SlideShare a Scribd company logo
Get Started on Cyber!
Stephen Martin
https://www.linkedin.com/in/stephenjesukanth/
What is Cyber Security?
► Cybersecurity protects networks, devices and data from
unauthorized access or criminal use
► The three triads of cybersecurity – Confidentiality,
Integrity & Availability
► It is very important today as everything we do today has a
digital equivalent (learning, shopping, government
services)
► It has safety implications due to the digitization of
potential life-threatening capabilities (hospitals,
autonomous vehicles, nuclear plants, power/water
utilities, cyber warfare)
Recent cybersecurity incidents
Cybersecurity Domains
1. Security
Architecture
2. Application Security
3. Frameworks and
Standards
4. Risk Assessment
5. Enterprise Risk
Management
6. Governance
7. Security Operations
8. Threat Intelligence
9. User Education
10. Physical Security
Cybersecurity roles compared against a City/Township roles
Township Cybersecurity
Mayor Chief Information Security
Officer
Secure Road
Construction (signs,
signals, dividing lines)
Network Security Engineer
/ Architect
Secure Buildings
Construction (hospitals,
businesses, schools)
Application Security
Engineer / Architect
Sensitive Files
Classification/Protectio
n/Shredding
Data Security Engineer /
Architect
Resident Identification/
Verification (E.g.: Motor
Vehicle Department)
Identity & Access
Management Engineer /
Architect
Township Cybersecurity
Police & Private
Security Agencies
Security Monitoring &
Threat Response
Analyst/Engineer
Township Inspectors Security Auditors
Teacher Cybersecurity
Awareness Trainer
Township Laws Policies and
Regulatory Compliance
(PCI DSS, SOX, HIPAA)
Emergency Response Critical Incidents
Responder
My Cyber Career (20 years and counting)
Network Engineer
exploring multiple
tracks of IT
Year 1
Network Security
Architect &
Implementation
Engineer
Presales - Security
Solutions Architect
Year 5
Security Solutions
Architect
Enterprise Architect
with an
understanding of
multiple security and
IT domains
Team Lead of
Architects
Year 10
Specialized security
offering leader for
Zero Trust
Expert in Managed
Security Services
Expanding my
learning in Cloud
Security
Today
How can you get started on cybersecurity?
Cloud Engineer Cloud Security Architect
Network Engineer Network Security Architect
Application Developer /
Tester
Application Security Architect
Data Engineer Data Security Architect
Risk Assessor / Regulatory
Compliance Analyst
Risk Manager /
Regulatory Compliance
Auditor
Identity & Access Management
Developer / Architect
Vulnerability Assessment Ethical Hacker / Penetration
Tester
SOC Monitoring Analyst Incident Responder
Start here Where you will be in 3-7
years
Certifications/Learning
to get you there
v
AWS Cloud Practitioner
AWS Solution Architect Associate
AWS Certified Security Specialty
Cisco / Palo Alto Networks / Fortinet certifications
Azure/GCP
Popular development languages
Popular testing tools
Application Security: Fortify, Veracode, Black Duck
IAM: Okta, Sailpoint, Saviynt, Forge Rock
Microsoft Rights Management, Varonis, Netskope
CASB
Security+, Certified Ethical Hacker, SANS, Offensive
Security Certified Professional
GIAC GSOC, EC-Council Certified SOC Analyst,
Splunk Enterprise Security, Exabeam, Crowdstrike
ISO27001 auditor, CISA, CISSP
How to get started in cybersecurity
Every enterprise has a cybersecurity presence – here
are a few top hirers
Government
Enterprises
Commercial
Enterprises
Managed Security
Services Providers
Advisory Firms
Cybersecurity Technology
Vendors
Cloud Providers
Examples: DoD, CISA Apple, Walmart,
Pfizer, JP Morgan
IBM, Expel, Accenture
Deloitte, EY, Booz
Allen Hamilton
Examples: Palo Alto Networks, Okta, Crowdstrike AWS, Azure, GCP
Next Steps
► Learn more about Cybersecurity (Coursera, Udemy, Cybrary)
► Understand what different cybersecurity technology vendors offer
► Get certified or pursue a university course
► Pursue a project (exploring cybersecurity use cases) or Get an
internship
► Attend interviews and get hired into your cybersecurity role

More Related Content

PDF
Guide to Risk Management Framework (RMF)
PPTX
Cyber Security Awareness Program.pptx
PPTX
PPTX
Risk Assessment
PDF
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
PPT
Isms awareness training
PDF
Cybersecurity Employee Training
Guide to Risk Management Framework (RMF)
Cyber Security Awareness Program.pptx
Risk Assessment
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Isms awareness training
Cybersecurity Employee Training

What's hot (20)

PPTX
Introduction to NIST’s Risk Management Framework (RMF)
PPT
Enterprise Risk Management
PPTX
Netpluz Managed SOC - MSS Service
PPTX
Security Operation Center - Design & Build
PPTX
Project Risk Management (10)
PPT
SABSA - Business Attributes Profiling
PDF
A structured approach to Enterprise Risk Management (ERM) and the requirement...
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PDF
Building Security Operation Center
PDF
OWASP based Threat Modeling Framework
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PPTX
Operational risk (by ms.sweta vijuraj)
PPTX
Cybersecurity Awareness Session by Adam
PDF
[Warsaw 26.06.2018] SDL Threat Modeling principles
PPTX
Elements of security risk assessment and risk management
PPTX
Employee Security Awareness Training
PPTX
Cissp Training PPT
PDF
Riskpro - Operational Risk Management
PPTX
Analysis of web application penetration testing
PPTX
SABSA Implementation(Part III)_ver1-0
Introduction to NIST’s Risk Management Framework (RMF)
Enterprise Risk Management
Netpluz Managed SOC - MSS Service
Security Operation Center - Design & Build
Project Risk Management (10)
SABSA - Business Attributes Profiling
A structured approach to Enterprise Risk Management (ERM) and the requirement...
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Building Security Operation Center
OWASP based Threat Modeling Framework
Security Training: #3 Threat Modelling - Practices and Tools
Operational risk (by ms.sweta vijuraj)
Cybersecurity Awareness Session by Adam
[Warsaw 26.06.2018] SDL Threat Modeling principles
Elements of security risk assessment and risk management
Employee Security Awareness Training
Cissp Training PPT
Riskpro - Operational Risk Management
Analysis of web application penetration testing
SABSA Implementation(Part III)_ver1-0
Ad

Similar to How to get started in cybersecurity (20)

PPTX
aap3 cybersecurity recruitment capabilities
PPT
Security solutions for a smarter planet
PPT
Emea Corporate Presentation 0709 Lin
PPTX
DSS and Security Intelligence @IBM_Connect_2014_April
PDF
Cyber_Services_2015_company_intro_ENG_v2p0
PPTX
Cyber Security Solutions in Europe
PPT
Integrating Physical And Logical Security
PDF
Building a Security Architecture
PPT
Experience and perspective_of_security_installation
PPT
Ibm security overview 2012 jan-18 sellers deck
PDF
OpenText Cyber Resilience Fastrak
RTF
RTF
RTF
RTF
PDF
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
RTF
International Journal of Information Security and Applications(IJISA)
RTF
International Journal of Information Security and Applications(IJISA)
PDF
Addressing the Cyber-Security Landscape
PDF
The 4horsemen of ics secapocalypse
aap3 cybersecurity recruitment capabilities
Security solutions for a smarter planet
Emea Corporate Presentation 0709 Lin
DSS and Security Intelligence @IBM_Connect_2014_April
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber Security Solutions in Europe
Integrating Physical And Logical Security
Building a Security Architecture
Experience and perspective_of_security_installation
Ibm security overview 2012 jan-18 sellers deck
OpenText Cyber Resilience Fastrak
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
Addressing the Cyber-Security Landscape
The 4horsemen of ics secapocalypse
Ad

Recently uploaded (20)

PDF
August Patch Tuesday
PPTX
A Presentation on Touch Screen Technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
1. Introduction to Computer Programming.pptx
PDF
Mushroom cultivation and it's methods.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
TLE Review Electricity (Electricity).pptx
August Patch Tuesday
A Presentation on Touch Screen Technology
Programs and apps: productivity, graphics, security and other tools
A comparative analysis of optical character recognition models for extracting...
NewMind AI Weekly Chronicles - August'25-Week II
1 - Historical Antecedents, Social Consideration.pdf
Zenith AI: Advanced Artificial Intelligence
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
OMC Textile Division Presentation 2021.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Approach and Philosophy of On baking technology
cloud_computing_Infrastucture_as_cloud_p
Hindi spoken digit analysis for native and non-native speakers
Univ-Connecticut-ChatGPT-Presentaion.pdf
Chapter 5: Probability Theory and Statistics
1. Introduction to Computer Programming.pptx
Mushroom cultivation and it's methods.pdf
A comparative study of natural language inference in Swahili using monolingua...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
TLE Review Electricity (Electricity).pptx

How to get started in cybersecurity

  • 1. Get Started on Cyber! Stephen Martin https://www.linkedin.com/in/stephenjesukanth/
  • 2. What is Cyber Security? ► Cybersecurity protects networks, devices and data from unauthorized access or criminal use ► The three triads of cybersecurity – Confidentiality, Integrity & Availability ► It is very important today as everything we do today has a digital equivalent (learning, shopping, government services) ► It has safety implications due to the digitization of potential life-threatening capabilities (hospitals, autonomous vehicles, nuclear plants, power/water utilities, cyber warfare)
  • 4. Cybersecurity Domains 1. Security Architecture 2. Application Security 3. Frameworks and Standards 4. Risk Assessment 5. Enterprise Risk Management 6. Governance 7. Security Operations 8. Threat Intelligence 9. User Education 10. Physical Security
  • 5. Cybersecurity roles compared against a City/Township roles Township Cybersecurity Mayor Chief Information Security Officer Secure Road Construction (signs, signals, dividing lines) Network Security Engineer / Architect Secure Buildings Construction (hospitals, businesses, schools) Application Security Engineer / Architect Sensitive Files Classification/Protectio n/Shredding Data Security Engineer / Architect Resident Identification/ Verification (E.g.: Motor Vehicle Department) Identity & Access Management Engineer / Architect Township Cybersecurity Police & Private Security Agencies Security Monitoring & Threat Response Analyst/Engineer Township Inspectors Security Auditors Teacher Cybersecurity Awareness Trainer Township Laws Policies and Regulatory Compliance (PCI DSS, SOX, HIPAA) Emergency Response Critical Incidents Responder
  • 6. My Cyber Career (20 years and counting) Network Engineer exploring multiple tracks of IT Year 1 Network Security Architect & Implementation Engineer Presales - Security Solutions Architect Year 5 Security Solutions Architect Enterprise Architect with an understanding of multiple security and IT domains Team Lead of Architects Year 10 Specialized security offering leader for Zero Trust Expert in Managed Security Services Expanding my learning in Cloud Security Today
  • 7. How can you get started on cybersecurity? Cloud Engineer Cloud Security Architect Network Engineer Network Security Architect Application Developer / Tester Application Security Architect Data Engineer Data Security Architect Risk Assessor / Regulatory Compliance Analyst Risk Manager / Regulatory Compliance Auditor Identity & Access Management Developer / Architect Vulnerability Assessment Ethical Hacker / Penetration Tester SOC Monitoring Analyst Incident Responder Start here Where you will be in 3-7 years Certifications/Learning to get you there v AWS Cloud Practitioner AWS Solution Architect Associate AWS Certified Security Specialty Cisco / Palo Alto Networks / Fortinet certifications Azure/GCP Popular development languages Popular testing tools Application Security: Fortify, Veracode, Black Duck IAM: Okta, Sailpoint, Saviynt, Forge Rock Microsoft Rights Management, Varonis, Netskope CASB Security+, Certified Ethical Hacker, SANS, Offensive Security Certified Professional GIAC GSOC, EC-Council Certified SOC Analyst, Splunk Enterprise Security, Exabeam, Crowdstrike ISO27001 auditor, CISA, CISSP
  • 9. Every enterprise has a cybersecurity presence – here are a few top hirers Government Enterprises Commercial Enterprises Managed Security Services Providers Advisory Firms Cybersecurity Technology Vendors Cloud Providers Examples: DoD, CISA Apple, Walmart, Pfizer, JP Morgan IBM, Expel, Accenture Deloitte, EY, Booz Allen Hamilton Examples: Palo Alto Networks, Okta, Crowdstrike AWS, Azure, GCP
  • 10. Next Steps ► Learn more about Cybersecurity (Coursera, Udemy, Cybrary) ► Understand what different cybersecurity technology vendors offer ► Get certified or pursue a university course ► Pursue a project (exploring cybersecurity use cases) or Get an internship ► Attend interviews and get hired into your cybersecurity role