17
ISACA’S CYBERSECURITY NEXUS (CSX) Marc VAEL September 2015, Brussels

ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

ISACA’S CYBERSECURITY NEXUS (CSX) Marc VAEL September 2015, Brussels

Page 2: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

ABOUT ISACA Assuring trust in and value from information systems in a dynamically changing digital world

  Global association serving 140,000 cybersecurity, assurance, IT governance and IT risk professionals

  Members in 180 countries: 200+ chapters worldwide

  Launched Cybersecurity Nexus (CSX) in 2014 to address growing cybersecurity skills crisis and develop a skilled cyber workforce   Skills-based training   Performance-based certifications

  Developed & maintains the COBIT framework

  Offers CISA, CISM, CGEIT and CRISC certifications

www.isaca.org

Page 3: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5
Page 4: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5
Page 5: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5
Page 6: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

STATE OF CYBERSECURITY: IMPLICATIONS FOR 2015

www.isaca.org/state-of-cybersecurity-2015

Page 7: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

STATE OF CYBERSECURITY: IMPLICATIONS FOR 2015

www.isaca.org/state-of-cybersecurity-2015

Page 8: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

STATE OF CYBERSECURITY: IMPLICATIONS FOR 2015

www.isaca.org/state-of-cybersecurity-2015

Page 9: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5
Page 10: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

CSX

Page 11: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

OUR SOLUTION

11

CSX provides a single source for Cybersecurity Professionals

Credentialing and Training

Education/ Conferences

Membership Resources/ Publications

Career Management

Page 12: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

CAREER PATH: CYBERSECURITY CERTIFICATIONS

www.isaca.org/csx-certifications

CSX training and certifications offered for

skill levels and specialties throughout a

professional’s career.

Page 13: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

CAREER PATH: CYBERSECURITY CERTIFICATIONS

CSX Practitioner—Demonstrates ability to serve as a first responder to a cybersecurity incident following established procedures and defined processes. (1 certification, 3 training courses; prerequisite for CSX Specialist)

CSX Specialist—Demonstrates effective skills and deep knowledge in one or more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5 certifications, 5 training courses; requires CSX Practitioner)

CSX Expert—Demonstrates ability of a master/expert-level cybersecurity professional who can identify, analyze, respond to, and mitigate complex cybersecurity incidents. (1 certification, 1 training course; no prerequisites required)

Certified Information Security Manager certification (25,000+ professionals certified since inception; named the second-highest-paying certification by Global Knowledge’s 2015 IT Skills and Salary Survey; 5+ years experience required)

Page 14: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5
Page 15: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

CSX EXAMPLE: APT LIFE CYCLE

Page 16: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

CSX EXAMPLE: APT DEFENSE METHODS

Page 17: ISACA’S CYBERSECURITY NEXUS (CSX) II/2-ISACA.pdf · more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. (5

www.isaca.org/cyber Contact: Mr. Marc Vael

[email protected] http://www.linkedin.com/in/marcvael @marcvael