SRM Presentation

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

VASIREDDY VENKATADRI INSTITUTE OF TECHNOLOGY

(AUTONOMOUS)
DEPARTMENT OF INFORMATION TECHNOLOGY

Guest Lecture on Career Opportunities in Cyber Security


By
Satyavathi Divadari
Director – Cyber Security
Bangalore
Cyber Security
Your Future
Answers to these Questions
● Why Cyber Security?
● What is Cyber Security?
● I got it, How can studying Cyber Security help me?
Technology Disruption
Technology Disruption Physical to
Digital
Technology Disruption - Physical to
Digital
Technology Disruption - Physical to Digital
● E-Banking
● Digital Health Services
● E-Commerce
● E-learning

Data the new “Oil”


Exploitation of the new “oil”
Data breaches
Finance Sector
- one example
Health Sector
- one example

WannaCry cyber attack cost the NHS £92m as


19,000 appointments cancelled
Service
Sector
- an example
Education Sector
an example

University estimated approximately 200,000 people were affected


by the breach

unauthorised access to significant amounts of personal staff,


student and visitor data extending back 19 years
What is Cyber Security?
Basics of Information Security

Authenticity Non repudiation


How do we
implement security
controls
Cyber Security as a career
According to a report from Cisco,
cyber security job demand is
projected to increase from currently
Demand of Cyber 1 million to 6 million globally by
2019, with an expected shortfall of
Security jobs 1.5 million, -Michael Brown, CEO,
Symantec.
Demand of Cyber
Security jobs
Cyber Security Specialist
Cyber Security Advisor
Cyber / Information security Analyst
Cyber / Information Security Engineer

Cyber / Information Security Auditor


Cyber Security Cyber / Information Security Manager

Professions Cloud Security Architect

Chief Information Security officer

Application Security Engineer


Cyber / Information Security Consultant

Product Security Engineer

Cloud Security Engineer


Cyber Security Automation Engineer
Special call out

Women in Technology
&
Women in Cyber
Security
● Data is the new “oil”
● Information is wealth
● Data breaches are increasing
Conclusions ●

Information Security Triad
Implementation is about People,
Process and Technology
● Cyber Security skills are in High
Demand
Your Life
Your Career
Your Choice

Reach me at

LinkedIn.com/in/satyad

You might also like