONE 47 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 49. • For the latest (and official) information about the CISSP, refer to the (ISC)2 website; https://www.isc2.org/Certifications/CISSP • The four steps to the CISSP: 1. Meet CISSP Eligibility 2. Schedule the Exam 3. Pass the Exam 4. Agree to the Code of Ethics and get endorsed. CISSP® MENTOR PROGRAM – SESSION ONE 48 WHAT IS A CISSP? The Certified Information Systems Security Professional (or “CISSP”)
  • 50. • Title: CISSP Study Guide, Third Edition (Paperback) by Eric Conrad, Seth Misenar, & Joshua Feldman. • ISBN-10: 0128024372 • ISBN-13: 978-0128024379 CISSP® MENTOR PROGRAM – SESSION ONE 49 THE BOOK CISSP Study Guide – Third Edition
  • 51. • If you don’t have it, you can get it in a variety of place; Amazon, Elsevier, Borders, etc. • I prefer the book in Adobe Acrobat format; easy reference and copy/paste capabilities. CISSP® MENTOR PROGRAM – SESSION ONE 50 THE BOOK CISSP Study Guide – Third Edition
  • 52. CISSP® MENTOR PROGRAM – SESSION ONE 51 READY?! LET’S DIG IN.
  • 53. • How to prepare for the Exam • How to take the Exam • Sticking with it! CISSP® MENTOR PROGRAM – SESSION ONE 52 CHAPTER 1 - INTRODUCTION EXAM OBJECTIVES IN THIS CHAPTER
  • 54. • Used to be six hours and 250 questions. • Now it’s three hours and 150 questions! (not in the book) • Computer-based testing (“CBT”) at Pearson Vue, used to be paper and pencil (Evan’s old!) • Two (sort of four) types of questions: • Multiple Choice (four options, two are almost obviously wrong) • “Advanced Innovative” • Scenario • Drag/Drop • Hotspot CISSP® MENTOR PROGRAM – SESSION ONE 53 CHAPTER 1 - INTRODUCTION How to take the Exam
  • 55. • This is a question for you. • This is a question that our industry still struggles with. • Don’t forget this… CISSP® MENTOR PROGRAM – SESSION ONE 54 BONUS – INFORMATION SECURITY FUNDAMENTALS What is Information Security? Information security is managing risks to the confidentiality, integrity, and availability of information using administrative, physical and technical controls.
  • 56. • This is a question for you. • This is a question that our industry still struggles with. • Don’t forget this… CISSP® MENTOR PROGRAM – SESSION ONE 55 BONUS – INFORMATION SECURITY FUNDAMENTALS What is Information Security? Information security is managing risks to the confidentiality, integrity, and availability of information using administrative, physical and technical controls.
  • 57. • This is a question for you. • This is a question that our industry still struggles with. • Don’t forget this… CISSP® MENTOR PROGRAM – SESSION ONE 56 BONUS – INFORMATION SECURITY FUNDAMENTALS What is Information Security? Information security is managing risks to the confidentiality, integrity, and availability of information using administrative, physical and technical controls.
  • 58. • This is a question for you. • This is a question that our industry still struggles with. • Don’t forget this… CISSP® MENTOR PROGRAM – SESSION ONE 57 BONUS – INFORMATION SECURITY FUNDAMENTALS What is Information Security? Information security is managing risks to the confidentiality, integrity, and availability of information using administrative, physical and technical controls.
  • 59. • This is a question for you. • This is a question that our industry still struggles with. • Don’t forget this (either)… CISSP® MENTOR PROGRAM – SESSION ONE 58 BONUS – INFORMATION SECURITY FUNDAMENTALS What is Risk?
  • 60. • This is a question for you. • This is a question that our industry still struggles with. • Don’t forget this (either)… CISSP® MENTOR PROGRAM – SESSION ONE 59 BONUS – INFORMATION SECURITY FUNDAMENTALS What is Risk? Risk is the likelihood of something bad happening and the impact if it did.
  • 61. 1. A business is in business to make money. 2. Information Security is a business issue. 3. Information Security is fun. 4. People are the biggest risk. 5. “Compliant” and “secure” are different. CISSP® MENTOR PROGRAM – SESSION ONE 60 BONUS – INFORMATION SECURITY FUNDAMENTALS Ten Information Security Principles
  • 62. 6. There is no common sense in Information Security. 7. “Secure” is relative. 8. Information Security should drive business. 9. Information Security is not one size fits all. 10.There is no “easy button”. CISSP® MENTOR PROGRAM – SESSION ONE 61 BONUS – INFORMATION SECURITY FUNDAMENTALS Ten Information Security Principles
  • 63. • We’re very excited that we get to be a part of your information security career journey! • This will be a rewarding experience. For most of you: This will get hard. This will seem dry. This will seem overwhelming. Don’t give up! CISSP® MENTOR PROGRAM – SESSION ONE 62 THAT’S IT. NEXT? That’s it for today…
  • 64. • Homework for Wednesday (4/10): • Please get the book if you haven’t already. • Please read Chapter 1 (pages 1 – 10). • We will be covering Chapter 2 Domain 1: Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity) on Wednesday. CISSP® MENTOR PROGRAM – SESSION ONE 63 THAT’S IT. NEXT? That’s it for today… See you Wednesday! Evan Francen Brad Nigh @evanfrancen @BradNigh