To do this, the data analyst uses the provenance functions provided by the BDSP to extract the data analysis process and apply it. – data analyst reviews analysis results; – data analyst selects an analysis result to reuse its processing methods; – data analyst extracts the data processing methods and related data from the provenance information of the analysis result and modifies them to fit for the new experiment; – data analyst applies the data processing method. Data analyst is using analysis automation based on data updates by using the provenance information. Data analyst sets up the periodic analysis based on the updated data according to the update period of the data.
Language:English
Score: 991194.6
-
https://www.itu.int/en/publica.../files/basic-html/page124.html
Data Source: un
We reserve the right to request supplementary documentary evidence which may include recent recordings of broadcast reports or photos, as appropriate, where the journalist is credited.
Analysts are requested to complete the entire form and return it with:
an official letter of assignment from the Managing Director of the analyst house;
plus, any one of the following documents:
a recent copy of the page of the publication by the analyst house which provides the names of the analyst team and which lists the industry analyst seeking accreditation;
copies of recently (within the last 6 months) published reports or articles where the industry analyst is credited.
(...) Corporate blogs are not eligible for accreditation. Analysts may be eligible for accreditation providing they:
follow the telecommunications/ICT market;
are currently employed as an industry analyst by an internationally recognized analyst house;
report in one of the publications issued by the analyst house. (...) Process
ITU must be satisfied that anyone applying for accreditation is a professional journalist or analyst with a proven track record of reporting for bona fide media.
Language:English
Score: 987666.1
-
https://www.itu.int/en/wcit-12...Pages/media-accreditation.aspx
Data Source: un
We reserve the right to request supplementary documentary evidence which may include recent recordings of broadcast reports or photos, as appropriate, where the journalist is credited. Analysts are requested to complete the entire form and return it with:
an official letter of assignment from the Managing Director of the analyst house;
plus , any one of the following documents:
a recent copy of the page of the publication by the analyst house which provides the names of the analyst team and which lists the industry analyst seeking accreditation;
copies of recently (within the last 6 months) published reports or articles where the industry analyst is credited.
(...) Corporate blogs are not eligible for accreditation.
Analysts may be eligible for accreditation providing they:
follow the telecommunications/ICT market;
are currently employed as an industry analyst by an internationally recognized analyst house;
report in one of the publications issued by the analyst house. (...) Process
ITU must be satisfied that anyone applying for accreditation is a professional journalist or analyst with a proven track record of reporting for bona fide media.
Language:English
Score: 987666.1
-
https://www.itu.int/ITU-D/treg...GSR/GSR11/media_procedure.html
Data Source: un
.) — Technical framework (Last emerging technologies)
Organisations that are able to attract and retain digital security talent will be muchmore successful in profiting from the digital opportunity and managing the digital security risk
Cornerstone of the Digital Economy
Nizar Ben Neji 3GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Digital Security Domains Nine main domains
Digital Security
Nizar Ben Neji 4GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Digital Security Expertise Top Skills and Certifications
Nizar Ben Neji 5GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Information Security
System & Network Security
System & Network Administration
Linux / UNIX
Audit Planning
Audit Reporting
Risk Assessment
Computer Forensics
Malware Analysis
Project Management
TOP SKILLS TOP CERTIFICATIONS
CISA (Certified Information Systems Auditor)
CISM (Certified Information Security Manager)
GIAC (Global Information Assurance Certification)
CompTIA Security+ Certification
CCNA (Cisco Certified Network Associate)
CEH (Certified Ethical Hacker)
CHFI (Computer Hacking Forensic Investigator)
CISSP (Certified Information Systems Security Professional)
ISO 2700X
CIA (Certified Internal Auditor)
CRISC (Certified in Risk and Information Systems Control)
Digital Workforce Shortage
Digital security skills ranked first in both demand and talent gap Digital security workforce gap will reach 1.8 million in 2022 according to the
2017 Global Information Security Workforce Study of the International Information System Security Certification Consortium (ISC2)
Capgemini Digital Transformation Institute Survey (June‐July 2017)
High Demand
Nizar Ben Neji 6GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Top Reasons for Shortage
Reasons for shortage are various and vary mainly by region: ― Problem in finding qualified persons with knowledge, skills and abilities ― Hybrid job combining different skill sets that are not traditionally taught together ― Certifications become prominent for the employers and candidates are filtered out of the
hiring process on the basis of certifications ― Women not well involved and encouraged to practice this profession: Only make up 11%
of the cyber workforce ― Leadership not understanding the requirements for digital security skills ― Focus on senior professionals with years of experience and overlook recent grads ― Distribution of the digital security resources (private/public, country/abroad, …) ― Not well defined career path ― Inability to retain cyber security employees ― …
Global Information Security Workforce Study (2017)
U N IV ER
IS TY
CO M PA
N Y
Nizar Ben Neji 7GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Role of the University
Universities have a big role to play in the solution to ― Adapt the university programs to the digital security job market to have a
better aligned education and training pipelines ― Provide students with the needed skills ― Prepare for entry‐level certifications since IT digital security positions request
at least one of certifications (CISA, CEH, CISSP, …) and industry certification increase salaries
― Frequently update the content of the course materials to keep pace with this fast evolving demand
― Career centres at universities should provide students with guidance and advices regarding the job market needs to avoid unemployment and underemployment
― Universities could support the growth of technology‐based new ventures especially in digital security (create job opportunities for recent grads)
― Encourage female students to study and pursue degrees and careers in cyber‐ security
― …
Apply possible solutions as early as possible better than recycling
Nizar Ben Neji 8GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Cybersecurity Career Pathway University Entry‐Level Mid‐Level Advanced‐Level
Cybersecurity Specialist / Technician
Cybersecurity Analyst
Cybersecurity Consultant
Penetration & Vulnerability
Tester
Incident Analyst / Responder
IT Auditor
Cybercrime Analyst /
Investigator
Cybersecurity Specialist / Technician
Information Security
System & Network Security
System & Network Administration
Linux / UNIX
Audit Planning
Audit Reporting
Risk Assessment
Computer Forensics
Malware Analysis
Project Management
TOP 5 SKILLS 1
2
3
4
5
TOP 5
CISA
CISM
GIAC
Security+
CCNA
CEH
CHFI
CISSP
ISO 2700X
CIA
CRISC
Cybersecurity Manager
Senior Cybersecurity Engineer
Cybersecurity Architect
Nizar Ben Neji 9GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Cybersecurity Career Pathway University Entry‐Level Mid‐Level Advanced‐Level
Cybersecurity Specialist / Technician
Cybersecurity Analyst
Cybersecurity Consultant
Penetration & Vulnerability
Tester
Incident Analyst / Responder
IT Auditor
Cybercrime Analyst /
Investigator
Incident Analyst / Responder
Information Security
System & Network Security
System & Network Administration
Linux / UNIX
Audit Planning
Audit Reporting
Risk Assessment
Computer Forensics
Malware Analysis
Project Management
TOP 5 SKILLS 1
2
3
4
5
TOP 5
CISA
CISM
GIAC
Security+
CCNA
CEH
CHFI
CISSP
ISO 2700X
CIA
CRISC
Cybersecurity Manager
Senior Cybersecurity Engineer
Cybersecurity Architect
Nizar Ben Neji 10GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Cybersecurity Career Pathway University Entry‐Level Mid‐Level Advanced‐Level
Cybersecurity Specialist / Technician
Cybersecurity Analyst
Cybersecurity Consultant
Penetration & Vulnerability
Tester
Incident Analyst / Responder
IT Auditor
Cybercrime Analyst /
Investigator
IT Auditor
Information Security
System & Network Security
System & Network Administration
Linux / UNIX
Audit Planning
Audit Reporting
Risk Assessment
Computer Forensics
Malware Analysis
Project Management
TOP 5 SKILLS TOP 5
CISA
CISM
GIAC
Security+
CCNA
CEH
CHFI
CISSP
ISO 2700X
CIA
CRISC
1
2
3
4
5
Cybersecurity Manager
Senior Cybersecurity Engineer
Cybersecurity Architect
Nizar Ben Neji 11GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Cybersecurity Career Pathway University Entry‐Level Mid‐Level Advanced‐Level
Cybersecurity Specialist / Technician
Cybersecurity Analyst
Cybersecurity Consultant
Penetration & Vulnerability
Tester
Incident Analyst / Responder
IT Auditor
Cybercrime Analyst /
Investigator
Cybercrime Analyst / Investigator
Information Security
System & Network Security
System & Network Administration
Linux / UNIX
Audit Planning
Audit Reporting
Risk Assessment
Computer Forensics
Malware Analysis
Project Management
TOP 5 SKILLS TOP 5
CISA
CISM
GIAC
Security+
CCNA
CEH
CHFI
CISSP
ISO 2700X
CIA
CRISC
1
3
4
2
5
Cybersecurity Manager
Senior Cybersecurity Engineer
Cybersecurity Architect
Nizar Ben Neji 12GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Cybersecurity Career Pathway University Entry‐Level Mid‐Level Advanced‐Level
Cybersecurity Specialist / Technician
Cybersecurity Analyst
Cybersecurity Manager
Cybersecurity Consultant
Senior Cybersecurity Engineer
Penetration & Vulnerability
Tester
Incident Analyst / Responder
IT Auditor
Cybercrime Analyst /
Investigator
Cybersecurity Consultant
Information Security
Information Systems
Cryptography
Risk Management
Project Management
TOP 5 SKILLS TOP 5
CISA
CISM
GIAC
Security+
CCNA
CEH
CHFI
CISSP
ISO 2700X
CIA
CRISC
1
3
4
2
5
Linux / UNIX
Business Process
Software Development
Scanners
Security Operations
Cybersecurity Architect
Nizar Ben Neji 13GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Cybersecurity Career Pathway University Entry‐Level Mid‐Level Advanced‐Level
Cybersecurity Specialist / Technician
Cybersecurity Analyst
Cybersecurity Manager
Cybersecurity Consultant
Senior Cybersecurity Engineer
Penetration & Vulnerability
Tester
Incident Analyst / Responder
IT Auditor
Cybercrime Analyst /
Investigator
Cybersecurity Manager
Information Security
Information Systems
Cryptography
Risk Management
Project Management
TOP 5 SKILLS TOP 5
1
3
4
2
5
Linux / UNIX
Business Process
Software Development
Scanners
Security Operations
CISA
CISM
GIAC
Security+
CCNA
CEH
CHFI
CISSP
ISO 2700X
CIA
CRISC
Cybersecurity Architect
Nizar Ben Neji 14GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Conclusion
Digital security is the cornerstone of the digital economy Evolution of security: new needs, constraints, trends and challenges Digital security domains, required skills and certifications Digital security workforce shortage and universities simply aren’t in a position to fill the void Career pathway starts at the university Universities have a big role to play in the solution (update programs, include certifications, university career centres, partnerships with firms, research activities, entrepreneurship, …) Make clear and concise cyber security path ways to save the cyber security professions
Digital Security Capacity Building
Nizar Ben Neji 15GLOBAL ICT CAPACITY BUILDING SYMPOSIUM 2018
Dr.
Language:English
Score: 980520.2
-
https://www.itu.int/en/ITU-D/C...ations/Session%206/benneji.pdf
Data Source: un
Corporate blogs are not eligible for accreditation.
3. Analysts
should follow the telecommunications/ICT market; are currently employed as an industry analyst by an internationally recognized analyst house and report in one of the publications issued by the analyst house. (...) All Analysts are requested to provide an official letter of assignment and any of the following supporting documents:
a recent copy of the page of the publication by the analyst house which provides the names of the analyst team and which lists the industry analyst seeking accreditation;
copies of recently (within the last 6 months) published reports or articles where the industry analyst is credited.
(...) Process
ITU must be satisfied that anyone applying for accreditation is a professional journalist or analyst with a proven track record of reporting for bona fide media.
Language:English
Score: 977579.4
-
https://www.itu.int/en/wtpf-13...Pages/media-accreditation.aspx
Data Source: un
Corporate blogs are not eligible for accreditation.
Analysts should follow the telecommunications/ICT market; are currently employed as an industry analyst by an internationally recognized analyst house and report in one of the publications issued by the analyst house. (...) All Analysts are requested to provide an official letter of assignment and any of the following supporting documents:
a recent copy of the page of the publication by the analyst house which provides the names of the analyst team and which lists the industry analyst seeking accreditation;
copies of recently (within the last 6 months) published reports or articles where the industry analyst is credited.
1 Editorial staff of publications/news wire services, press photographers and TV/radio crews representing a recognized media organization.
2 UN press accreditation is valid, but UN-accredited media are kindly requested to confirm their intention to attend this event to pressreg@itu.int .
(...) Process
ITU must be satisfied that anyone applying for accreditation is a professional journalist or analyst with a proven track record of reporting for bona fide media.
Language:English
Score: 972826.3
-
https://www.itu.int/net/wsis/i...2013/forum/register/media.html
Data Source: un
Legal standing of Digital Forensic Analyst (1)
Copyright © 2008 CyberSecurity Malaysia Slide no: 7 Securing Our Cyberspace
Acceptance of expert opinion under the Section 5 of The Malaysia Evidence Act 1950
Pros – The testimony and analysis on the digital evidence will be accepted by court IF the analyst credibility is established.
Cons – The analyst must justify credentials through declaration of qualifications, background and experiences to assure the integrity of the findings and analysis made.
(...) When a subpoena issued to analyst by law enforcement (LE).
When statement has been taken by law enforcement officer.
Language:English
Score: 965621.9
-
https://www.itu.int/ITU-D/cyb/...ness-testimony-doha-feb-08.pdf
Data Source: un
Evidence that they regularly supply journalistic content to recognized media may be acceptable in the absence of an assignment letter at the discretion of the ITU Media Relations Service.
a valid assignment letter from the news organization or publication.
2. Analysts should follow the telecommunications/ICT market; be currently employed as an industry analyst by an internationally recognized analyst house and report in one of the publications issued by the analyst house. (...) All Analysts are requested to provide an official letter of assignment and any of the following supporting documents:
a recent copy of the page of the publication by the analyst house which provides the names of the analyst team and which lists the industry analyst seeking accreditation;
copies of recently (within the last 6 months) published reports or articles where the industry analyst is credited.
3. (...) ITU must be satisfied that anyone applying for accreditation is a professional journalist or analyst with a proven track record of reporting for bona fide media.
Language:English
Score: 963457.2
-
https://www.itu.int/en/plenipo...Pages/media-accreditation.aspx
Data Source: un
Corporate blogs are not eligible for accreditation.
3. Analysts
should follow the telecommunications/ICT market; are currently employed as an industry analyst by an internationally recognized analyst house and report in one of the publications issued by the analyst house. (...) All Analysts are requested to provide an official letter of assignment and any of the following supporting documents:
a recent copy of the page of the publication by the analyst house which provides the names of the analyst team and which lists the industry analyst seeking accreditation;
copies of recently (within the last 6 months) published reports or articles where the industry analyst is credited.
(...) Process
ITU must be satisfied that anyone applying for accreditation is a professional journalist or analyst with a proven track record of reporting for bona fide media.
Language:English
Score: 963457.2
-
https://www.itu.int/en/bynd201...Pages/media-accreditation.aspx
Data Source: un
Please see Guidelines for Blogger Accreditation below for more details.
3. Analysts
should follow the telecommunications/ICT market; are currently employed as an industry analyst by an internationally recognized analyst house and report in one of the publications issued by the analyst house. (...) All Analysts are requested to provide an official letter of assignment and any of the following supporting documents:
a recent copy of the page of the publication by the analyst house which provides the names of the analyst team and which lists the industry analyst seeking accreditation;
copies of recently (within the last 6 months) published reports or articles where the industry analyst is credited.
(...) Process
ITU must be satisfied that anyone applying for accreditation is a professional journalist or analyst with a proven track record of reporting for bona fide media.
Language:English
Score: 963457.2
-
https://www.itu.int/en/newsroo...creditation/Pages/ai-2017.aspx
Data Source: un