SlideShare a Scribd company logo
Information Technology (IT) Security Essential Body of Knowledge (EBK) A Competency and Functional Framework for IT Security Workforce Development September 2008 United States Department of Homeland Security by Chaiyakorn A., CISSP
Why was the EBK established? Rapid evolution of technology Various aspects and expertise are increasingly required Standard or common guideline in recruiting, training and retaining of workforce Knowledge and skill baseline Linkage between competencies and job functions For public and private sectors
Purpose of EBK Articulates functions that professionals within the IT security workforce perform in a common format and language. Provides a reference for comparing the content of IT security certifications, which have been developed independently according to varying criteria Promotes uniform competencies to increase the overall efficiency of IT security education, training, and professional development
Offers a way to further substantiate the wide acceptance of existing certifications so that they can be leveraged appropriately as credentials Provides content that can be used to facilitate cost-effective professional development of the IT security workforce, including skills training, academic curricula, and other affiliated human resource activities. Purpose of EBK (cont.)
How was the EBK built? The President’s Critical Infrastructure Protection Board (PCIPB) was established in October 2001 PCIPB created the IT Security Certification Working Group (ITSC-WG) 2003, the President released the  National Strategy to Secure Cyberspace 2003, DHS-NCSD was established to act as a national focal point for cyber security Lead by the Department of Homeland Security, National Cyber Security Division (DHS-NCSD) together with academia, government, and private sector DHS-NCSD introduced this first draft to a broader audience of SMEs in January 2007 It will be re-evaluated approximately every two years
EBK Development Process Refer to 53 Critical Work Function (CWF) from DoD IASS
Key Divisions 4 functional perspectives 14 competency areas 10 roles
Functional Perspectives Manage Design Implement Evaluate
Competency Areas  (MDIE in each) Data Security Digital Forensics Enterprise Continuity Incident Management IT Security Training and Awareness IT System Operations and Maintenance Network and Telecommunication Security Personnel Security Physical and Environmental Security Procurement Regulatory and Standards Compliance Security Risk Management Strategic Security Management System and Application Security
IT Security Roles Chief Information Officer Digital Forensics Professional Information Security Officer IT Security Compliance Officer IT Security Engineer IT Security Professional IT Systems Operations and Maintenance Professional Physical Security Professional Privacy Professional Procurement Professional
 
EBK Analysis Entry Level Professional Level Managerial Level
THANK YOU

More Related Content

PDF
Career guide on cyber security
PDF
Top 5 Career Options After Completing IT Engineering in 2022
PPT
Cyber Security Isaca Bglr Presentation 24th July
PDF
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
DOCX
IT Infrastructure Coordinator
PPTX
Collaborative defence strategies for network security
PPT
GridWise 2010 Cyber Security Update
Career guide on cyber security
Top 5 Career Options After Completing IT Engineering in 2022
Cyber Security Isaca Bglr Presentation 24th July
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
IT Infrastructure Coordinator
Collaborative defence strategies for network security
GridWise 2010 Cyber Security Update

What's hot (16)

PPTX
Reverse engineering Emails on Next Level
PPTX
Domains of network security
PPTX
2A Computers: The fraudsters friend?
 
PDF
Networking Essentials - CISCO Certificate
PPTX
Cybersecurity in the Era of IoT
PPSX
Hki tsecuritysolutionsv1.1
PPT
Network security & information security maintainence modified
PPTX
DOCX
David s lindsay jr2 it
PDF
Secure, Automated Network Access for Any Device on Campus
PPTX
To Cloud or Not To Cloud
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
Securing the Digital Economy: Reinventing the Internet
PDF
Sharing Session - PLATFORM 2015 Teknik Informatika Universitas Bakrie
PDF
MILCOM 2013 Keynote Presentation: Larry Payne
PPT
Webinar 2 IT Security
Reverse engineering Emails on Next Level
Domains of network security
2A Computers: The fraudsters friend?
 
Networking Essentials - CISCO Certificate
Cybersecurity in the Era of IoT
Hki tsecuritysolutionsv1.1
Network security & information security maintainence modified
David s lindsay jr2 it
Secure, Automated Network Access for Any Device on Campus
To Cloud or Not To Cloud
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Securing the Digital Economy: Reinventing the Internet
Sharing Session - PLATFORM 2015 Teknik Informatika Universitas Bakrie
MILCOM 2013 Keynote Presentation: Larry Payne
Webinar 2 IT Security
Ad

Similar to IT Security EBK2008 Summary (20)

PPTX
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
PPT
Dave Tyson Profile for CISO Insights
PPTX
Information security[277]
PDF
CISSP Certification Training Course
PPTX
Cybersecurity_Academy_NIST-NICE_Mapping_March_2021 (1).pptx
PPT
2008: Web Application Security Tutorial
PPTX
Cybersecurity Discipline
DOCX
RESUME - Marc Bercier - Long
DOCX
Resume -Resume -continous monitoring
DOCX
Resume -Resume -continous monitoring
PDF
Information Security Analyst- Infosec train
PPTX
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
DOCX
Byron Jackson Resume - 2016
PDF
Resume IT Officer Sample
DOCX
ConnieJusticeCV-2016
PDF
Dr. Charles Pak
PPTX
Secure Software Development Life Cycle
DOCX
Jenkins_ Carlasha 2016 v1
PPTX
Network Security version1.0 - Module 3.pptx
PPTX
Network Security v1.0 - You have Module 3.pptx
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
Dave Tyson Profile for CISO Insights
Information security[277]
CISSP Certification Training Course
Cybersecurity_Academy_NIST-NICE_Mapping_March_2021 (1).pptx
2008: Web Application Security Tutorial
Cybersecurity Discipline
RESUME - Marc Bercier - Long
Resume -Resume -continous monitoring
Resume -Resume -continous monitoring
Information Security Analyst- Infosec train
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Byron Jackson Resume - 2016
Resume IT Officer Sample
ConnieJusticeCV-2016
Dr. Charles Pak
Secure Software Development Life Cycle
Jenkins_ Carlasha 2016 v1
Network Security version1.0 - Module 3.pptx
Network Security v1.0 - You have Module 3.pptx
Ad

More from Narinrit Prem-apiwathanokul (14)

PDF
How to address C-Level properly?
PDF
IMC: risk base security
PDF
Cloud Security by CK
PDF
U S Embassy Event - Today’S Cyber Threats
PDF
Introduction to INFOSEC Professional
PDF
Infosec Workforce Development Framework For Thailand
PDF
Improving SCADA Security
PDF
PPTX
SCADA Security in CDIC 2009
PDF
S C A D A Security Keynote C K
PPTX
SecurityExchange2009-Key Note
PPT
CCA Preparation for Organization
How to address C-Level properly?
IMC: risk base security
Cloud Security by CK
U S Embassy Event - Today’S Cyber Threats
Introduction to INFOSEC Professional
Infosec Workforce Development Framework For Thailand
Improving SCADA Security
SCADA Security in CDIC 2009
S C A D A Security Keynote C K
SecurityExchange2009-Key Note
CCA Preparation for Organization

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Lesson notes of climatology university.
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Computing-Curriculum for Schools in Ghana
PDF
Insiders guide to clinical Medicine.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
Cell Types and Its function , kingdom of life
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Lesson notes of climatology university.
Anesthesia in Laparoscopic Surgery in India
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial disease of the cardiovascular and lymphatic systems
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Classroom Observation Tools for Teachers
GDM (1) (1).pptx small presentation for students
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
VCE English Exam - Section C Student Revision Booklet
Sports Quiz easy sports quiz sports quiz
Computing-Curriculum for Schools in Ghana
Insiders guide to clinical Medicine.pdf
O5-L3 Freight Transport Ops (International) V1.pdf

IT Security EBK2008 Summary

  • 1. Information Technology (IT) Security Essential Body of Knowledge (EBK) A Competency and Functional Framework for IT Security Workforce Development September 2008 United States Department of Homeland Security by Chaiyakorn A., CISSP
  • 2. Why was the EBK established? Rapid evolution of technology Various aspects and expertise are increasingly required Standard or common guideline in recruiting, training and retaining of workforce Knowledge and skill baseline Linkage between competencies and job functions For public and private sectors
  • 3. Purpose of EBK Articulates functions that professionals within the IT security workforce perform in a common format and language. Provides a reference for comparing the content of IT security certifications, which have been developed independently according to varying criteria Promotes uniform competencies to increase the overall efficiency of IT security education, training, and professional development
  • 4. Offers a way to further substantiate the wide acceptance of existing certifications so that they can be leveraged appropriately as credentials Provides content that can be used to facilitate cost-effective professional development of the IT security workforce, including skills training, academic curricula, and other affiliated human resource activities. Purpose of EBK (cont.)
  • 5. How was the EBK built? The President’s Critical Infrastructure Protection Board (PCIPB) was established in October 2001 PCIPB created the IT Security Certification Working Group (ITSC-WG) 2003, the President released the National Strategy to Secure Cyberspace 2003, DHS-NCSD was established to act as a national focal point for cyber security Lead by the Department of Homeland Security, National Cyber Security Division (DHS-NCSD) together with academia, government, and private sector DHS-NCSD introduced this first draft to a broader audience of SMEs in January 2007 It will be re-evaluated approximately every two years
  • 6. EBK Development Process Refer to 53 Critical Work Function (CWF) from DoD IASS
  • 7. Key Divisions 4 functional perspectives 14 competency areas 10 roles
  • 8. Functional Perspectives Manage Design Implement Evaluate
  • 9. Competency Areas (MDIE in each) Data Security Digital Forensics Enterprise Continuity Incident Management IT Security Training and Awareness IT System Operations and Maintenance Network and Telecommunication Security Personnel Security Physical and Environmental Security Procurement Regulatory and Standards Compliance Security Risk Management Strategic Security Management System and Application Security
  • 10. IT Security Roles Chief Information Officer Digital Forensics Professional Information Security Officer IT Security Compliance Officer IT Security Engineer IT Security Professional IT Systems Operations and Maintenance Professional Physical Security Professional Privacy Professional Procurement Professional
  • 11.  
  • 12. EBK Analysis Entry Level Professional Level Managerial Level