SlideShare a Scribd company logo
1 of 73
MY MOM -1943.
NBC MASTERING ENGINEER
DAD
RADAR DEV. WW2
MY FIRST DEFCON
WINN AS TV REPAIRMAN: $.50 PER REPAIR
MY ELECTRONICS STORE
1961
HIGH SCHOOL COMPUTER
COULDN’T GET A JOB
THE FAMILY BUSINESS:
MY FIRST STUDIO (16 YRS. OLD)
MY FIRST LATHE: ANALOGUE/MECHANICAL
1969-1970: COMPLEX SYSTEMS
IMSAI 1972
AUTO SYNC (RIGHT!)
MANUAL SYNC
1979: BUILDING ANALOGUE/DIGITAL
BUSINESS
DIGITAL AUDIO AUTOMATION: 1980
MY STUDIO: 1980
7 JANUARY 1983: WENT INTO
SECURITY
No Degree. No Certs. No Creds.
THE EARLY DAYS:
WEAPONIZATION OF THE INTERNET
1990 1993
June 27, 1991
Our computer systems are
so poorly protected, they
are “An electronic Pearl
Harbor waiting to happen.”
“The Civilian Architect of
Information Warfare.”
Admiral Tyrrell, UK MoD
NEED TO FIX THE INTERNET
WANTED TO PROVE SECURITY
IMPOSSIBLE.
OF COURSE IT IS.
HOLD ON.
WAIT.
(CRASS COMMERCIAL PLUG
COMING LATER…)
OK BACK TO THE
HISTORY…
I MEAN THE FUTURE OF
CYBERSECURITY
EDUCATION
THE SECURITY DOMAINS
CYBERSECURITY EDUCATION SHOULD TOUCH ALL THREE
2010 - 2012
DHS SECRETARY JANET NAPOLITANO
“WE CAN’T FIND ENOUGH CYBER-SECURITY PEOPLE…”
… BULLSHIT
THE TRUTH IS…
“WE CAN’T FIND ENOUGH PERFECT WHITE PEOPLE, WHO
HAVE NEVER, EVER DONE ANYTHING WRONG, HAVE HAD A
FORMAL EDUCATION, RECEIVED DEGREES, GOT CERTS UP
THE WAZOO, WHO DON’T SMOKE WEED, CAN PASS AN H.R.
PERSONALITY TEST, AND AREN’T ON THE SPECTRUM…”
ARBITRARY DISCRIMINATORS
• AGE
• SEX/ORIENATION
• DRUG USE (ALCOHOLISM IS O.K.)
• DEGREES
• CRIMINAL BACKGROUND
• “OFFICE JOB”
• PERSONALITY TESTS
• ADHD & SPECTRUM
DO WE REALLY NEED OR WANT ‘NORMAL’?
SECURITY PROBLEMS: THEY ARE ALL THE
SAME
• SPAM
• DOS/DDOS
• PHISHING
• ACCESS CONTROL
• ENCRYPTION
• PRIVACY
• DECEPTION
• FAKE NEWS
• DETECTION
• ROOT CONTROL
• ETC.
• REACTION
• REMEDIATION
• ZERO-DAYS
• MALWARE
• METAMORPHIC NW
• AWARENESS
• TRUST
• MULTI-ADMIN
• DATA-EXFILTRATION
• ESPIONAGE
• ETC.
SO…TO GET ‘THE RIGHT STUFF’
A LITTLE MORE GENERALISM, PLEASE…
1. ENGINEERING
2. HISTORY
3. HUMANITY
ENGINEERING
TO ERR IS TO MAKE PROGRESS.
TO FAIL IS TO LEARN.
CYBER IS NOT AN ENGINEERING DISCIPLINE …
YET…
WHAT COULD WE LEARN FROM ENGINEERS?
LOGIC
MECHANICAL
• BRIDGES
• DRONES
• ROBOTS
• 3D - STUFF
ALL THINGS CYBER-KINETIC
ELECTRICAL
ANALOGUE
FEEDBACK
ICS/SCADA – FEEDBACK & ANALOGUE
PROGRAMMABLE LOGIC
CONTROLLER
• BINARY CONTROLS
- ON-OFF = 1:0 = YES/NO
• ANALOGUE CONTROLS
- > 0 & < 1
IT’S THE SMALL THINGS
• NANO-TECH
• DNA STORAGE (1019
BITS/CM2
• OPTICAL CPU
• BIONICS
• THE INTERNET OF BIO-
NANO-AI THINGS
BAYES & PROBABILITY
THE QUANTUM & NEWTON
NEURAL & AI/ML/DL
ETHICS, TROLLEYS AND AUTONOMOUS
FRACTALS
EXO-PLANETARY STUDIES
THE CARRINGTON EFFECT: 1859
HISTORY
TO IGNORE HISTORY IS TO REPEAT STUPID SHIT
INSANITY:
DOING THE SAME THING OVER AND OVER AND OVER
AGAIN…
AND EXPECTING DIFFERENT RESULTS.
(NEXT GEN CYBERSECURITY CRAP
1972 – 2018)
KNOW THE HISTORY OF OOPS!
GREAT PEOPLE MAKING HUGE MISTAKES
COMPUTER HISTORY
WHY REINVENT WHEELS WHEN THEY ALREADY EXIST?
• ANTIKYTHERA
• BOOLE
• ADA
LOVELACE/BABBAGE
• GRACE HOPPER
• BOMBE-ENIAC+++
• ANALOGUE
COMPUTING
• VON NEUMANN
• ARCHITECTURES
• SHANNON
• INFORMATION
THEORY
COMPUTER SECURITY HISTORY
• CAESAR, JEFFERSON, VIGENERE
• BLETCHLEY (UK), VENONA (US)
• WOMEN
• ANDERSON, BIBI, BELL, LAPADULA
• RAINBOW, CC, TCSEC
• RACF/TOP-SECRET/ACF-2
• MLS & BLACK/RED NETWORKING
WOMEN IN CYBER+SECURITY
(C’MON ALREADY… )
MILITARY HISTORY
• DECEPTION
• SUN TZU
• JOHN, JASPER & NEVIL MASKELYNE
(WAR MAGICIANS)
• MASSIFICATION (PRE-21ST C.)
• CLAUSWITZ
• NAPOLEON/ROME/
• JOHN BOYD (O-O-D-A)
• M.A.D. (TIME)
• FORTRESS MENTALITY (EPIC FAILURES)
• WHY ARE WE LOSING
THE CYBERWARS?
OODA - FEEDBACK
SPEED WINS
CABLE-PORN
NON-LINEARITY
ART SCIENCE
THINKING
HUMANITY
WE HAVE SPENT 70 YEARS TRY TO GET HUMANS TO
THINK, BEHAVE AND INTERACT WITH COMPUTERS ON
THEIR TERMS;
IN THEIR LANGUAGE: BINARY & DIGITAL
FOR SECURITY, WE NEED TO GET COMPUTERS TO THINK,
BEHAVE AND INTERACT WITH US ON OUR HUMAN TERMS;
IN OUR LANGUAGE: ANALOGUE
GREAT ENGINEERING + HUMAN ENDEAVOR =
FAILURE
PURPOSE OF THE BRAIN
1. TO SENSE THE
ENVIRONMENT
2. TO PREDICT THE FUTURE
PSYCHOLOGY
• NOT BINARY
• INFINITE FLAVORING
• SOFT/MALLEABLE
• WORST MEMORY CIRCUITS
• SUSCEPTIBLE TO
“FAKENESS/LIES” IN THE FACE
OF FACTS (TRUTH)
• SPECTRUMS
• IT’S UP TO US TO
UNDERSTAND OUR
AUDIENCE(S)
PIX FREUD
HUMAN (ENGINEERING): THE
SENSES
TIME-BASED DETECTION IN DEPTH
SENSOR TECH(S)
TIME-BASED DETECTION IN DEPTH
MULTI-SENSORY FILTERING
NEURO-PLASTICITY
• ADAPTABLE
• POLYMORPHIC NEURONS
• ½ A BRAIN WORKS
• DISTRIBUTED PROCESSING
• AI VS. HUMAN
• PARADOXICAL
• TROLLEYOLOGICAL CONUNDRA
PERCEPTION
FLATLAND +
INFLUENCE
(SOCIAL ENGINEERING? MY MOM SAID…)
• POLICY LEADERS
• CISO/CEO/BOARD
• NON GEEKS
• CO-WORKERS & STAFF
• EMPLOYEES
• PARTNERS
• CUSTOMERS
• ‘SPECIAL’ PEOPLE
• SPOUSE (YEAH, UH, HUH!)
ART & ART HISTORY
ART IS HOW WE TELL STORIES
COMMUNICATIONS
SHOW – DON’T TELL
• KNOW YOUR
AUDIENCE
• C-SUITE
• CUSTOMERS
• GEEKY COLLEAGUES
• STUPID PEOPLE
• KIDS
• MULTI-MEDIA
POSITIVE FEEDBACK:
LEARN ABOUT LEARNING
• 70-20-10 RULE
• RULE OF 3
• 7 SECOND RULE
• 2.2 MADISON AVE.
RULE
• EBBINGHAUS
FORGETTING CURVE
• TEACHING
MOMENTS
TECHNOLOGY, SECURITY, & ETHICS
(ESPECIALLY IN A CYBER-KINETIC WORLD)
APPLYING THE TRIADS
FUTURE OF CYBER-SECURITY EDUCATION
(& ADDING A WEE DOSE OF INTERDISCIPLINARY
GENERALISM)
CYBER-SECURITY IS JUST TOO HARD
LANDING ON THE MOON
TRANSCONTINENTAL RAILWAY
MARSHALL PLAN
MANHATTAN PROJECT
TVA
DNA
ICS
INTERNET
ISO/IEC 27032
Training Courses
• ISO/IEC 27032 Introduction
1 Day Course
• ISO/IEC 27032 Foundation
2 Days Course
• ISO/IEC 27032 Lead Cybersecurity Manager
5 Days Course
Exam and certification fees are included in the training price.
www.pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
www.pecb.com/events
THANK YOU
?
winn@thesecurityawarenesscompany.com linkedin.com/company/the-security-awareness-company
www.thesecurityawarenesscompany.com

More Related Content

Similar to The Future of Your Cybersecurity Career: Market Demand VS Talent Shortage

Historyofthecomputer elec-age2nd-4thgen_updated
Historyofthecomputer elec-age2nd-4thgen_updatedHistoryofthecomputer elec-age2nd-4thgen_updated
Historyofthecomputer elec-age2nd-4thgen_updatedJesus Obenita Jr.
 
Making Molehills of Mountains
Making Molehills of MountainsMaking Molehills of Mountains
Making Molehills of MountainsIan Phillips
 
UoLiverpool: Letting Our Achievement Speak (7mar13)
UoLiverpool: Letting Our Achievement Speak (7mar13)UoLiverpool: Letting Our Achievement Speak (7mar13)
UoLiverpool: Letting Our Achievement Speak (7mar13)Ian Phillips
 
630755195-Chapter-1-PPT-1-pptx.pptx
630755195-Chapter-1-PPT-1-pptx.pptx630755195-Chapter-1-PPT-1-pptx.pptx
630755195-Chapter-1-PPT-1-pptx.pptxssuser8ca25e
 
Internet of Things. Trends.
Internet of Things. Trends.Internet of Things. Trends.
Internet of Things. Trends.Ilya Baraev
 
Technology Trends - Electronic Systems
Technology Trends - Electronic SystemsTechnology Trends - Electronic Systems
Technology Trends - Electronic SystemsIan Phillips
 
AI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or SaviourAI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or SaviourUniversity of Hertfordshire
 
M02 introduksi teknologi informasi
M02 introduksi teknologi informasiM02 introduksi teknologi informasi
M02 introduksi teknologi informasiCoky Fauzi Alfi
 
AI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or SaviourAI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or SaviourUniversity of Hertfordshire
 
Technology at Work 2013 - Global technology Trends - Professor Ian Philips, A...
Technology at Work 2013 - Global technology Trends - Professor Ian Philips, A...Technology at Work 2013 - Global technology Trends - Professor Ian Philips, A...
Technology at Work 2013 - Global technology Trends - Professor Ian Philips, A...Invest Northern Ireland
 
Unit1 lesson2 internet_friendly
Unit1 lesson2 internet_friendlyUnit1 lesson2 internet_friendly
Unit1 lesson2 internet_friendlyNeil James
 
The future of computer technology
The future of computer technologyThe future of computer technology
The future of computer technologyValred Olsim
 
Form4 cd1
Form4 cd1Form4 cd1
Form4 cd1smktsj2
 
Science & Technology - Past and Future Development
Science & Technology - Past and Future DevelopmentScience & Technology - Past and Future Development
Science & Technology - Past and Future DevelopmentMenhariq Noor
 
UoPlymouth: Letting Our Achievements Speak (1mar13)
UoPlymouth: Letting Our Achievements Speak (1mar13)UoPlymouth: Letting Our Achievements Speak (1mar13)
UoPlymouth: Letting Our Achievements Speak (1mar13)Ian Phillips
 
ETE444-lec1-nano-introduction.pdf
ETE444-lec1-nano-introduction.pdfETE444-lec1-nano-introduction.pdf
ETE444-lec1-nano-introduction.pdfmashiur
 
1 pendahuluan-pengenalan komputer-pii-im telkom
1 pendahuluan-pengenalan komputer-pii-im telkom1 pendahuluan-pengenalan komputer-pii-im telkom
1 pendahuluan-pengenalan komputer-pii-im telkomArry Widodo
 
Deeper Insights 6: The Use Of Electronics & Electricity
Deeper Insights 6: The Use Of Electronics & ElectricityDeeper Insights 6: The Use Of Electronics & Electricity
Deeper Insights 6: The Use Of Electronics & Electricity528Hz TRUTH
 

Similar to The Future of Your Cybersecurity Career: Market Demand VS Talent Shortage (20)

Historyofthecomputer elec-age2nd-4thgen_updated
Historyofthecomputer elec-age2nd-4thgen_updatedHistoryofthecomputer elec-age2nd-4thgen_updated
Historyofthecomputer elec-age2nd-4thgen_updated
 
Making Molehills of Mountains
Making Molehills of MountainsMaking Molehills of Mountains
Making Molehills of Mountains
 
UoLiverpool: Letting Our Achievement Speak (7mar13)
UoLiverpool: Letting Our Achievement Speak (7mar13)UoLiverpool: Letting Our Achievement Speak (7mar13)
UoLiverpool: Letting Our Achievement Speak (7mar13)
 
630755195-Chapter-1-PPT-1-pptx.pptx
630755195-Chapter-1-PPT-1-pptx.pptx630755195-Chapter-1-PPT-1-pptx.pptx
630755195-Chapter-1-PPT-1-pptx.pptx
 
Internet of Things. Trends.
Internet of Things. Trends.Internet of Things. Trends.
Internet of Things. Trends.
 
Technology Trends - Electronic Systems
Technology Trends - Electronic SystemsTechnology Trends - Electronic Systems
Technology Trends - Electronic Systems
 
brain chips
brain chipsbrain chips
brain chips
 
AI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or SaviourAI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or Saviour
 
M02 introduksi teknologi informasi
M02 introduksi teknologi informasiM02 introduksi teknologi informasi
M02 introduksi teknologi informasi
 
AI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or SaviourAI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or Saviour
 
Lecture 1 a
Lecture 1 aLecture 1 a
Lecture 1 a
 
Technology at Work 2013 - Global technology Trends - Professor Ian Philips, A...
Technology at Work 2013 - Global technology Trends - Professor Ian Philips, A...Technology at Work 2013 - Global technology Trends - Professor Ian Philips, A...
Technology at Work 2013 - Global technology Trends - Professor Ian Philips, A...
 
Unit1 lesson2 internet_friendly
Unit1 lesson2 internet_friendlyUnit1 lesson2 internet_friendly
Unit1 lesson2 internet_friendly
 
The future of computer technology
The future of computer technologyThe future of computer technology
The future of computer technology
 
Form4 cd1
Form4 cd1Form4 cd1
Form4 cd1
 
Science & Technology - Past and Future Development
Science & Technology - Past and Future DevelopmentScience & Technology - Past and Future Development
Science & Technology - Past and Future Development
 
UoPlymouth: Letting Our Achievements Speak (1mar13)
UoPlymouth: Letting Our Achievements Speak (1mar13)UoPlymouth: Letting Our Achievements Speak (1mar13)
UoPlymouth: Letting Our Achievements Speak (1mar13)
 
ETE444-lec1-nano-introduction.pdf
ETE444-lec1-nano-introduction.pdfETE444-lec1-nano-introduction.pdf
ETE444-lec1-nano-introduction.pdf
 
1 pendahuluan-pengenalan komputer-pii-im telkom
1 pendahuluan-pengenalan komputer-pii-im telkom1 pendahuluan-pengenalan komputer-pii-im telkom
1 pendahuluan-pengenalan komputer-pii-im telkom
 
Deeper Insights 6: The Use Of Electronics & Electricity
Deeper Insights 6: The Use Of Electronics & ElectricityDeeper Insights 6: The Use Of Electronics & Electricity
Deeper Insights 6: The Use Of Electronics & Electricity
 

More from PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 

More from PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 

Recently uploaded

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Recently uploaded (20)

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

The Future of Your Cybersecurity Career: Market Demand VS Talent Shortage