SlideShare uma empresa Scribd logo
1 de 24
Looking for
CPEs?
Infosec webinars are a great way
to earn CPEs
• Request your completion certificate at:
infosecinstitute.com/cpe
• CPE eligibility varies by certifying body.
Learn more at:
infosecinstitute.com/cpe-requirements
Meet your
speakers
Jeff Peters
Guest speaker
Infosec Product Marketing Manager,
Training
Byron Johnson
Guest speaker
IAPP Channel Sales Manager for North
America
Privacy is shaping cybersecurity careers
● Who is the IAPP?
● The privacy landscape
● Cybersecurity is changing: A new era of
cybersecurity professional
● How regulation affects cybersecurity
● The solution: IAPP certification
● Q&A
5
Who is the IAPP?
The International Association of Privacy
Professionals (IAPP)
● 50,000+ members, 100+ Countries
○ Membership more than doubled within 20 months
● 8 daily, weekly and monthly e-publications
● 8 international conferences
● Westin Research Center
● Not-for-profit, non-advocacy
● Plays a key role in the maintenance and professionalization of the privacy field.
Mission: To define, support, and improve privacy globally
7
The privacy landscape
What is privacy?
Most aspects of daily life involve the (often
unwittingly) collection, communication
and use of personal data
Governments are being challenged to
determine the proper limits and
regulatory structures to enforce those
limits on data
Businesses and data users must
determine how to comply with emerging
rules
New tech and unclear norms make this
difficult for all involved
Privacy regulation
Privacy regulation is protecting against unauthorized access to personal data in
ways consumers are starting to expect,and businesses still trying to understand
New privacy regulations like GDPR and CCPA limit what companies are
able to store, process, collect and share for personal information
Last year, data surpassed oil as the world’s most valuable commodity
In many cases data IS the business
What you can and can’t do with data
Can
- Protect your employee and customer
personal data
- Use privacy by design to build a
culture of privacy
- Talk to your colleagues
Can’t
- Store information for longer than
needed
- Share data with collectors or
processors without permission
- Sell data without consent
11
Cybersecurity is changing
Then Now
PACE OF LEARNING
TECHNOLOGY CHANGE
87% of enterprise IT/security
pros agree skills gap has or
will impact their organization3
3M unfilled cybersec jobs1
2-yr half life for tech skills2
1 2018 ISC2 Workforce Study
2 IT World “Your technology skills have a 2 year half life”
3 Infosec 2019 Cybersecurity Skills Gap survey
Cyber skills gap is an ongoing challenge
Defining career paths & filling skills gaps
Source: Infosec 2019 Cybersecurity Industry Report: 3 Steps Employers Can Take to Close the Skills Gap
https://www2.infosecinstitute.com/2019-industry-report
62% of infosec pros report
no or only somewhat clear
career paths
More than a third (34%) of
infosec pros are not confident
about their career goals
59% of infosec pros spend at
least a few hrs/wk learning
new skills (92% a few
hrs/mo)
Privacy: A career path forward
Source: TRUStaffing
“For professionals in either security…privacy experience has now become a clear
silo of expertise that is desired if not required for consultants, advisors,
managers, and operators of technology or controls.”
“Hiring managers almost always ask for CIPP certification holders, and having a
CIPP/US or E coupled with a CIPM almost guarantees a candidate’s resume will
get greater consideration than a candidate who does not have these
certifications.”
The new cybersecurity professional
● In a recent IAPP study of the disclosure statements of more than 100 publicly traded
companies, “… losing customers’ or employees’ personally identified information
(PII) ranks first among disclosed information-related risks.”
● Compare today’s privacy goals of protecting personal data to pre- DOD 8140 and 8570 as
it related to the cybersecurity job market.
● New regulation has bred a new age of cybercriminal — and must be countered with a
new era of cybersecurity professional
16
How regulation affects
cybersecurity
The IAPP is validating privacy
Technology sector and supporting teams were among the early adopters of
GDPR —because they had to be!
GDPR had a 100% increase in membership at the IAPP
IAPP expects a 10x affect from CCPA and state-to-state laws
CCPA enforcement begins January 1, 2020
Regulation affects cybersecurity
Comprehensive changes in business
practice due to regulation affects
cybersecurity teams
Cybersecurity and privacy goals are
inherently connected thanks to regulation
Unauthorized exposure under new
regulation will result in consequences for
organizations
In this information economy, all
employees who come in contact with data
have to be knowledgeable of what they
can and can’t do
19
IAPP certification options
Regulation affects cybersecurity
Certified Information Privacy Manager (CIPM)
Implementing privacy in an organization: The “how” of privacy from a
management perspective
Certified Information Privacy Technologist (CIPT)
Implementing privacy in applications and systems: The “how” of privacy
from a technology perspective
CIPP/US, CIPM and CIPT are all accredited under ISO standards
Certified Information Privacy Professional/United States (CIPP/US)
The law and regulation based in the US: The “what” of data protection in
the US, and abroad
Expert live instruction from anywhere
Infosec Flex makes expert, live instruction convenient
with online and in-person formats tailored to how,
when and where you learn best.
Certify your skills — guaranteed.
Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a
second attempt for free. Includes the ability to re-sit
the course for free for up to one year.
22
Questions?
Certify your skills — guaranteed.
Summer Training Sale
● Save big: $500 off any two-day IAPP boot
camp or $1,000 off any dual cert boot camp
● Get certified: Exam Pass Guarantee with
every boot camp
● Free 90-day Infosec Skills subscription:
After getting certified, tackle your next
career goal with 400+ on-demand courses
Save up to $1,000
infosecinstitute.com/iapp
About us
At Infosec, we believe knowledge is the most
powerful tool in the fight against cybercrime. We
provide the best certification and skills
development training for IT and security
professionals, as well as employee security
awareness training and phishing simulations.
www.infosecinstitute.com
708.689.0131

Mais conteúdo relacionado

Mais de Infosec

Mais de Infosec (20)

CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
CMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessmentCMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessment
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
 
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
 

Último

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Privacy is shaping the future of cybersecurity careers are you ready

  • 1.
  • 2. Looking for CPEs? Infosec webinars are a great way to earn CPEs • Request your completion certificate at: infosecinstitute.com/cpe • CPE eligibility varies by certifying body. Learn more at: infosecinstitute.com/cpe-requirements
  • 3. Meet your speakers Jeff Peters Guest speaker Infosec Product Marketing Manager, Training Byron Johnson Guest speaker IAPP Channel Sales Manager for North America
  • 4. Privacy is shaping cybersecurity careers ● Who is the IAPP? ● The privacy landscape ● Cybersecurity is changing: A new era of cybersecurity professional ● How regulation affects cybersecurity ● The solution: IAPP certification ● Q&A
  • 5. 5 Who is the IAPP?
  • 6. The International Association of Privacy Professionals (IAPP) ● 50,000+ members, 100+ Countries ○ Membership more than doubled within 20 months ● 8 daily, weekly and monthly e-publications ● 8 international conferences ● Westin Research Center ● Not-for-profit, non-advocacy ● Plays a key role in the maintenance and professionalization of the privacy field. Mission: To define, support, and improve privacy globally
  • 8. What is privacy? Most aspects of daily life involve the (often unwittingly) collection, communication and use of personal data Governments are being challenged to determine the proper limits and regulatory structures to enforce those limits on data Businesses and data users must determine how to comply with emerging rules New tech and unclear norms make this difficult for all involved
  • 9. Privacy regulation Privacy regulation is protecting against unauthorized access to personal data in ways consumers are starting to expect,and businesses still trying to understand New privacy regulations like GDPR and CCPA limit what companies are able to store, process, collect and share for personal information Last year, data surpassed oil as the world’s most valuable commodity In many cases data IS the business
  • 10. What you can and can’t do with data Can - Protect your employee and customer personal data - Use privacy by design to build a culture of privacy - Talk to your colleagues Can’t - Store information for longer than needed - Share data with collectors or processors without permission - Sell data without consent
  • 12. Then Now PACE OF LEARNING TECHNOLOGY CHANGE 87% of enterprise IT/security pros agree skills gap has or will impact their organization3 3M unfilled cybersec jobs1 2-yr half life for tech skills2 1 2018 ISC2 Workforce Study 2 IT World “Your technology skills have a 2 year half life” 3 Infosec 2019 Cybersecurity Skills Gap survey Cyber skills gap is an ongoing challenge
  • 13. Defining career paths & filling skills gaps Source: Infosec 2019 Cybersecurity Industry Report: 3 Steps Employers Can Take to Close the Skills Gap https://www2.infosecinstitute.com/2019-industry-report 62% of infosec pros report no or only somewhat clear career paths More than a third (34%) of infosec pros are not confident about their career goals 59% of infosec pros spend at least a few hrs/wk learning new skills (92% a few hrs/mo)
  • 14. Privacy: A career path forward Source: TRUStaffing “For professionals in either security…privacy experience has now become a clear silo of expertise that is desired if not required for consultants, advisors, managers, and operators of technology or controls.” “Hiring managers almost always ask for CIPP certification holders, and having a CIPP/US or E coupled with a CIPM almost guarantees a candidate’s resume will get greater consideration than a candidate who does not have these certifications.”
  • 15. The new cybersecurity professional ● In a recent IAPP study of the disclosure statements of more than 100 publicly traded companies, “… losing customers’ or employees’ personally identified information (PII) ranks first among disclosed information-related risks.” ● Compare today’s privacy goals of protecting personal data to pre- DOD 8140 and 8570 as it related to the cybersecurity job market. ● New regulation has bred a new age of cybercriminal — and must be countered with a new era of cybersecurity professional
  • 17. The IAPP is validating privacy Technology sector and supporting teams were among the early adopters of GDPR —because they had to be! GDPR had a 100% increase in membership at the IAPP IAPP expects a 10x affect from CCPA and state-to-state laws CCPA enforcement begins January 1, 2020
  • 18. Regulation affects cybersecurity Comprehensive changes in business practice due to regulation affects cybersecurity teams Cybersecurity and privacy goals are inherently connected thanks to regulation Unauthorized exposure under new regulation will result in consequences for organizations In this information economy, all employees who come in contact with data have to be knowledgeable of what they can and can’t do
  • 20. Regulation affects cybersecurity Certified Information Privacy Manager (CIPM) Implementing privacy in an organization: The “how” of privacy from a management perspective Certified Information Privacy Technologist (CIPT) Implementing privacy in applications and systems: The “how” of privacy from a technology perspective CIPP/US, CIPM and CIPT are all accredited under ISO standards Certified Information Privacy Professional/United States (CIPP/US) The law and regulation based in the US: The “what” of data protection in the US, and abroad
  • 21. Expert live instruction from anywhere Infosec Flex makes expert, live instruction convenient with online and in-person formats tailored to how, when and where you learn best. Certify your skills — guaranteed. Exam Pass Guarantee If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 23. Certify your skills — guaranteed. Summer Training Sale ● Save big: $500 off any two-day IAPP boot camp or $1,000 off any dual cert boot camp ● Get certified: Exam Pass Guarantee with every boot camp ● Free 90-day Infosec Skills subscription: After getting certified, tackle your next career goal with 400+ on-demand courses Save up to $1,000 infosecinstitute.com/iapp
  • 24. About us At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We provide the best certification and skills development training for IT and security professionals, as well as employee security awareness training and phishing simulations. www.infosecinstitute.com 708.689.0131