SlideShare a Scribd company logo
1 of 17
Careers in information security
What can we do for you?
Information Security
Information Security
“Information is critical to any business
and paramount to the survival of any
organisation in today’s globalised
digital economy.
IT professionals must have a core
knowledge of information security
management and the governance
requirements involved.”
BCS, The Chartered Institute for IT
Professional Certification
bcs.org/infosecurity
Foundation Level
•Information Management Security Principles
Technology neutral certification, subject areas
include:
–Risk management
–Technical and management controls
–Legal framework
–People and physical security
–Security standards
–Business continuity
–Cloud computing
bcs.org/infosecurity
Foundation Level
•Data Protection
Understand context of UK data protection law,
including:
–EU Data Protection Directive 1995/46/EC
–Privacy and Electronic Communications Directive
2002/58/EC
–UK Human Rights Act 1998
–EU Charter of fundamental rights and freedoms (Article 8)
bcs.org/infosecurity
Practitioner Level
•In-depth knowledge in other key areas of IT
governance and security, including:
–Business continuity management
–Data protection
–Freedom of information
–Information risk management
–Information assurance architecture
bcs.org/infosecurity
CESG Certified Professional
•The UK Government’s approved standard of
competence for cyber security professionals
•Independent assessment of information
assurance skills
•Covers 7 IA roles at SFIA aligned levels:
bcs.org/cesg
− Security and information
risk adviser
− IA architect
− Accreditor
− IA auditor
− IT security officer
− Communications security
officer
− Penetration tester
Professional development
Career path
bcs.org/sfiaplus
IT Skills Framework
bcs.org/sfiaplus
•For IT professionals:
– Reflects the current skills required
by the industry
– Provides a common benchmark
again recognised standards
– Pinpoints the right job for you by
defining your skills
– Helps you identify a clear
progression path and development
opportunities
– Provides a consistent language for
IT skills
– Can be implemented at any stage
in your IT career
IT Skills Framework
bcs.org/sfiaplus
•For IT employers:
– Builds on SFIA
– Delivers business advantage through
structured skills development
– Helps attract, retain and develop
IT talent
– Inspires high performance
– Provides a consistency of approach
to building job profiles and creating
development plans
– Enables production of skills gap
analysis reports
– Assists your organisation’s strategy
implementation
CPD
•BCS Personal Development Plan
–Builds a portable record of your
professional aspirations and activities
–Access potential CPD activities
(videos, events, articles, blogs…)
–Records coaching, mentoring,
networking and other activities
–Share your achievements with
your peers
–Manage reflective learning
pdp.bcs.org
Publishing
bcs.org/securitybooks
Books and ebooks
bcs.org/securitybooks
Ebook series
bcs.org/ebooks
Further your career in information security with us

More Related Content

More from BCS-IT

Organizational efficiencies
Organizational efficienciesOrganizational efficiencies
Organizational efficienciesBCS-IT
 
IT user qualifications (for colleges and trainig centres)
IT user qualifications (for colleges and trainig centres)IT user qualifications (for colleges and trainig centres)
IT user qualifications (for colleges and trainig centres)BCS-IT
 
IT Service Management information pack
IT Service Management information packIT Service Management information pack
IT Service Management information packBCS-IT
 
Identify and plug the security skills gap
Identify and plug the security skills gapIdentify and plug the security skills gap
Identify and plug the security skills gapBCS-IT
 
Business Analysis
Business AnalysisBusiness Analysis
Business AnalysisBCS-IT
 
A countdown to professional success
A countdown to professional successA countdown to professional success
A countdown to professional successBCS-IT
 
Big data
Big data Big data
Big data BCS-IT
 
Personal Development Plan
Personal Development PlanPersonal Development Plan
Personal Development PlanBCS-IT
 
Vocational Qualifications for Digital Skills
Vocational Qualifications for Digital SkillsVocational Qualifications for Digital Skills
Vocational Qualifications for Digital SkillsBCS-IT
 

More from BCS-IT (11)

Organizational efficiencies
Organizational efficienciesOrganizational efficiencies
Organizational efficiencies
 
IT user qualifications (for colleges and trainig centres)
IT user qualifications (for colleges and trainig centres)IT user qualifications (for colleges and trainig centres)
IT user qualifications (for colleges and trainig centres)
 
BYOD
BYODBYOD
BYOD
 
IT Service Management information pack
IT Service Management information packIT Service Management information pack
IT Service Management information pack
 
Identify and plug the security skills gap
Identify and plug the security skills gapIdentify and plug the security skills gap
Identify and plug the security skills gap
 
Business Analysis
Business AnalysisBusiness Analysis
Business Analysis
 
A countdown to professional success
A countdown to professional successA countdown to professional success
A countdown to professional success
 
Big data
Big data Big data
Big data
 
Personal Development Plan
Personal Development PlanPersonal Development Plan
Personal Development Plan
 
Vocational Qualifications for Digital Skills
Vocational Qualifications for Digital SkillsVocational Qualifications for Digital Skills
Vocational Qualifications for Digital Skills
 
BYOD
BYODBYOD
BYOD
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Information Security

  • 2. What can we do for you? Information Security
  • 3. Information Security “Information is critical to any business and paramount to the survival of any organisation in today’s globalised digital economy. IT professionals must have a core knowledge of information security management and the governance requirements involved.” BCS, The Chartered Institute for IT
  • 5. Foundation Level •Information Management Security Principles Technology neutral certification, subject areas include: –Risk management –Technical and management controls –Legal framework –People and physical security –Security standards –Business continuity –Cloud computing bcs.org/infosecurity
  • 6. Foundation Level •Data Protection Understand context of UK data protection law, including: –EU Data Protection Directive 1995/46/EC –Privacy and Electronic Communications Directive 2002/58/EC –UK Human Rights Act 1998 –EU Charter of fundamental rights and freedoms (Article 8) bcs.org/infosecurity
  • 7. Practitioner Level •In-depth knowledge in other key areas of IT governance and security, including: –Business continuity management –Data protection –Freedom of information –Information risk management –Information assurance architecture bcs.org/infosecurity
  • 8. CESG Certified Professional •The UK Government’s approved standard of competence for cyber security professionals •Independent assessment of information assurance skills •Covers 7 IA roles at SFIA aligned levels: bcs.org/cesg − Security and information risk adviser − IA architect − Accreditor − IA auditor − IT security officer − Communications security officer − Penetration tester
  • 11. IT Skills Framework bcs.org/sfiaplus •For IT professionals: – Reflects the current skills required by the industry – Provides a common benchmark again recognised standards – Pinpoints the right job for you by defining your skills – Helps you identify a clear progression path and development opportunities – Provides a consistent language for IT skills – Can be implemented at any stage in your IT career
  • 12. IT Skills Framework bcs.org/sfiaplus •For IT employers: – Builds on SFIA – Delivers business advantage through structured skills development – Helps attract, retain and develop IT talent – Inspires high performance – Provides a consistency of approach to building job profiles and creating development plans – Enables production of skills gap analysis reports – Assists your organisation’s strategy implementation
  • 13. CPD •BCS Personal Development Plan –Builds a portable record of your professional aspirations and activities –Access potential CPD activities (videos, events, articles, blogs…) –Records coaching, mentoring, networking and other activities –Share your achievements with your peers –Manage reflective learning pdp.bcs.org
  • 17. Further your career in information security with us