ExecuLve CerLficate in IT Security Business Development ...

Report 4 Downloads 50 Views
Execu&ve  Cer&ficate  in  IT  Security  Business   Development  (Founda&ons)   E-­‐learning  Capstone  Session  

CompTIA  Channel  Training   About  this  Educa&on   The  content  and  materials  featured  in  this  presenta?on  are  the  result  of  a   collabora?ve,  CompTIA  community-­‐led  development  effort.  An  advisory  group   comprised  of  channel  leaders  and  technical  experts  iden?fied  training  goals   and  objec?ves,  while  educa?on  specialists  carried  out  development  work   based  on  the  insights  and  informa?on  provided  by  the  advisory  group  and   other  subject  maPer  experts.     About  CompTIA   CompTIA  is  the  voice  of  the  world's  informa?on  technology  industry.  As  a  non-­‐ profit  trade  associa?on  advancing  the  global  interests  of  IT  professionals  and   companies,  we  focus  our  programmes  on  four  main  areas:  educa?on,   cer?fica?on,  advocacy,  and  philanthropy.    

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

2  

Welcome   cap·∙stone   /ˈkapˌstōn/     Noun   the  high  point  :  crowning  achievement    

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

3  

Where’s  the  Opportunity?   Governance, Policy and Process

Tools and Security “Controls”

Acceptable Use

__ (1 to 5)

Network Access

__ (1 to 5)

Firewalls, Next-Gen Firewalls

__ (1 to 5)

Procurement and Deployment

__ (1 to 5)

IDS/IPS

__ (1 to 5)

Emergency Response

__ (1 to 5)

Anti-Malware/Anti-SPAM

__ (1 to 5)

User Awareness and Training

__ (1 to 5)

Data Leakage Prevention

__ (1 to 5)

Network Access Control

__ (1 to 5)

Encryption

__ (1 to 5)

VPN

__ (1 to 5)

Web/Content Filtering

__ (1 to 5)

Social Media Controls

__ (1 to 5)

Virtualization Security

__ (1 to 5)

Identity and Access Management

__ (1 to 5)

Mobile Device Security

__ (1 to 5)

Operational Tools Log Management or Security Information and Event Management (SIEM) Network Forensics Vulnerability Management Configuration Management Compliance Management / Reporting Audit (Internal & External)

__ (1 to 5)

__ (1 to 5) __ (1 to 5) __ (1 to 5) __ (1 to 5) __ (1 to 5)

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

4  

What  Skills  Are  Needed?   Exercise  2:   Skills  for  Transi?oning  to  a  Trusted  Security  Advisor   1. 

Governance,  Policy,  and  Process?  

2. 

Opera?onal  Tools?  

3. 

Tools  and  Security  Controls?  

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

5  

Your  Customers   Exercise  3:   Working  with  Assessment  Ques?onnaires   How  would  informa?on  about  your  customers’….   § 

Data  Types  and  Storage  

§ 

Company  Informa?on  

§ 

Security  Processes  

§ 

Security  Tools  

….help  you  help  them?  

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

6  

What  is  The  Risk  Assessment  Toolkit?   Exercise  4:   A  Risk  Assessment  Toolkit   The  toolkit  was  developed  to  provide  a  simple,  but  effec?ve,  method  of   evalua?ng  the:   § 

Cost  of  a  par?cular  threat  or  disaster  

§ 

Priori?za?on  of  risks  

§ 

Iden?fica?on  of  countermeasures  for  each  risk/disaster  

§ 

Evalua?on  of  the  benefit  of  each  countermeasure  to  determine  a  risk   mi?ga?on  strategy  

  Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

7  

What  is  The  Risk  Assessment  Toolkit?   Exercise  4:   A  Risk  Assessment  Toolkit  (cont)   How  would  you  use  this   assessment  –  or  one  like  it  –  to   reveal  opportuni?es  to  refine  your   customer’s  IT  security  stance?  

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

8  

What  is  The  Impact?   Exercise  5:   Impact  of  Security  Choices   Good  Choice  or  Bad  Choice?  Use   the  CHAT  feature  to  respond.  

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

9  

How  Do  You  Posi&on  Your  Security  Solu&ons?   Exercise  6:   The  Cybersecurity  Taxonomy  Table   Product  Category  

Descrip&on  

Value  Proposi&on  

Examples  

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

10  

When  Will  You  Partner?   Exercise  7:   Your  Self-­‐Assessment   Use  the  CHAT  feature  to  respond:   § 

Name  one  area  where  you  would   consider  partnering  in  order  to   offer  a  full  (or  fuller)  solu?on.    

§ 

Name  one  area  in  which  you  would   avoid  partnering.  

 

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

11  

WRAP  UP  

12

Ques&ons  

Find  research  and  market   intelligence  for  all  things  IT  at   CompTIA.org.    

Fill  out  this  quick  survey  and  get   access  to  over  30  CompTIA  Quick   Start  Guides!       hPp://surveys.comp?a.org/s3/edsess  

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org  

13  

Thank  You.              

Up  next  at  ChannelCon  2015   § 

6pm  Technology  Vendor  Fair  and   Recep?on  

§ 

Tuesday,  6pm  Wrigley  Field  Backstage   Pass  

Copyright  (c)  2014  CompTIA  Proper?es,  LLC.    All  Rights  Reserved.    |    CompTIA.org