17
BRIDGING THE CYBER- SECURITY TALENT GAP SEPTEMBER 2016 Cyber Fighter Academy PRESENTS

CodersTrust - Defend and Protect the Free World

Embed Size (px)

Citation preview

Page 1: CodersTrust - Defend and Protect the Free World

BRIDGING THE CYBER-SECURITY TALENT GAP

SEPTEMBER 2016

Cyber Fighter Academy

PRESENTS

Page 2: CodersTrust - Defend and Protect the Free World

DISRUPTING THE CYBERSECURITY SPACE

WHAT WE DOWe are redefining the next generation of cybersecurity professionals, by creating an immersive hands-on, fully funded 10-week cybersecurity bootcamp that creates certified and job-ready cybersecurity pros. We are doing this to address the global shortage of cybersecurity professionals.

GLOBAL, MACRO TRENDS

Cybersecurity as an academic discipline or program of study is often inaccessible to students with only 7% of top universities offer an undergraduate major or minors in cybersecurity. Research show a bachelor’s degree in a technical field is ranked third among most effective ways to acquire cybersecurity skills, behind hands-on experience and certifications.

POWERFUL ECOSYSTEM

With a growing number of bootcamp recruits, global alumni network and hiring network we’re allowing all parties to extract maximum value from the Cyber Fighter Academy ecosystem. The resulting Cyber Fighter Academy network effects will drive accelerated demand for our product.

MASSIVE OPPORTUNITY

Demand for cybersecurity professionals is outpacing the supply of qualified workers. Estimates of the global cybersecurity workforce shortfall range from one to two million positions unfilled by 2019. In 2015, about 209,000 cybersecurity jobs went unfilled in the United States alone.

FIRST MOVERThe current barrier to entry into cybersecurity is huge, expensive and boring. Conventions needs to be challenged to meet the needs from the industry, and the needs and behaviors of the rising generations , the Millenials and Generation Z. Think a San Diego conference hotel with 50 year old geeks vs. a entrepreneurial startup vibe co-working space in Berlin. We are the first to do itthis.

Page 3: CodersTrust - Defend and Protect the Free World

Cybercrime is on the rise and organizations all over the world is facing a crisis in finding cybersecurity professionals.THE CYBERSECURITY TALENT GAP IS HUGE AND GROWING

1.5 Million 82 % 52 % 209.000more cybersecurity

professionals will be needed to accommodate the

predicted global shortfall by 2020.

of study respondents reported a shortage of

cybersecurity skills, with 71% of them linking this shortage to direct and

measurable damages their companies suffered.

of IT professionalssurveyed stated fewer

than 25% of allapplicants were qualified.

cybersecurity positions went unfilled in 2015 in the United States alone.

Source: (ISC)² 2015 Global Information Security

Workforce Study

Source: Hacking the Skills Shortage: Intel Security report

Source: State of Cybersecurity: Implications for 2015:

An ISACA and RSA Conference Survey

Source: Hacking the Skills Shortage: Intel Security report

Page 4: CodersTrust - Defend and Protect the Free World

CFA is an immersive fully funded 10-week cybersecurity bootcamp that creates certified and job-ready cybersecurity pros. CYBER FIGHTER ACADEMY (CFA) FULFILLS THIS TALENT GAP

Application · Assessment · SelectionCosts

TrainingCosts

CertificationsCosts

DeploymentRevenue

• Recruiting campaigns targeted graduates with relevant degrees (E.g. Computer Science), and IT people working in specific industries (E.g. Telecommunication).

• Rigorous process to select high potential recruits.

• The majority of the training draws on practical, hands-on, draws on real-world scenarios, simulates realistic enterprise environments and hacking competitions etc.

• Hands-on experienced instructors (white & black hat hackers) are assisting full time during the entire program.

• Certifications lay the theoretical foundation and ensures that recruits are qualified to an industry standard, and are in high demand from a recruiting perspective.

• Certified instructors are hired on a consulting basis to specifically conduct the certifications training and official material for a few days.

• Recruits will receive interview prep and will be interviewing with organizations from our hiring partner network.

• Hiring partners who hire CFA graduates will pay a recruitment fee that varies based on graduate performance, location, industry etc.

Page 5: CodersTrust - Defend and Protect the Free World

Conventions needs to be challenged to meet the needs and behaviors of the rising generations , the Millenials and Generation Z.REDEFINING THE NEXT GENERATION OF CYBERSECURITY PROS

INSPIRATIONAL HANDS-ON

ACCESSIBLE

COMMUNITY

TECH ENABLEDENTREPRENURIAL

Page 6: CodersTrust - Defend and Protect the Free World

Recruiting campaigns targeted graduates with relevant degrees (E.g. Computer Science), and IT people working in specific industries (E.g. Telecommunication, Sysadmin).

TARGETING CS GRADUATES LOOKING FOR A CAUSE

CS GRADUATES IT PEOPLE

• Social media• University seminars• Job ads• Recommendations

• LinkedIn• Job ads• Recommendations

Page 7: CodersTrust - Defend and Protect the Free World

The majority of the training draws on practical, hands-on, draws on real-world scenarios and simulates realistic enterprise environments etc.

80/20 RULE IN FAVOR OF HANDS-ON TRAINING

CERTIFICATION TRAINING

Certified instructors are hired on a consulting basis to specifically conduct the certifications training and official material for a few days.

HANDS-ON TRAINING

Hands-on experienced instructors (white & black hat hackers) are assisting full time during the entire program.

The hacking simulations are a mix of freely available and custom made.

Page 8: CodersTrust - Defend and Protect the Free World

Focus will be on building up a hiring network within the fastest cybersecurity demand sectors, which primarily are in industries managing consumer data.

A HIRING NETWORK OF COMPANIES WITH GROWING DEMANDS

40 % 30 % 16 % 14 %Professional Services Other Finance & Insurance Manufacturing & Defense

Source: Job Market Intelligence: Cybersecurity Jobs, 2015–2016 Burning Glass Technologies

Fastest cybersecurity demand sectors are inindustries managing consumer data

Page 9: CodersTrust - Defend and Protect the Free World

A GROWING ALUMNI NETWORK IS KEY TO LONG TERM SUCCESSValuable services and offerings free of charge will keep alumni engaged. Furthermore alumni will become part of the hiring network ‘on the other side of the table’.

SHARPEN UP SKILLS

• Hacking competitions• Access to simulations• Industry leading keynotes

EVENTS

• Inspirational talks (‘Cybersecurity TED’)

• Industry leading keynotes• Network

HIRING NETWORK

• Access to new opportunities (job replacement)

• Access to HR services• Alumni matching (job

replacement)

COMMUNITY

• Brand ambassadors• Mentors• Cybersecurity sharing groups• Network

Page 10: CodersTrust - Defend and Protect the Free World

THE CYBER FIGHTER ACADEMY NETWORK EFFECTCreating a new ecosystem for cybersecurity training and recruiting.

MORE COMMUNITY

ACTIVITYBOOTCAMP ALUMNI

MORE LOCATIONS / RECRUITS /

BOOTCAMPS

BIGGER HIRING NETWORK,

BETTER REPUTATION

BETTER JOB PLACEMENTS,

MORE REVENUE

BIGGER ALUMNI, BETTER ALUMNI

SERVICES/

BIGGER HIRING NETWORK,

BETTER REPUTATION

JOB REPLACEMENTS, MORE REVENUE

Page 11: CodersTrust - Defend and Protect the Free World

MONETIZING A GROWING ALUMNIJob hopping every 3-4 years is normal and we need to be the facilitator when alumni are looking for new challenges. Furthermore by layering services & offerings on top of our community we are creating an increasingly valuable offering while driving revenue.

JOB REPLACEMENTRECRUITING FEE

• Companies looking to hire senior cybersecurity professionals through hiring network

• Alumni actively looking for a new job (matching services with other alumni in the industry/market/location candidate is looking for)

SERVICES & OFFERINGS

• Vendors• Software• Reports / intelligence

As CFA grows its ability to curate, negotiate and offer best in class services & offerings - at a discounted CFA alumni price - increases.

Page 12: CodersTrust - Defend and Protect the Free World

HUGE AND GROWING MARKETAccording to Bank of America’s CEO, cybersecurity is the company’s only business unit with no budget limit.

$100 BILLIONin 2015

7% - 16%over the next 5 years

Total annual globalcybersecurity spending

Project annual cybersecurityspending increases

Source: Hacking the Skills Shortage: Intel Security report

Page 13: CodersTrust - Defend and Protect the Free World

PROVE MODEL, EXPAND GLOBALLY AND THEN SCALE

STAGE 1PROVE MODEL

STAGE 2EU EXPANSION

STAGE 3READY TO SCALE

STAGE 4SCALE

Avg. Costs per recruitment $12K $10K $8K $6K

Avg. Recruitment fee $15K $20K $25K $30K

# of recruitments / Year 100 500 1.000 10.000

Revenue / Year $1.5M $10M $25M $300M

Page 14: CodersTrust - Defend and Protect the Free World

APPENDIX A: ASSESSMENT / SELECTIONThe program is intensive and only those who display the greatest potential are secured a place.

ASSESSMENTThe candidates progress through two online assessment phases:

• Pre-Qualification: • A series of test and background questions.

• Aptitude Assessment:• A technical and psychometric assessment designed to uncover

traits that suggest suitability for a career in cyber security.

SELECTION Candidates who show potential in the assessment phases are invited to a series of face-to-face interviews with our instructors.

On the balance of their cumulative performance, the strongest candidates are offered a place.

Page 15: CodersTrust - Defend and Protect the Free World

APPENDIX B: TRAININGThe training is in person and students spend 10 weeks immersed in learning and honing the cyber security skills that organizations demand.

HANDS-ON TRAININGThe training is practical, hands-on, draws on real-world scenarios and simulates realistic enterprise environments, including:

⁃ Technology fundamentals⁃ Security essentials⁃ Virtualisation and cloud infrastructure security⁃ Compliance audit and risk⁃ Incident response⁃ Forensics⁃ Penetration testing and ethical hacking⁃ And much more

CERTIFICATION TRAININGA more theoretical approach covering each certification specifically.

⁃ 100% up-to-date and official training⁃ Authorized Instructors for all training sessions

Page 16: CodersTrust - Defend and Protect the Free World

APPENDIX C: POSSIBLE BOOTCAMPS AND CERTIFICATIONSWe will start focus on the category ‘Protect & Defend’. At a later stage we might be expanding our bootcamp offering over time with any of the other categories.

BOOTCAMPS / DoD 8140 CATEGORIES The DoD 8140 model is based on National Institute of Standard and Technology (NIST) National Initiative for Cybersecurity Education (NICE) standard. This model defines job categories very clearly:

⁃ Security Provision⁃ Operate & Maintain⁃ Protect & Defend⁃ Analyze⁃ Operate & Collect⁃ Oversight & Development⁃ Investigate

EACH CATEGORY HAS RECOMMENDED CERTIFICATIONS/CLASSES The 8140 framework allowed for many different classes, certifications, and formalized training to now qualify an individual as “certified” in that task. Having different avenues of training allows individuals to obtain inexpensive training and still be qualified in a task.

⁃ Category ⁃ Certification X

⁃ Certification Y ⁃ Class Z

Page 17: CodersTrust - Defend and Protect the Free World

APPENDIX D: DEPLOYMENT / HIRING NETWORKOrganizations in our hiring network hire out of our community and pay a recruitment fee to Cyber Fighter Academy.

INTERVIEW PREP Post-training the graduates will receive interview preparations and be asked to complete a series of job interviews with our hiring partners.

Our hiring partners can be organizations within different sectors:⁃ Technology and Internet⁃ Security software⁃ Defense⁃ Government departments and defense/intelligence agencies⁃ E-Commerce⁃ Financial institutions, financial firms and credit card⁃ Telcos⁃ And many more

HIRING PARTNER Hiring partners has the opportunity to recruit new and immediately deployable cyber security professionals.