SlideShare une entreprise Scribd logo
1  sur  16
American Sentinel University ,[object Object],[object Object],[object Object],Presented by Paul Capicik 866-470-3743 [email_address] 26 Jan 2010
Overview ,[object Object],[object Object],[object Object]
The Security Career Path ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Skills, Aptitudes & Competencies  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2010 Top 20
What it Takes to Start or Restart in IT Security  ,[object Object],[object Object],[object Object],[object Object]
What it Takes to Start or Restart in IT Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What it Takes to Start or Restart in IT Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top 10 Security Certifications for 2010 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What it Takes to Start or Restart in IT Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What it Takes to Start or Restart in IT Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Job Outlook ,[object Object],[object Object],[object Object],[object Object],[object Object]
Job Outlook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Job Outlook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Steve Katz, the worlds first CISO recently said this about IT Security:  " … it is an opportunity that will take you from entry level to some very challenging, very high-paying professions in very large enterprises. “
Webinar take-aways  ,[object Object],[object Object],[object Object],[object Object],[object Object]
American Sentinel University ,[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security TrainingAngela Samuels
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...IJNSA Journal
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionTripwire
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and PrinterseLearning Consortium 電子學習聯盟
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
 
Cognitive Security Case Study
Cognitive Security Case StudyCognitive Security Case Study
Cognitive Security Case StudyCredo Ventures
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityShareDocView.com
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19IBM Sverige
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009edcervantes
 

Tendances (20)

Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
Cognitive Security Case Study
Cognitive Security Case StudyCognitive Security Case Study
Cognitive Security Case Study
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009
 

Similaire à IT Security Career Path Webinar

Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Thoughtworks
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapEnterprise Management Associates
 
State of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryState of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryCompTIA
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyerClaude Gelinas
 
The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writingtlinde
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryCompTIA
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxkatherncarlyle
 

Similaire à IT Security Career Path Webinar (20)

Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
State of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryState of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 Summary
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
 
The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
Advance Degree vs. IT Certification
Advance Degree vs. IT Certification Advance Degree vs. IT Certification
Advance Degree vs. IT Certification
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan Summary
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 

IT Security Career Path Webinar

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.

Notes de l'éditeur

  1. Not everyone that signed up has joined yet so we will give them another minute before we start. Our marketing partner David Berger will provide some webinar administrative comments. Welcome to the 2 nd American Sentinel University IT webinar. Today we’lll be talking about “An IT Security Career Path” As I prepared for this session, the quote shown here hit me a as the perfect way to peak your interest to listen to what will be covered. “This year and next year, bar none, security is THE smart place to be in IT.” Certainly there are qualifiers for this statement and it won’t apply to everyone, but for some it can provide an incentive to enter this field or reason to continue your personal quest for improvement in the security field. My name is Paul Capicik and I am the Military Program manager for American Sentinel University. I spent over 26 years in the Air Force followed by 12 years in the civilian corporate world in various director level positions including as a CIO Our intent for these webinars is to provide information that will assist you in making appropriate decisions about your education and career, and motivate you to reach your objectives as well as advance in your chosen career.
  2. As mentioned, this webinar will focus on the IT security path: I’ll mention a number of sub-paths and directions you can head in the security area Cover what employers are looking for And the current and near future Job outlook I want you to know I am not a security “Expert”, however in my CIO and IT director positions I was responsible for enterprise IT security so I am very familiar with general security requirements, methods, and resources. What you will hear in this webinar is based on that experience and recent references I have researched which I will provide to you at the end of the presentation.
  3. Those of you who participated in the 1 st seminar or read the security article know that IT can be broadly broken into 3 general areas: Systems, applications, and security. You will notice in this discussion that security is an integral part of the first two areas. But the field is now so broad and with very specific disciplines in many branches that it has become its own main field. When speaking of security in specific, it is often viewed today in 3 main areas: Risk management This is not just IT technology related; it affects business survival It deals with business and technology weaknesses, compliance, and liability And it deals with internal, external, and interfaces of people, processes, and resources. (It is not only about the hackers, but regulation compliance, litigation, internal threats, and other things, that can affect the business brand name, and financial status, as well as the IT environment itself.) Security is so important that large companies have appointed Chief Information Security Officers which can report to the CEO Fraud & Forensics Fraud is becoming an increasing threat, and is often internal to the organization Forensics is the investigative side of security And Application security This deals w/ the automated processes software (such as the financial, Customer Resource Management & logistics applications among others. More and more it deals w/ the web applications that interface w/ customers and B2B partners via the internet
  4. Here is a of the top 20 skills, aptitudes, and competencies employers will be looking for in the next 2 years according to some surveys. As you can see, the 3 main areas mentioned on the previous slide are represented here, as are some very focused areas such as biometrics, VOIP, and smart card and token security. These are all security measures and practices that are either currently in general use in business for IT security purposes, or they are new measures that show promise so companies/government will be wanting to implement these in their overall security measures program. This slide will be available later to download so don’t worry about copying this down.
  5. So if you are still interested in getting into the security arena, or get back into it, or continue on in this career path here is what you need to consider. For those that have attended the last webinar or read several of my articles this won’t be new: Academic Degrees, industry certifications and experience, all to be followed by “continuous updating” in all of these areas are what it will take to succeed.
  6. If you are trying to break into IT with an interest in security, it is often best to get the basics through a general IS (systems) or CS (application development) degree, which often speak to basic security, and then go to the specific security courses or degrees to supplement the “foundation” degrees. Don’t forget - IT in general and security paths in particular all cover a broad range of the IT world, and having that foundation knowledge-base will be very useful in whatever path you pursue. Not only that but many employers require degrees. For some of the higher skill level and salary level positions, a master’s or even a doctoral degree can be a requirement. American Sentinel has a general associate and bachelor’s degree in Information Systems and Computer Science as well as an Information Systems Security bachelor’s and an Information Systems Security concentration Master’s in Computer Science that can help you advance your degree needs.
  7. Certifications provide the focused and specific training and knowledge-base used in a specific environment. Some certifications deal with the basics (examples are several of the CompTIA certs like Network+ and Security+) Some deal with particular type paths (such as the CSSIP), some deal with certain type of resources (such as CISCO certs for those companies that use CISCO equipment, and Microsoft certs for those companies that use MS software). The path you take, and/or the company you work for, generally determine what certs you need or should consider taking. Again, American Sentinel has online certification training available in any of these and many more that you can start anytime. They provide 24/7 technical support and you use our partner’s servers and equipment in the training so you are not jeopardizing screwing up your computer in course exercises.
  8. Here is a recent survey list of the top 10 certifications employers will be looking for in 2010. This is not a list of certs you should run out to try to complete a bunch of. These are very focused certs that deal with a specific skill sets that many of today’s employers need to fill a specific higher/advance security level areas. If you have the background that complements what these certs are for and you are looking for a job or career change, having or getting one or more of these certs can enhance your hiring potential. Notice there are no basic or entry level certs mentioned here. For a services or hardware management firm, they may be looking for an entry level employee that can help set up computer stations to include setting security policies, and managing end-user password accounts, a CompTIA A+, network+ and/or Security+ may be all they require. But make no mistake, certs, just like degrees can be an important part of your personal portfolio that will be considered in the hiring or advancement process.
  9. Experience is often thought to be the most important ingredient an employee can have and much can be said to support that. There is no substitute for hands-on experience especially in a crisis as that knowledge is often readily available to be applied to the situation. So get all the experience you can, not just in your little corner of the world but in everything that touches your world or that your world may affect down stream. But a person rarely can “experience” all the parameters that are possible with a piece of equipment, software, or process. So read about, discuss with fellow employees, and think about what all the possibilities you could face. And add that to your actual experience toolbox. For those that are breaking into a new field, supplement actual on-the-job experience with that which you can pick up through other means like providing volunteer help to non-profits, family, or a second or temporary job. All experience is good experience. Some say bad experiences can be the best experience since it prepares you for the next crisis so you can minimize its impact.
  10. When you think you have covered all the academic, certification and experience bases, all I can say is that in the IT arena , you’ve just started. While I truly believe IT is an exciting field, it is also fast paced. And fast paced in this case prepare for change . 5 or 6 years ago, security wasn’t even considered a major IT area. Today we are looking at many new specialties and niches and a new functional corporate positions - the CSO and CISO. The CISO as I already mentioned is now being considered on the same level as other corporate “C” positions and reporting directly to the CEO. And the bad-guys are moving at break-neck speed to fleece people and global corporations that threaten their survival. I’m sure you have read or heard instances that security efforts right now are often loosing the battle or at least having a hard time keeping up. So your challenge is to keep to up or ahead of the threat and remain relevant. To do that you have to keep learning: A huge obstacle often heard is “I have too much work – I don’t have time!” Advancing your learning applies to all the security areas You must advance to not only to over come the threat but also to be able to evaluate new technologies and methods Many employers provide funding for you education and training even during the recession they have done this. And advancing means not only in technology but also knowing your employer’s company and business needs. If you do all this, you will likely have a secure job for the foreseeable future. If you don’t - IT security or IT in general may not be for you.
  11. For many years IT has been a great field to be in – often as one of the top 2 stable career fields. Security is the newest of the 3 main careers in IT and is really gaining traction. IT in general has had its booms and busts. For instance in 2003 recession unemployment for IT matched that of the general economy at 5.6%.
  12. In current times, IT is still often viewed as one of the top 2 career fields – HC being the other. But now SECURITY is the IT area in the spot light As for the current recession, general unemployment is over 10% while IT in general has only hit 5.2% Not the best but a lot better than average. While IT hiring in general is still fairly flat, Security hiring is on the rise. Not only that, but as I mentioned, even during the recession, many employers continued to fund advanced training for their security people IT unemployment has been lower in this recession because the economy continues to depend more and more on IT and employers need to keep these systems running so their business keeps functioning. As for security, the threat continues to increase to the point where business survival is at stake. Companies are taking this serious and are hiring high level security managers – and appointing security focused management people such as CSO’s & CISO’s to head up a specialized department. This is opening additional opportunities at the expert levels.
  13. For the future, the BLS and industry surveys show the IT career field remains promising, with SECURITY taking the lead. Remember the quote on the introduction slide: “This year and next year, bar none, security is the smart place to be in IT. – David Foote” This field will continue to broaden and become more specialized. It will be managed more centrally as seen with the institution of CSOs/CISO’s and placing of those individuals at higher reporting levels such as under CEOs. Steve Katz, the worlds first CISO recently said speaking of the IT security : " … it is an opportunity that will take you from entry level to some very challenging, very high-paying professions in very large enterprises.” He also said you have to “know your company and know your business” So you can’t just stick to the technology side of learning – get business background also. A significant shortage of “experts” exists today. However, security positions at all levels should increase. As companies higher back the normal work force, with the new emphasis on security, even the end-user IT support and employee security training levels (which deals with security basics) will help open entry level positions. A point brought out in several of the articles I’ve read recently is that initially the contractors and consulting firms will see the biggest growth rate as companies move ahead with security initiatives, but don’t want to commit to in-house staff until they have a better understanding of the economic recovery cycle. So if you are currently in the military and been working in the security area and can be considered an expert, your prospects should be bright. (I just read an article that the government alone is looking for a 1000 security experts to hire now and they think they will have a hard time filling those positions because of shortages of “security experts” and the competition from the civilian sector.
  14. So these are the take-aways I hope you got out of this session: As always I try to motivate people to pursue an IT career because it is exciting and can be a very gratifying and fulfilling career. Know what it takes to succeed and remain successful in this career path. Also know that it is a never ending challenge to keep relevant and ahead of the bad guys to help your employer survive . If you do that – you also will survive. Know “where” to look to keep yourself current and knowledgeable of future needs. American Sentinel is one place that has several of the degree and certification programs that can help you meet your goals and objectives. Finally don’t dwell on the challenges – focus on the opportunities that will open up to you as you meet and exceed those challenges.
  15. Now I will be happy to try to answer any questions you may have. and I also invite comments from the group on what you have experienced that may help or even caution others in pursuing an IT Security career path. And when the webinar is over you are welcome to call or email me at my contact information above.
  16. This is a list of references that back up what I discussed today. Note the date that these articles were published - all but 1 are within the last month and a half. I have included links to these so you can read the entire article of those that interest you. I hope you continue to participate in our article and webinar series and please - be a vocal participant. You more than me can provide peers with the most recent experiences that can help your fellow service members and families succeed. As a military person you know that teamwork is the best way to succeed. The audio and slides from this webinar have been recorded and a link to it will be available on the American Sentinel blog page. Again ,this is Paul Capicik and you have a great day!