Executive Certificate in IT Security Business Development

Report 4 Downloads 58 Views
Executive Certificate in IT Security Business Development (Foundations) E-learning Capstone Session Presenter: Jacob Braun, CompTIA Faculty and President and COO, Waka Digital Media Corporation, Boston, MA

About The Speaker •  President & COO – Waka Digital Media Corporation –  Managed SaaS-based Security, Compliance & Lifecycle Solutions –  Pioneer in SaaS for regulated enterprises –  SaaS ISV, MSSP, ITO/BPO –  HQ’d in Boston, MA; Global Coverage for Midmarket & Enterprise –  Information Security, Lifecycle Management, Audit, Regulatory Compliance, Risk Management •  Immediate Past Chair, CompTIA MSP Partners Community •  Executive Council, CompTIA Mobility Community •  Enterprise Security & Governance Subject Matter Expert & Speaker

CompTIA Channel Training

About this Education The content and materials featured in this presentation are the result of a collaborative, CompTIA community-led development effort. An advisory group comprised of channel leaders and technical experts identified training goals and objectives, while education specialists carried out development work based on the insights and information provided by the advisory group and other subject matter experts. About CompTIA CompTIA is the voice of the world's information technology industry. As a nonprofit trade association advancing the global interests of IT professionals and companies, we focus our programs on four main areas: education, certification, advocacy and philanthropy.

Welcome

cap·stone /ˈkapˌstōn/

Noun the high point : crowning achievement

Where’s  the  Opportunity?   Governance, Policy and Process

Tools and Security “Controls”

Acceptable Use

__ (1 to 5)

Network Access

__ (1 to 5)

Firewalls, Next-Gen Firewalls

__ (1 to 5)

Procurement and Deployment

__ (1 to 5)

IDS/IPS

__ (1 to 5)

Emergency Response

__ (1 to 5)

Anti-Malware/Anti-SPAM

__ (1 to 5)

User Awareness and Training

__ (1 to 5)

Data Leakage Prevention

__ (1 to 5)

Network Access Control

__ (1 to 5)

Encryption

__ (1 to 5)

VPN

__ (1 to 5)

Web/Content Filtering

__ (1 to 5)

Social Media Controls

__ (1 to 5)

Virtualization Security

__ (1 to 5)

Identity and Access Management

__ (1 to 5)

Mobile Device Security

__ (1 to 5)

Operational Tools Log Management or Security Information and Event Management (SIEM) Network Forensics Vulnerability Management Configuration Management Compliance Management / Reporting Audit (Internal & External)

__ (1 to 5)

__ (1 to 5) __ (1 to 5) __ (1 to 5) __ (1 to 5) __ (1 to 5)

5  

What skills are needed? Exercise 2: Skills for Transitioning to a Trusted Security Advisor 1.  Governance, Policy, and Process? 2.  Operational Tools? 3.  Tools and Security Controls?

Your Customers Exercise 3: Working with Assessment Questionnaires How would information about your customers’…. •  •  •  • 

Data Types and Storage Company Information Security Processes Security Tools

….help you help them?

What is the risk assessment toolkit? Exercise 4: A Risk Assessment Toolkit The toolkit was developed to provide a simple, but effective, method of evaluating the: •  Cost of a particular threat or disaster •  Prioritization of risks •  Identification of countermeasures for each risk/ disaster •  Evaluation of the benefit of each countermeasure to determine a risk mitigation strategy

What is its benefit? Exercise 4: A Risk Assessment Toolkit (cont) How would you use this assessment – or one like it – to reveal opportunities to refine your customer’s IT security stance?

What is its benefit? Exercise 4: A Risk Assessment Toolkit (cont) How would you use this assessment – or one like it – to reveal opportunities to refine your customer’s IT security stance?

What is the impact? Exercise 5: Impact of Security Choices

Good Choice or Bad Choice? Use the CHAT feature to respond.

How do you position your security solutions? Exercise 6: The Cybersecurity Taxonomy Table Product  Category  

Descrip2on  

Value   Proposi2on  

Examples  

When will you partner? Exercise 7: Your Self-Assessment Use the CHAT feature to respond: •  Name one area where you would consider partnering in order to offer a full (or fuller) solution. •  Name one area in which you would avoid partnering.

Wrap-Up

To take the assessments or to download the 10 week guide and quick start guide for IT Security:

l.comptia.org/orlando If you still need to finish your training online:

l.comptia.org/channelcon

Up Next

•  6:00 pm: Fast and Furious ChannelCon Closing Party (Rain or Shine!) –  Buses depart for Richard Petty Race Track between 5:45 pm – 6:30 pm from convention center lobby entrance. –  Please wear close-toed shoes if you plan to race!

Scan for Players Club Points 1.  Setup your myChannelCon profile 2.  Download and login to the “CompTIA Events” app 3.  Scan booths, attendees, and session QR codes for points Earn points to gain entry in the grand prize raffle – a trip to Hawaii!

Questions? Thanks!