SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
FRSecure 2016 CISSP
Mentor Program
EVAN FRANCEN, PRESIDENT & CO-FOUNDER - FRSECURE
CLASS SESSION #1
CISSP Mentor Program Session #1
Welcome!
• What is the CISSP Mentor Program
• History
• 1st class was 2010; 6 students
• Today’s class; 80 students
• Why we do it
• Success Stories
• Heck, it’s free! If you aren’t satisfied, we’ll
refund everything you paid us. ;)
We need MORE good information security
people!
CISSP Mentor Program Session #1
We need MORE good information security people!
The CISSP is ideal for those working in positions such
as, but not limited to:
◦ Security Consultant
◦ Security Manager
◦ IT Director/Manager
◦ Security Auditor
◦ Security Architect
◦ Security Analyst
◦ Security Systems Engineer
◦ Chief Information Security Officer
◦ Director of Security
◦ Network Architect
CISSP Mentor Program Session #1
Typical Class Structure
• Recap of previous content/session
• Questions
• Quiz
• Current Events
• Lecture
• Homework Assignment - WHAT?! Yeah, we got homework. 
• Questions
CISSP Mentor Program Session #1
Questions
• We may not get to all of the questions during class
• Send questions to Robb Stiffler (rstiffler@frsecure.com) – for now.
• We will soon (probably) assist in setting up (or facilitating) a study group.
• Content will be made available to all students upon request.
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or
“CISSP”)
• Maintained by the International Information Systems Security Certification
Consortium (or ISC2®)
• Tests your knowledge (or memorization) of the Common Body of Knowledge
(or “CBK”).
• “a mile wide and two inches deep” (or maybe just an inch deep).
• 2015 CBK, updated in April, 2015
• CBK consists of eight domains… next page
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or “CISSP”)
Eight domains for the CISSP CBK:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or “CISSP”)
Preparation (there are bunches of ways)
• 3x Book Read (my favorite)
• Read the book once, fast
• Read the book a second time, focus on concepts
• Read the book a third time, focus on mastery and memorization
• Note Cards
• Practice Tests (and quizzes)
• Study Groups
The CISSP Mentor Program a tool and facilitation of your studies, it does not supplant
them! YOU WILL STILL NEED TO STUDY.
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or “CISSP”)
How to take the exam
• Computer-based (“CBT”) at Pearson Vue
• 250 questions
• Six hour time limit
• Two (sort of four) types of questions:
• Multiple Choice (four options, two are almost obviously wrong)
• “Advanced Innovative”
• Scenario
• Drag/Drop
• Hotspot
• 25 (10%) of the questions are “experimental” or research questions.
CISSP Mentor Program Session #1
The Certified Information Systems Security
Professional (or “CISSP”)
How to take the exam
• Methods
• Two-pass
• Three-pass
• Suppose you could do one-pass too if you’re some kind of Jedi Master
(or whatever)
• You will know right away if you have passed or failed.
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or
“CISSP”)
Becoming a CISSP
• Passing the exam is only one step.
• Need experience
• 5 or more years within 2 or more domains (can waive one year with a college degree or
with another relevant certification)
• Not enough experience? Pass the exam and you’re known as an “Associate of (ISC2)”
• Must agree to the (ISC2) Code of Ethics.
• Must be endorsed by another CISSP (in good standing).
CISSP Mentor Program Session #1
About me
• President & Co-founder of FRSecure
• 20+ years of information security experience
• Big breach inside experience
• Information security evangelist
• Specialties: Security leadership coaching, risk management, methodology development, and
Social Engineering ;)
• CISSP sixty thousand something (I forgot my number).
• Very, very passionate about information security, but most importantly in doing the right
thing.
FRSecure exists to fix the broken industry.
CISSP Mentor Program Session #1
Same presentation given numerous times… Good for us too.
• Introduction
• We’re all experts right?
• Fundamentals
• The value of listening
• Principles
• Solutions – What to do…
• Questions
Information Security Fundamentals
Introduction
• FRSecure
• Information security consulting company
• Business since 2008
• 700+ clients, many in legal, healthcare, and finance
• Speaker – Evan Francen
• President & Co-founder of FRSecure
• 20+ years of information security experience
• Big breach inside experience
• Information security evangelist
• Specialties: Security leadership coaching, risk management, methodology development, and
Social Engineering ;)
Information Security Fundamentals
If there’s one thing that I’ve learned in 20+ years in information
security it’s to LISTEN.
If there’s one more thing that I’ve learned in 20+ years in
information security it’s that I don’t know everything!
Although too many information security “experts” won’t admit it.
Information Security Fundamentals
One thing is clear…
We’re missing the information security
fundamentals!
Information Security Fundamentals
What are some of the fundamentals?
We’re all experts, right?
What is “information security”?
We can argue about who’s definition is better, but we need to start with a common understanding (or definition).
Information Security Fundamentals
What are some of the fundamentals?
Information security is the application of administrative, physical,
and technical controls to protect the confidentiality, integrity, and
availability of information.
“Most organizations overemphasize technical controls to protect confidentiality
and do so at the expense of other critical controls and purposes.”
Seems fundamental. How about a story?
Information Security Fundamentals
What are some of the fundamentals?
Probably one of the most overused words in all of security…
What is “risk”?
Again, we can argue about who’s definition is better, but we need to start with a common understanding (or
definition).
Information Security Fundamentals
What are some of the fundamentals?
Risk is the likelihood of something bad happening and the impact if it
did.
“The likelihood of a threat exploiting a vulnerability, leads an associated
impact.”
Seems fundamental. How about another story?
Information Security Fundamentals
What are some of the fundamentals?
Risk
Anybody know who this guy is? 
Information Security Fundamentals
What are some of the fundamentals?
What is information security?
What is risk?
Why are these definitions so important?
Because they should drive everything you’re doing.
Information Security Fundamentals
The value of listening.
To keep us honest (and humble), we organized the FRSecure
Customer Advisory Board (or “CAB”).
We posed two simple questions…
What is your greatest frustration with respect to information security?
What is your greatest challenge with respect to information security?
Then we listened…
Information Security Fundamentals
The value of listening.
Greatest frustrations:
1. Lack of common information security understanding.
2. Different interpretations of different information security
regulations and standards.
3. Lack of education for practitioners and executive management.
4. Constantly changing priorities based on outside influences.
Together we derived a core frustration that sums up everything; we are all speaking different languages
for the same topic.
Information Security Fundamentals
The value of listening.
Greatest Challenges:
1. Education/training for executives, IT personnel, and users.
2. Management commitment to continuous improvement.
3. Obtaining the necessary resources to manage information
security.
4. Measuring information security (metrics, status, improvements,
etc.)
Greatest frustrations could be summed up with; we don’t know how to fix the issues facing us within the
greater context of a strategic information security program.
Information Security Fundamentals
So what are we going to do?
Our two problems, summed up by listening:
1. We are all speaking different languages for the same topic.
2. We don’t know how to fix the issues.
Now we can offer some advice, but only after listening.
Information Security Fundamentals
We are all speaking different languages for the same topic.
1. Define and live by your definition of information security. Get
everybody in agreement with the common definition because it
will (or should) drive everything.
2. Define and live by your definition of risk. If you can understand
and communicate risk well:
• You will automatically be compliant with regulations.
• You will be able to make good decisions.
• You will build a security program that works for you.
Information Security Fundamentals
We don’t know how to fix the issues.
Start with defining your information security principles. These are
the rules that you are going to live by. Here’s ours:
1. A business is in business to make money.
2. Information Security is a business issue.
3. Information Security is fun.
4. People are the biggest risk.
5. “Compliant” and “secure” are different.
Information Security Fundamentals
We don’t know how to fix the issues.
Start with defining your information security principles. These are
the rules that you are going to live by. Here’s ours:
6. There is no common sense in Information Security.
7. “Secure” is relative.
8. Information Security should drive business.
9. Information Security is not one size fits all.
10. There is no “easy button”.
Information Security Fundamentals
We don’t know how to fix the issues.
Now that you’re bought in on principles for managing your security
program, go here:
1. Management commitment. For real. Either you’re in or you’re not.
2. Asset management. You can’t secure what you don’t know you have.
3. Access control. You can’t secure what you can’t control.
4. Change control. See step 3.
5. Measure, measure, measure. You can’t manage what you can’t
measure.
Information Security Fundamentals
As you build, implement, manage, and improve your security
program…
Don’t forget to listen!
The things that people are telling you are real, and you might learn a
thing or two.
It’s also OK to admit that you don’t know everything.
Questions?
Aaaaaannnnnnnd we’re back.
Homework for Thursday (4/28)
◦ Please read Chapter 2/Domain 1: Security and Risk Management
◦ Pages 11 – 74 (only 63ish pages)
We’ll dig in!
Questions?
Hopefully about security.
Thank you!
Evan Francen
◦ FRSecure
◦ efrancen@frsecure.com
◦ 952-467-6384

Mais conteúdo relacionado

Mais procurados

Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Resilient Systems
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
Anne Starr
 

Mais procurados (20)

CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Ht t17
Ht t17Ht t17
Ht t17
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
 
Incident Response
Incident Response Incident Response
Incident Response
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 

Destaque

Destaque (14)

Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
 
HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad Nigh
 
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
 
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
 
Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
 
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
 
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
 

Semelhante a Slide Deck - CISSP Mentor Program Class Session 1

Introduction To Information Systems Security 365 765
Introduction To Information Systems Security 365 765Introduction To Information Systems Security 365 765
Introduction To Information Systems Security 365 765
Nicholas Davis
 
Introduction to information systems security 365 765
Introduction to information systems security 365 765Introduction to information systems security 365 765
Introduction to information systems security 365 765
Nicholas Davis
 

Semelhante a Slide Deck - CISSP Mentor Program Class Session 1 (20)

2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Just4Meeting 2012 - How to protect your web applications
Just4Meeting 2012 -  How to protect your web applicationsJust4Meeting 2012 -  How to protect your web applications
Just4Meeting 2012 - How to protect your web applications
 
Introduction To Information Systems Security 365 765
Introduction To Information Systems Security 365 765Introduction To Information Systems Security 365 765
Introduction To Information Systems Security 365 765
 
Introduction to information systems security 365 765
Introduction to information systems security 365 765Introduction to information systems security 365 765
Introduction to information systems security 365 765
 
DevOps and the Future of Information Security
DevOps and the Future of Information SecurityDevOps and the Future of Information Security
DevOps and the Future of Information Security
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
 
DevSecOps with Microsoft Tech
DevSecOps with Microsoft TechDevSecOps with Microsoft Tech
DevSecOps with Microsoft Tech
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
TIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology Conference
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 

Mais de FRSecure

Mais de FRSecure (20)

2020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 112020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 11
 
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10
 
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 92020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 9
 
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 82020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 8
 
2020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 72020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 7
 
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 62020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 6
 
2020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 52020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 5
 
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4
 
2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3 2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3
 
2020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
 
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine
 
2019 FRSecure CISSP Mentor Program: Class Eight
2019  FRSecure CISSP Mentor Program: Class Eight2019  FRSecure CISSP Mentor Program: Class Eight
2019 FRSecure CISSP Mentor Program: Class Eight
 
2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Seven2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Seven
 
2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Six2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Six
 
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two
 
2018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 112018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 11
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Slide Deck - CISSP Mentor Program Class Session 1

  • 1. FRSecure 2016 CISSP Mentor Program EVAN FRANCEN, PRESIDENT & CO-FOUNDER - FRSECURE CLASS SESSION #1
  • 2. CISSP Mentor Program Session #1 Welcome! • What is the CISSP Mentor Program • History • 1st class was 2010; 6 students • Today’s class; 80 students • Why we do it • Success Stories • Heck, it’s free! If you aren’t satisfied, we’ll refund everything you paid us. ;) We need MORE good information security people!
  • 3. CISSP Mentor Program Session #1 We need MORE good information security people! The CISSP is ideal for those working in positions such as, but not limited to: ◦ Security Consultant ◦ Security Manager ◦ IT Director/Manager ◦ Security Auditor ◦ Security Architect ◦ Security Analyst ◦ Security Systems Engineer ◦ Chief Information Security Officer ◦ Director of Security ◦ Network Architect
  • 4. CISSP Mentor Program Session #1 Typical Class Structure • Recap of previous content/session • Questions • Quiz • Current Events • Lecture • Homework Assignment - WHAT?! Yeah, we got homework.  • Questions
  • 5. CISSP Mentor Program Session #1 Questions • We may not get to all of the questions during class • Send questions to Robb Stiffler (rstiffler@frsecure.com) – for now. • We will soon (probably) assist in setting up (or facilitating) a study group. • Content will be made available to all students upon request.
  • 6. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) • Maintained by the International Information Systems Security Certification Consortium (or ISC2®) • Tests your knowledge (or memorization) of the Common Body of Knowledge (or “CBK”). • “a mile wide and two inches deep” (or maybe just an inch deep). • 2015 CBK, updated in April, 2015 • CBK consists of eight domains… next page
  • 7. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) Eight domains for the CISSP CBK: • Security and Risk Management • Asset Security • Security Engineering • Communications and Network Security • Identity and Access Management • Security Assessment and Testing • Security Operations • Software Development Security
  • 8. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) Preparation (there are bunches of ways) • 3x Book Read (my favorite) • Read the book once, fast • Read the book a second time, focus on concepts • Read the book a third time, focus on mastery and memorization • Note Cards • Practice Tests (and quizzes) • Study Groups The CISSP Mentor Program a tool and facilitation of your studies, it does not supplant them! YOU WILL STILL NEED TO STUDY.
  • 9. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) How to take the exam • Computer-based (“CBT”) at Pearson Vue • 250 questions • Six hour time limit • Two (sort of four) types of questions: • Multiple Choice (four options, two are almost obviously wrong) • “Advanced Innovative” • Scenario • Drag/Drop • Hotspot • 25 (10%) of the questions are “experimental” or research questions.
  • 10. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) How to take the exam • Methods • Two-pass • Three-pass • Suppose you could do one-pass too if you’re some kind of Jedi Master (or whatever) • You will know right away if you have passed or failed.
  • 11. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) Becoming a CISSP • Passing the exam is only one step. • Need experience • 5 or more years within 2 or more domains (can waive one year with a college degree or with another relevant certification) • Not enough experience? Pass the exam and you’re known as an “Associate of (ISC2)” • Must agree to the (ISC2) Code of Ethics. • Must be endorsed by another CISSP (in good standing).
  • 12. CISSP Mentor Program Session #1 About me • President & Co-founder of FRSecure • 20+ years of information security experience • Big breach inside experience • Information security evangelist • Specialties: Security leadership coaching, risk management, methodology development, and Social Engineering ;) • CISSP sixty thousand something (I forgot my number). • Very, very passionate about information security, but most importantly in doing the right thing. FRSecure exists to fix the broken industry.
  • 13. CISSP Mentor Program Session #1 Same presentation given numerous times… Good for us too. • Introduction • We’re all experts right? • Fundamentals • The value of listening • Principles • Solutions – What to do… • Questions
  • 14. Information Security Fundamentals Introduction • FRSecure • Information security consulting company • Business since 2008 • 700+ clients, many in legal, healthcare, and finance • Speaker – Evan Francen • President & Co-founder of FRSecure • 20+ years of information security experience • Big breach inside experience • Information security evangelist • Specialties: Security leadership coaching, risk management, methodology development, and Social Engineering ;)
  • 15. Information Security Fundamentals If there’s one thing that I’ve learned in 20+ years in information security it’s to LISTEN. If there’s one more thing that I’ve learned in 20+ years in information security it’s that I don’t know everything! Although too many information security “experts” won’t admit it.
  • 16. Information Security Fundamentals One thing is clear… We’re missing the information security fundamentals!
  • 17. Information Security Fundamentals What are some of the fundamentals? We’re all experts, right? What is “information security”? We can argue about who’s definition is better, but we need to start with a common understanding (or definition).
  • 18. Information Security Fundamentals What are some of the fundamentals? Information security is the application of administrative, physical, and technical controls to protect the confidentiality, integrity, and availability of information. “Most organizations overemphasize technical controls to protect confidentiality and do so at the expense of other critical controls and purposes.” Seems fundamental. How about a story?
  • 19. Information Security Fundamentals What are some of the fundamentals? Probably one of the most overused words in all of security… What is “risk”? Again, we can argue about who’s definition is better, but we need to start with a common understanding (or definition).
  • 20. Information Security Fundamentals What are some of the fundamentals? Risk is the likelihood of something bad happening and the impact if it did. “The likelihood of a threat exploiting a vulnerability, leads an associated impact.” Seems fundamental. How about another story?
  • 21. Information Security Fundamentals What are some of the fundamentals? Risk Anybody know who this guy is? 
  • 22. Information Security Fundamentals What are some of the fundamentals? What is information security? What is risk? Why are these definitions so important? Because they should drive everything you’re doing.
  • 23. Information Security Fundamentals The value of listening. To keep us honest (and humble), we organized the FRSecure Customer Advisory Board (or “CAB”). We posed two simple questions… What is your greatest frustration with respect to information security? What is your greatest challenge with respect to information security? Then we listened…
  • 24. Information Security Fundamentals The value of listening. Greatest frustrations: 1. Lack of common information security understanding. 2. Different interpretations of different information security regulations and standards. 3. Lack of education for practitioners and executive management. 4. Constantly changing priorities based on outside influences. Together we derived a core frustration that sums up everything; we are all speaking different languages for the same topic.
  • 25. Information Security Fundamentals The value of listening. Greatest Challenges: 1. Education/training for executives, IT personnel, and users. 2. Management commitment to continuous improvement. 3. Obtaining the necessary resources to manage information security. 4. Measuring information security (metrics, status, improvements, etc.) Greatest frustrations could be summed up with; we don’t know how to fix the issues facing us within the greater context of a strategic information security program.
  • 26. Information Security Fundamentals So what are we going to do? Our two problems, summed up by listening: 1. We are all speaking different languages for the same topic. 2. We don’t know how to fix the issues. Now we can offer some advice, but only after listening.
  • 27. Information Security Fundamentals We are all speaking different languages for the same topic. 1. Define and live by your definition of information security. Get everybody in agreement with the common definition because it will (or should) drive everything. 2. Define and live by your definition of risk. If you can understand and communicate risk well: • You will automatically be compliant with regulations. • You will be able to make good decisions. • You will build a security program that works for you.
  • 28. Information Security Fundamentals We don’t know how to fix the issues. Start with defining your information security principles. These are the rules that you are going to live by. Here’s ours: 1. A business is in business to make money. 2. Information Security is a business issue. 3. Information Security is fun. 4. People are the biggest risk. 5. “Compliant” and “secure” are different.
  • 29. Information Security Fundamentals We don’t know how to fix the issues. Start with defining your information security principles. These are the rules that you are going to live by. Here’s ours: 6. There is no common sense in Information Security. 7. “Secure” is relative. 8. Information Security should drive business. 9. Information Security is not one size fits all. 10. There is no “easy button”.
  • 30. Information Security Fundamentals We don’t know how to fix the issues. Now that you’re bought in on principles for managing your security program, go here: 1. Management commitment. For real. Either you’re in or you’re not. 2. Asset management. You can’t secure what you don’t know you have. 3. Access control. You can’t secure what you can’t control. 4. Change control. See step 3. 5. Measure, measure, measure. You can’t manage what you can’t measure.
  • 31. Information Security Fundamentals As you build, implement, manage, and improve your security program… Don’t forget to listen! The things that people are telling you are real, and you might learn a thing or two. It’s also OK to admit that you don’t know everything.
  • 32. Questions? Aaaaaannnnnnnd we’re back. Homework for Thursday (4/28) ◦ Please read Chapter 2/Domain 1: Security and Risk Management ◦ Pages 11 – 74 (only 63ish pages) We’ll dig in!
  • 33. Questions? Hopefully about security. Thank you! Evan Francen ◦ FRSecure ◦ efrancen@frsecure.com ◦ 952-467-6384