SlideShare a Scribd company logo
SKILLS &
CAREERS IN
CYBERSECURITY
WE NEED MORE THAN HACKERS WITH LEET SKILZ)
Sandy Dunn, CISO BlueCross of Idaho
March 9, 2018 12:00 – 1:00 pm
Outline • Who am I
• What is my role in Cyber Security
• Career path / different perspective
provided value
• Diversity more than XY or XX
• Security roles at _________
• Finding opportunities
• Skills / Resumes / Interviews
Jobs I’ve had
• Waitress
• BarTender
• Pushed cows sales yard
• Filled doughnuts with jelly at bakery
• Rodeo crew
• Radio Sales
• Office Manager
• Software Sales
• Computer Sales
• HorseTrader
• Competitive Intelligence
• ACTTeam
• PSOTeam
• Information Security Officer
• Cybersecurity Product Security Strategist
• IT SecurityArchitect
• Chief Information Security Officer (CISO)
My best skill: saying “I don’t get it”
Goal of Diversity:
Build a culture that celebrates and encourages each employee to be open and bring their best selves and best ideas.
What is a CISO ?
• Senior executive responsible for establishing and
maintaining the enterprise vision, strategy, and program
to ensure information assets and technologies are
adequately protected.
• Identify, develop, implement, and maintain processes
across the enterprise to reduce information security risk
• Respond to incidents, establish standards and controls,
manage security technologies, and direct the
establishment and implementation of policies and
procedures.
Top Priorities
Top Challenges
My Perspective on
where the security
industry is going
• Ensure our organization is ready for Smart
Healthcare, protecting information, any
where, any time, on any device
• Technical debt, increased availability
expectations, increased threats
• Just like airplanes and cars it took us a long
time until we understood what safe is
What do
they need
to
protect?
Who do
they need
to protect
it from?
How do
they
protect it?
• What do they do?
• Who are their customers?
Questions
Compliance or
regulatory requirements
?
How is technology used
?
Where are their
customer’s located
How are transactions
made? Invoices, credit
card?
• How do they get paid
• Who pays the business, how?
Do they do
development? What do
they develop?
How do they engage
with 3rd parties?
• Supply chain
• Hosting / Cloud
CSO /
CISO
Security
Operations
Incidence
Response
IT Security
Architect
Developer /
Security
Quality /
Security
Risk
Management
IT Audit Compliance
Car
manufacturer
• PSIRT /
Bug
Bounty
• Network
• IP Leak
• Internal
domain
• Cars
Define Security
Requirements
• Security
functional &
non functional
Supply Chain
Software • Red team pen
test
• Red team pen
test
• Supply Chain
• Over seas
development
• ISO – manage
business vs
security
• Privacy
• GDPR
• Fraud
detection
• PCI
• Red team
pen test
Insurance • Respond
to board
• Budget
• Strategy
• Malware /
defense
• WAF
• Network
Firewall
• IAM / AD
PHI Data
Breach
• Application review
• Third party risk
• Security
Awareness
• Business
Continuity
• Disaster Recovery
• Control
review
• Validates
Operational
standards
• HIPAA
• DOI
• FEP
• Medicare
University • SEIM • Forensics • Secure configs • Policy
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf
Tasks
Knowledge
Skills
Ability
• Finding opportunities
• Skills
• Resumes
• Interviews
Caitlyn
• Figures out how she can add value
• Works HARD
• Super Positive
• Great Communicator
• Always FollowsThroughhttps://sites.google.com/view/thoughtsoncareerbuilding
BSIDES Idaho Falls
September 15, 2018
bsidesidahofalls.org
bsidesidahofalls@gmail.com
Summary
• Many different path to achieve your career goals
• Having different career experiences brings value
to each role
• Many different opportunities in Cyber Security
field where your strengths are a value
• Networking, networking, networking
Articles
The HPWeigh: Diversity and the Hardy-Weinberg Principle http://h20435.www2.hp.com/t5/HP-Labs-Blog/The-HP-Weigh-Diversity-and-the-Hardy-
Weinberg-Principle/ba-p/295220
TenThings toThink About ForYour Security Awareness Program https://www.sans.org/security-awareness-training/blog/ten-things-think-about-
your-security-awareness-program-guest-blog
Cyber Security AreWe Winning?
https://www.linkedin.com/pulse/cyber-security-we-winning-sandra-sandy-dunn/[linkedin.com]
Papers
The Scary andTerribleCode Signing ProblemYou Don’t KnowYou Have https://www.sans.org/reading-room/whitepapers/critical/scary-terrible-
code-signing-problem-you-36382
Defending Against theWeaponization ofTrust: Defense in Depth Assessment ofTLS https://www.giac.org/paper/gsna/4623/defending-
weaponization-trust-defense-in-depth-assessment-tls/116997
The BusinessCase forTLS Certificate Enterprise Key Management ofWeb Site Certificates: https://www.giac.org/paper/gccc/210/The-
Business-Case-for-TLS-Certificate-Enterprise-Key-Management-of-Web-Site-Certificates-Wrangling-TLS-Certificates-on-the-Wild-Web/116997
Superfish andTLS:A Case Study of BetrayedTrust and Legal Liability https://www.sans.org/reading-room/whitepapers/certificates/superfish-tls-
case-study-betrayed-trust-legal-liability-37532
Questions ?

More Related Content

PPTX
Shining a Light on Cyber Threats from the Dark Web
PDF
ZIGRAM Introduction September 2020
PDF
SEMTEXX IT Security Services
PPTX
Siskinds | Incident Response Plan
PDF
Building an insider threat program
PPTX
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
PPSX
Baretzky & Associates Presentation.
PDF
Data theft in india (K K Mookhey)
Shining a Light on Cyber Threats from the Dark Web
ZIGRAM Introduction September 2020
SEMTEXX IT Security Services
Siskinds | Incident Response Plan
Building an insider threat program
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Baretzky & Associates Presentation.
Data theft in india (K K Mookhey)

Similar to Bsu skills and_careers_in_cybersecurity (20)

PPTX
Opening the Talent Spigot to Securing our Digital Future
PPTX
Building Trust in Generative Artificial Intelligence
PDF
Building an effective Information Security Roadmap
PPTX
Global CISO Forum 2017: Privacy Partnership
PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PDF
Rothke stimulating your career as an information security professional
PDF
CNIT 160: Ch 2a: Introduction to Information Security Governance
PPTX
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
PPTX
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
PDF
Navigate LLC Overview
PDF
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
PDF
CISSO Certification | CISSO Training | CISSO
PPTX
Aligning Application Security to Compliance
PDF
CISSO Certification| CISSO Training | CISSO
PDF
Cleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MD
PPTX
How To Become An IT Security Risk Analyst
PDF
CI or FS Poly Cleared Job Fair Handbook | DC, MD, VA
PPTX
ANIn Pune July 2024 | Mastering the Data Paradox by Ashish Agrawal
PDF
Tivi - Tunnistautuminen - 2020
PPTX
Deconstructing Data Breach Cost
Opening the Talent Spigot to Securing our Digital Future
Building Trust in Generative Artificial Intelligence
Building an effective Information Security Roadmap
Global CISO Forum 2017: Privacy Partnership
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
Rothke stimulating your career as an information security professional
CNIT 160: Ch 2a: Introduction to Information Security Governance
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
Navigate LLC Overview
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
CISSO Certification | CISSO Training | CISSO
Aligning Application Security to Compliance
CISSO Certification| CISSO Training | CISSO
Cleared Job Fair Job Seeker Handbook May 24, 2018, BWI, MD
How To Become An IT Security Risk Analyst
CI or FS Poly Cleared Job Fair Handbook | DC, MD, VA
ANIn Pune July 2024 | Mastering the Data Paradox by Ashish Agrawal
Tivi - Tunnistautuminen - 2020
Deconstructing Data Breach Cost
Ad

More from Sandra (Sandy) Dunn (7)

PDF
Osint part 1_personal_privacy
PDF
Data goverance two_8.2.18 - copy
PDF
Your're Special (But Not That Special)
PDF
Step by-step-guide risk-security-dunn_firth_v.1.8
PDF
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
DOC
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
PPTX
Presentation2 certificate farce
Osint part 1_personal_privacy
Data goverance two_8.2.18 - copy
Your're Special (But Not That Special)
Step by-step-guide risk-security-dunn_firth_v.1.8
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Presentation2 certificate farce
Ad

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
A Presentation on Artificial Intelligence
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
KodekX | Application Modernization Development
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Reach Out and Touch Someone: Haptics and Empathic Computing
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
A Presentation on Artificial Intelligence
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
KodekX | Application Modernization Development

Bsu skills and_careers_in_cybersecurity

  • 1. SKILLS & CAREERS IN CYBERSECURITY WE NEED MORE THAN HACKERS WITH LEET SKILZ) Sandy Dunn, CISO BlueCross of Idaho March 9, 2018 12:00 – 1:00 pm
  • 2. Outline • Who am I • What is my role in Cyber Security • Career path / different perspective provided value • Diversity more than XY or XX • Security roles at _________ • Finding opportunities • Skills / Resumes / Interviews
  • 3. Jobs I’ve had • Waitress • BarTender • Pushed cows sales yard • Filled doughnuts with jelly at bakery • Rodeo crew • Radio Sales • Office Manager • Software Sales • Computer Sales • HorseTrader • Competitive Intelligence • ACTTeam • PSOTeam • Information Security Officer • Cybersecurity Product Security Strategist • IT SecurityArchitect • Chief Information Security Officer (CISO) My best skill: saying “I don’t get it” Goal of Diversity: Build a culture that celebrates and encourages each employee to be open and bring their best selves and best ideas.
  • 4. What is a CISO ? • Senior executive responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. • Identify, develop, implement, and maintain processes across the enterprise to reduce information security risk • Respond to incidents, establish standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures.
  • 5. Top Priorities Top Challenges My Perspective on where the security industry is going • Ensure our organization is ready for Smart Healthcare, protecting information, any where, any time, on any device • Technical debt, increased availability expectations, increased threats • Just like airplanes and cars it took us a long time until we understood what safe is
  • 6. What do they need to protect? Who do they need to protect it from? How do they protect it? • What do they do? • Who are their customers?
  • 7. Questions Compliance or regulatory requirements ? How is technology used ? Where are their customer’s located How are transactions made? Invoices, credit card? • How do they get paid • Who pays the business, how? Do they do development? What do they develop? How do they engage with 3rd parties? • Supply chain • Hosting / Cloud
  • 8. CSO / CISO Security Operations Incidence Response IT Security Architect Developer / Security Quality / Security Risk Management IT Audit Compliance Car manufacturer • PSIRT / Bug Bounty • Network • IP Leak • Internal domain • Cars Define Security Requirements • Security functional & non functional Supply Chain Software • Red team pen test • Red team pen test • Supply Chain • Over seas development • ISO – manage business vs security • Privacy • GDPR • Fraud detection • PCI • Red team pen test Insurance • Respond to board • Budget • Strategy • Malware / defense • WAF • Network Firewall • IAM / AD PHI Data Breach • Application review • Third party risk • Security Awareness • Business Continuity • Disaster Recovery • Control review • Validates Operational standards • HIPAA • DOI • FEP • Medicare University • SEIM • Forensics • Secure configs • Policy
  • 11. • Finding opportunities • Skills • Resumes • Interviews Caitlyn • Figures out how she can add value • Works HARD • Super Positive • Great Communicator • Always FollowsThroughhttps://sites.google.com/view/thoughtsoncareerbuilding BSIDES Idaho Falls September 15, 2018 bsidesidahofalls.org bsidesidahofalls@gmail.com
  • 12. Summary • Many different path to achieve your career goals • Having different career experiences brings value to each role • Many different opportunities in Cyber Security field where your strengths are a value • Networking, networking, networking
  • 13. Articles The HPWeigh: Diversity and the Hardy-Weinberg Principle http://h20435.www2.hp.com/t5/HP-Labs-Blog/The-HP-Weigh-Diversity-and-the-Hardy- Weinberg-Principle/ba-p/295220 TenThings toThink About ForYour Security Awareness Program https://www.sans.org/security-awareness-training/blog/ten-things-think-about- your-security-awareness-program-guest-blog Cyber Security AreWe Winning? https://www.linkedin.com/pulse/cyber-security-we-winning-sandra-sandy-dunn/[linkedin.com] Papers The Scary andTerribleCode Signing ProblemYou Don’t KnowYou Have https://www.sans.org/reading-room/whitepapers/critical/scary-terrible- code-signing-problem-you-36382 Defending Against theWeaponization ofTrust: Defense in Depth Assessment ofTLS https://www.giac.org/paper/gsna/4623/defending- weaponization-trust-defense-in-depth-assessment-tls/116997 The BusinessCase forTLS Certificate Enterprise Key Management ofWeb Site Certificates: https://www.giac.org/paper/gccc/210/The- Business-Case-for-TLS-Certificate-Enterprise-Key-Management-of-Web-Site-Certificates-Wrangling-TLS-Certificates-on-the-Wild-Web/116997 Superfish andTLS:A Case Study of BetrayedTrust and Legal Liability https://www.sans.org/reading-room/whitepapers/certificates/superfish-tls- case-study-betrayed-trust-legal-liability-37532