Cyber Sec
Cyber Sec
SUCCESS IN
THE FIELD OF
CYBERSECURITY
2
Our Mission
“Roadmap for Success in the Field of Cybersecurity”, 2022-2023
California Institute of Arts & Technology is committed to personalized training
through comprehensive,
innovative, and high-quality vocational programs that prepare students for a
rewarding profession in growing
career fields. CIAT has served over 3,000 students since opening our doors. We
keep our class sizes small so
that each of our students get the personalized attention they need to succeed in our
programs. At CIAT you’re
more than just a number. Our team supports you through your entire journey from
your first day of class to
landing your dream job and beyond.
2
3
Table of Contents
Title page
What are Employers Looking for in a Cybersecurity Candidate?
Top Employers Hiring Qualified Cybersecurity Candidates
Cybersecurity Job Market in 2022-2023
13
Roadmap for Success in the Field of Cybersecurity
Mission Statement
Table of Contents:
Flexibility, reliability, and understanding when working in cybersecurity are
essential for all
candidates.
Women In Cybersecurity
Higher Education
Top Employers – United States (Cybersecurity)
FAANG
Public Sector (State Local Government, Higher Ed)
Global Telecom- Service Providers
Global Defense (Clearance)
Global Financial – Fintech
Emerging Markets – Growth Sectors
What are DevOps, NetOps, AppDev, & SecOps?
The Alignment between NetOps and DevOps Roles
Moving Ahead Of Traditional IT to the DevOps Culture
The Rapid Adoption of the DevOps Culture to Support Digital Transformation
Initiatives
Be a Member of a Scrum
Learn to be a Scrum-Traveler
126899
10
10
10
10
11
11
11
12
13
14
14
15
15
15
3
6
4
What are the Most Important Certifications for a Cybersecurity
Candidate?
Being Active in Industry Consortiums
Job Hunting at Industry Consortiums
16
16
17
22
17
18
23
23
25
19
21
17
18
20
21
23
25
26
25
21
24
25
26
25
22
Cybersecurity Jobs - Top Career, Salaries, and Education Options
Why the Demand for Cybersecurity Professionals?
The Career Outlook for Cybersecurity Positions
All cybersecurity professionals are critical to the success of the organization
Critical Technical Skills Needed for a Career in Cybersecurity
What are the Most Common Entry-level Jobs in the Cybersecurity
Field?
What are the Most Advanced Cybersecurity Positions?
Cybersecurity Average Salary Range by Position
Average Pay by Role
Importance of Cybersecurity Certifications and Industry Consortiums
Basics of Cybersecurity Obtaining
Advanced Certifications
Professional Certification Paths
Public-Private Partnership
Top Cybersecurity Industry Usergroups and Consortiums
How to Develop a Successful Career in The Cybersecurity Field
Cybersecurity is in every facet of a life well beyond the board room
Valuable soft skills essential to all cybersecurity professionals
How do you stay up with the constant change in cybersecurity?
An eye for integration skills
Knowledge gained is knowledge earned
Embracing trial and error in cybersecurity careers
4
5
How to Apply for a Job in Cybersecurity
TAKE THE FIRST STEP
27
29
Understanding Industry terms
Complete Academic Courses
Continue with all your certification courses
Network
Create a portfolio of your IT and Cybersecurity projects
Practice Interviewing with your friends and mentors
Be patient
IT Career Development at CIAT
Career Planning
Let Us Help You Achieve Your Career Goals
27
28
28
28
28
28
28
29
29
29
5
ACKNOWLEDGMENTS 30
6
58%
27%
31%
Flexibility, continuous education, and being a scrum member are critical
components to success in
cybersecurity. Organizations will change their products, services, and
locations based on cybersecurity
breaches and ongoing threats. Candidates need to have that mindset before
entering this field.
Additional attributes include:
isaca.org
6
7
Read - Knowledge of
security models, penetration
testing, encryption, and
research past cyber-attacks.
Watch Youtube Videos -
Classes of attacks, diagnostic tools, and networking
concepts.
Attend Online Virtual Events
- Career in cybersecurity,
cybersecurity Programs, and
vendor presentations.
Security vendors are constantly refreshing YouTube and other online
content. Blogs, whitepapers,
and ebooks get released each week.
The candidate is encouraged to bookmark specific vendors, industry groups,
and experienced cyber
warriors. By following their blogs, candidates can pick up a first-hand
account of a security breach or
hear about the latest email security and encryption.
7
8
1 in 5
say it takes more than 6 months to find qualified
cybersecurity
candidates for open positions.
Women represent 25% of the global
cybersecurity workforce by 2021, up from
20% in 2019 and around 9% in 2011. As we
expect a steady increase in women entering
cybersecurity jobs over the next ten years,
the skills gap between men and women will
shrink.
8
9
Higher Education
Top US Cities for Cybersecurity Positions
A Bachelor’s Degree in cybersecurity can lead to many entry-level job
opportunities, such as
cybersecurity analyst, information security specialist, and penetration tester.
Annual median salaries
range from $75,000-$100,000.
Bachelor degree programs like the Applied Bachelor’s in Computer
Information Systems -
Cybersecurity Concentration provide the foundational training for those new
to tech or early-stage
IT professionals with a prior degree but need industry certifications. Earning
a CIS Bachelor's
Degree is a definitive way to show potential employers that you have
specialized expertise in
hardware and software support, networking, cybersecurity, and cloud
administration. Cybersecurity
professionals need to demonstrate a wide range of technical skills, from
hardware and software
management to network security, and this program prepares students for
entry-level cybersecurity
careers, starting with the CompTIA Security+ certification.
Washington, D.C.
New York, NY
Chicago, IL
Arlington, VA
San Diego, CA
Atlanta, GA
Charlotte, NC
Boston MA
Detroit, MI
Los Angeles, CA
Santa Clara, CA
Portland, OR
Austin, TX
9
10
Top Employers -
United States (Cybersecurity):
Every organization needs cybersecurity resources. If the company uses
email, web content, and
online platforms for clients to access products and services, they need a
cybersecurity team. Security
vulnerabilities, cyber threats, and digital attacks impact employers.
Employers from 5 people to 100,000 continue recruiting cyber security
engineers to help support
DevOps, SecOps, NetOps, and AppDev teams. Many organizations outsource
critical IT and secondary
roles because they lack candidates and experienced personnel. Relevant
experience in data analytics,
problem-solving skills, and hands-on experience are a plus.
Cybersecurity Engineer, Network Security Engineer, Software Engineering,
Penetration
Testing Engineers, Application Security Engineers
Cloud Architects, Sales, Marketing, SecOps-DevOps-Netops, Incident
Response, Product
Engineering, Customer Success, Partnership Manager, IT Helpdesk, Security
Analyst
Job Roles:
Adding
Roles:
FAANG
Employers Include:
• Facebook
• Amazon Web Services
• Apple
• Netflix
• Google
• County of Los Angeles – Los Angeles California
• County of Orange – Orange California
• University of California – Sacramento California
• The University of Chicago
• University of Southern California
• Arizona State University
• University of Oregon
Public Sector:
State / Local Govt, Higher Ed:
• George Mason University (VA)
• University of Texas
• Northwestern University
• University of California San Diego
• State of Virginia
• State of California
• State of Florida
10
11
Global Defense
(Clearance):
Global Financial
Fintech:
• General Dynamics Information Technology
• Leidos
• CACI
• General Atomics and Affiliated Companies
• Northrop Grumman
• BAE Systems
• VIASAT
• SpaceX
• Trustwave
• Raytheon
• SAIC
• PricewaterhouseCoopers LLC
• Bank of America
• Mellon Bank
• CitiGroup
• LPL Financial
• Intuit
• American Express
• Charles Schwab
• Wells Fargo
• Union Bank
• Capital One
• Loan Depot
• Level 3 Communications – Denver Colorado
• Cox Communications
• AT&T
• Verizon
• Sprint/TMobile
• Qualcomm
• Broadcom
Global TelecomService Providers:
11
12
Emerging Markets –
Growth Sectors:
• Marriott International
• Resmed
• Dexcom
• Calloway Golf
• Illumina
• Marathon Oil
• Halliburton
• Delta Airlines
• HomeDepot
• Coca-Cola
• Duke Energy
• Capital One
• Ford Motor Company
• Rivian
• Starbucks
According to the Bureau of Labor Statistics, based on the number
of openings in the U.S. economy today and over the next few years,
the idea of lifelong employment may arguably be a statistical truth.
However, the amount of knowledge required for cybersecurity varies
from person to person, but there are endless career opportunities in
our field.
Cybercrime, which costs the world $10.4 trillion annually by 2025, is
expected to generate new jobs roughly equal to the ones being filled
over the next five years.
“If you know cybersecurity, you have a job for life,” said Robert
Herjavec, a Shark on ABC’s Emmy Award-winning TV show “Shark
Tank,” in a 2018 Cybercrime Magazine podcast interview. At that time,
he claimed a zero-percent unemployment rate in cybersecurity.
12
13
Cybersecurity Jobs -
Top Career, Salaries, and
Education Options
The role of a cybersecurity warrior is comprehensive and exciting. Industry
trends show a
considerable demand for several cybersecurity roles. Cybersecurity analysts,
cloud architects, and
network security professionals are some of the most sought-after candidates.
A degree in cybersecurity provides many options for candidates to move
laterally within the industry.
Many cybersecurity candidates start as network engineers,
eventually moving to a security architect
role or an information security manager. Finding cybersecurity
talent is a challenge for every industry
to help fill many cybersecurity job openings that go unfilled over
time due to the lack of available
candidates.
Importance Of Cybersecurity
Certifications and Industry
Consortiums
Cybersecurity is one of the most crucial areas for ensuring
a business’s success and longevity. With cyberattacks
growing in sophistication, it’s essential for business owners
to protect their companies by hiring qualified cybersecurity
professionals to protect their company assets. Candidates
with certifications in information security and cybersecurity
with relevant work experience will have many options in
the profession.
Most cybersecurity certifications require a minimum of several years of
technology, business, and
undergraduate college education. With the rise of online courses and MOOCs
(Massive Open Online
Courses), there is an increasing demand for non-technical professionals to
become certified.
There are specific and very generic cybersecurity certifications. You can get
certified to perform
a particular job, work with certain products, or be employed by a company.
Broad certificates
are relevant across job roles and industries and usually enhance someone’s
existing career.
Most certifications require ongoing training, such as the Certified IT Security
Professional (CISSP)
certification, which requires recertification every five years. The CISA
certification must be updated
every three years.
Accredited organizations provide cybersecurity certifications that follow and
maintain a certain level
of industry-accepted standards. Certifications are valued because they are
accepted by IT industry
accrediting bodies and government agencies that set criteria.
Basics of Cybersecurity
Certifications are an essential part of any career in information security.
They’re
also a good way for employers to identify potential critical hires for their
cybersecurity positions.
Cybersecurity certifications provide numerous benefits for employees and
companies. In a survey by CompTIA, employers believe that IT certifications
give
workers an advantage. Certification is a good indicator of a candidate’s
success.
With certifications, you’ll be able to stand out from the crowd and open up
career options.
Obtaining Advanced Certifications
Becoming part of the growing cybersecurity workforce as a security
specialist is full of lifelong choices
of opportunity. From being a penetration tester to a role in cybersecurity
management, the decision for
a candidate to follow a cybersecurity career will be rewarding for years to
come.
Here we will break down the top certifications and other guidance you’ll need
to make the right
decision. This will serve as an excellent primer for individuals embarking on a
cybersecurity career.
21
22
The global cyber security market is forecast to expand at a compound rate of
10% a year through 2027,
which means new jobs — and fierce competition for those high-paying jobs
as more and more people
try to get into cybersecurity. Every financial, healthcare sector, risk
management, and government
organization seeks certified professionals to help fill the many cybersecurity
job openings.
Certification holders with a solid educational background in cybersecurity will
show prospective
employers they are ready for the challenge. So ask yourself: Where do you
see yourself in three
years? Do you want to focus on a company’s security infrastructure, or do
you want to be on the front
lines? Or perhaps you want to be an auditor or pen tester, ensuring current
systems work as they’re
supposed to. For executives, maybe you just want a proper understanding of
the systems supporting
your company.
Most professional cybersecurity certifications are for those working directly
in a technology role,
whether in cybersecurity or a related field like information technology or
networking.
As for difficulty level, certification exams range from moderate to
challenging, depending on the
material and type of certificate. For example, the highly technical Certified
Ethical Hacker certification
requires months of study and years of cybersecurity experience. At the same
time, an entry-level
certificate like Microsoft’s Technology Associate Security Fundamentals
might only call for a good
general knowledge of computing and how programs and computer networks
operate.
These certifications help round out areas of expertise, educate people about
new technology and
industry methods, and develop domain expertise. Most major cybersecurity
certifications fall into this
category.
Although a popular certification, the CISSP isn’t for beginners because
passing the exam requires
extensive cybersecurity knowledge and field experience. It is intended for
experienced cybersecurity
administrators, managers, and executives. One key benefit of the
certification is that it’s vendor-neutral,
so you can get experience managing and launching security programs
without being tied to a single
product or platform.
As each candidate decides on which domain within cybersecurity they wish
to pursue, the following
certifications are recommended:
Highly recommended for candidates pursuing
a career as a cloud security architect. This role
focuses on building, designing, and installing
security systems for cloud-based computing and
data storage systems.
CompTIA Sec+
CEH - Certified Ethical
Hacker
AWS Security Specialty
Microsoft Azure Security Engineer
Amazon Cloud Security Architect
Why Do You Need a Cybersecurity Certification?
Professional Certification Path
What Are the Most Important Certifications For
a Cybersecurity Candidate?
22
23
Certified Information Systems Security Professional (Highly recommended
after the candidate has
at least two years of practical experience in a cyber security role.
The GIAC Security Expert (GSE), recently ranked the highest-value
certification in the industry, is
widely recognized as one of the most challenging and meaningful credentials
in cybersecurity
Certified Information Security Manager - Highly recommended if the
candidate pursues a career
path towards IT or SecOps management.
Certified Information Security Auditor - Highly recommended if the candidate
considers a career as
an internal or external IT auditor.
Cisco Certified Network Associate - Recommended for all candidates to
demonstrate basic
knowledge of networking principles.
Certified Cisco Networking Professional - Highly recommended for candidates
with one year of
experience in networking, security operations, or cloud services.
Microsoft Certified Azure Architect -Microsoft Certification validates your
abilities to stay current and
perform in job roles for a modern digital business. Ninety-one percent of
certified technical experts
believe that the effort employees put into acquiring new skills contributes to
their success.
CISSP
SANS GIAC
CISM
CISA
CCNA
CCNP
MCAA
In addition to continuous education, candidates are encouraged to
participate in various industry
consortiums and user groups. For candidates new to the cybersecurity space,
being active in the local
consortiums helps make connections and networks with technologies and
experts in the field. Many
experts will speak at industry events to share their experiences, knowledge,
and best practices across
several disciplines with the cybersecurity place. Many vendor
representatives from Microsoft, CompTIA,
Citrix, Cisco Systems, F5 Networks, and IBM often speak at these events and
provide sponsorship.
Public-Private Partnership
Industry consortiums are an excellent opportunity for candidates to network
with other people to
discover which companies are hiring. The sponsoring technology company
and other prospective
employers will also hold job fairs during consortium events. Candidates can
learn firsthand what
companies are looking for, what positions are available, the expected salary,
and the timeline for the
job needing to be filled.
Being Active In Industry Consortiums
Job Hunting at Industry Constortiums
23
24
Top Cybersecurity Industry Usergroups and
Consortiums
The cybersecurity market host several industry user groups, consortium, and
conferences. Many of
these user groups are specific to particular domains and areas of interest
within the cybersecurity
consortium.
Here is a list of regional and national groups all candidates should participate
in:
ISSA
International Systems Security Association (regional and national)
WiCYS
Woman in Cybersecurity
WSC
Woman’s society of CyberJutsu
ACIC
Automotive Cybersecurity Industry Consortium
ISACA
Information Systems Audit and Control Association (regional and national)
RSA Conference
Yearly conference - a global industry consortium.
SANS.Org
SANS focuses on continuous certification and learning for cyber
professionals.
ISC2
(ISC)² was founded in 1989 as the International Information
System Security Certification
Consortium, Inc. Our founders saw the need for standardization
and certification in the
cybersecurity industry. Since then, our founders and members have been
shaping the information
security profession.
AISP
Association of Information Security Professionals
24
CompTIA
The Computing Technology Industry Association
25
How To Develop
A Successful Career in the
Cybersecurity Field
Cybersecurity jobs continue to grow as more regulation and security
incidents impact people’s lives.
As technology continues to become an integral part of our daily lives, it’ll be
essential to protect
the technology that makes it possible. The cybersecurity industry suffers
from a lack of qualified
candidates to deal with the constant attack on organizations’ security
systems and assets.
A successful career requires soft skills, flexibility, and acceptance of a trial
and error culture. There are
several reasons why companies cannot find the skilled cybersecurity
professionals they need. First,
there are not enough qualified cybersecurity professionals with technical and
soft skills.
Organizations will change their product offerings, services, and locations
based on cybersecurity
breaches and ongoing threat assessments.
To start, you’ll want to develop good work habits, including the capacity to
work methodically (in a
detail-oriented manner).
Any good cybersecurity professional knows how to holistically examine a
company’s security setup,
including threat modeling, specifications, implementation, testing, and
vulnerability assessment.
They also understand security issues associated with operating systems,
networking, and virtualization
software.
The following critical skills also come in handy:
An eye for integration skills.
Cybersecurity is in every facet of a life well beyond the board room.
It’s no wonder many analysts regularly identify cybersecurity
threats as one of the top two issues facing business today—
failing to keep data security risks, fines from government
entities, and damage to reputations. Security professionals at
all levels not only know the most current security concepts and
industry trends, but they also know the most recent privacy and
security regulations. For example, the new California Consumer
Privacy Act of 2020, which gives consumers more control over
their data, went into effect on Jan. 1, 2021. When a security
incident occurs, companies are often fined, executives are
fired, customers may leave, and an organization‘s reputation
takes a hit. Cybersecurity experts help companies avoid the
headaches of a cyberattack by keeping their security strategy
and operations up to date.
Valuable soft skills are essential to all cybersecurity professionals.
How do you stay up with the constant change in cybersecurity?
Flexibility
Continuous education
Being a scrum member
25
26
Knowledge Gained Is Knowledge Earned.
Organizations will create new jobs for cyber security engineers based on
needs following a security
attack. Cybersecurity positions within organizations are not static.
Knowledge, past experiences, the latest educational investments in
workshops, and attending lectures
will all bring value to the candidate:
Accepting the concept of trial and error is critical for any cybersecurity
candidate. Like other career
paths, many people in the early days of cybersecurity did not attend a formal
school to learn the craft.
Many early practitioners learned cybersecurity by picking up a manual or
learning as they went along.
In the late 1990s, the idea of a firewall looked more like an extended access
control list on a Cisco
router. Setting up a firewall looks similar to loading a server
application in a single computer device
with two cables coming in and out—one for the “clean” and the
other for the “dirty” network. There was
no formal education around deploying firewalls, not even a
youtube video.
Technology is far from perfect. Configuration mistakes happen daily to
SecOps, DevOps, and NetOps
team members. Sometimes, these mistakes aren’t recognized for several
months after deployment.
When things do break, and they will, a good cybersecurity professional will
focus on experience,
knowledge of the product, and remember the fundamentals of all solutions;
they will break, and
rebooting doesn’t always fix the problem. Solving the problem through trial
and error for the
cybersecurity professional is a good thing. Sometimes, there are many ways
to solve a cybersecurity
issue. Multiple team members from DevOps, SecOps, and NetsOps will often
collaborate to develop
options to solve the problems. Together, the teams learn from each other.
Many cybersecurity professionals are driven to learn about the daily
applications, systems, and
networks they protect. More often, a SecOps, DevOps, or NetOps person will
volunteer their time in
other parts of the information technology to gain more knowledge of the
organization’s digital
Knowledge of Risk Management - Foundation Skills in risk, compliance, and
auditing helpful
Knowledge of Network Security - Hands-on experience helpful
Knowledge of Network Protocols - Relevant Experience in Network protocols
and ports
Understanding of incident Response - Analytical skills helpful
Knowledge of Intrusion Detection - Technical background in IDS, IPS, and
Host-based helpful
Understanding of System Administration - Background in Security Concepts
helpful
Read - Knowledge of Security Models, Encryption, and cyber-attack stages
Watch Youtube Videos - Classes Of Attacks, Diagnostic tools, and networking
concepts.
Read More
Embracing Trial and Error in
Cybersecurity Careers
How to Gain More Cybersecurity
Experience
26
27
Candidates Should Consider Several Factors
Before Applying For
Various Entry-level Positions:
landscape. Some will block out time on their weekly calendar to help out in
the IT helpdesk helping out
with trouble tickets. Some cybersecurity team members will volunteer to
help with weekend network
cutovers or system upgrades. The cybersecurity professionals will learn more
about the organization’s
technology environment and become more well-rounded teammates to
others in the IT department.
Today, the cybersecurity job market is near nearzero unemployment, and
organizations across the
industry offer high salaries for top cybersecurity
talent. Salaries for jobs in cybersecurity are high
compared to other fields.
The job outlook for cybersecurity practitioners
is highly positive, making it an excellent option
for anyone looking for a career in cybersecurity.
According to ISC2.org, approximately 2.93 million
cybersecurity positions are open around the globe.
Applying for a job in cybersecurity is familiar to
other career fields. Employers are looking for
people with technical skills, relevant experience,
and a solid foundation of knowledge in the area.
For the first step in applying for entry-level cybersecurity jobs, the applicant
needs to build a list
of the top 3 domains they plan to focus on. Are you preparing for a career as
network security,
application security developer, or security operations manager?
The applicants must be honest and assess their cybersecurity skill set,
education, and career
expectations. Cybersecurity is no different.
Seek mentors to help build the three positions’ shortlist and advise which
companies will most
likely be hiring. The field is filled with experienced cybersecurity
professionals who love to
mentor others.
Landing the first role in cybersecurity is only the start. Experienced
cybersecurity warriors did not
start as senior incident directors on day one. The journey within
cybersecurity is dynamic.
How To Apply For A Job In Cybersecurity?
What Do All Candidates Need to Have Ready
Before Applying For a Job?
All applicants should be well versed in industry terms and acronyms for
cybersecurity. These
acronyms for cybersecurity roles include:
Understanding Industry Terms:
27
28
SecOps - Security Operations and Security Engineering
TAKE
THE FIRST STEP.
IT Career Development at CIAT
Let Us Help You Achieve Your Career Goals
Building a strong IT career takes hard work and dedication. Whether you’re
just starting in the field
or advancing your career, learning how to create an education plan that
aligns with your career goals
saves you time and money and delivers the most significant return on your
investment.
Now that you’ve chosen an education plan with a goal in mind, and now
you’re focused on making the
most of your educational resources to ensure you’re setting yourself up for
success in the job market.
The most impactful recommendation we give to all new CIAT students in the
tech field is not to wait
until graduation to start their IT career planning. When you begin your career
planning steps from day
1 of your program, you graduate career-ready and are more likely to find
your first job quickly, with
competitive salary ranges.
When landing your dream job, CIAT supports its students every step of the
way – ensuring you
graduate with more than just a degree. Our IT career coaching services focus
on your professional and
personal development to help prepare you for a career in cybersecurity:
Start your path to a new career with:
Hands-on, Accelerated Cybersecurity Programs
at CIAT
CIAT offers three levels of cybersecurity programs taught by industry-
certified instructors – Certificate,
Associate’s and Bachelor’s Degree – that are designed to fit the needs of
students and working adults
with a range of technical skillsets and academic backgrounds. All technical
courses are mapped to
industry certifications, and CIAT offers several test-taking resources to
ensure you pass your exams
with flying colors: complimentary exam vouchers, a unique unlimited
certification exam policy, practice
exam software, live test prep workshops, and more! With stackable IT
programs, students can start with
a Certificate program and seamlessly transfer completed courses to earn
credit towards an Associate
or Bachelor’s degree.
Explore Cybersecurity Programs
• Personalized career coaching
• Industry certification workshops
• Resume building
• LinkedIn profile optimization
• Mock interview practice
• Job placement support
• Dedicated job board
• Specialty career-building workshops
• Technology career fairs and employer “meet and greets”
• Work-study and volunteer opportunities
Book a Meeting with an IT Career Advisor
29
30
Acknowledgments
“Roadmap for Success in the Field of Cybersecurity”, 2022-2023
Writer: John Gormally, Cybersecurity Contributer - Cyclewriter LLC
7. ISACA.org - https://www.isaca.org/resources/infographics/state-of-cybersecurity-
2021-infographic
8. CBInsights - https://www.cbinsights.com/research/cybersecurity-artificial-
intelligence-startups-market-map/
9. cybersecurityventures.com - https://cybersecurityventures.com/jobs/
13. cybersecurityventures.com - https://cybersecurityventures.com/cybercrime-
damage-costs-10-trillionby-2025/
14. “The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business
Win” - Gene Kim, Kevin Behr,
George Spafford
16. tuleap.org - https://www.tuleap.org/agile/agile-scrum-in-10-minutes
17. IBM - https://www.ibm.com/reports/data-breach
18. Forbes - https://www.forbes.com/advisor/business/agile-vs-waterfall-
methodology/
21. CompTIA - https://resources.infosecinstitute.com/certification/security-salary/
21. ZipRecruiter - https://www.ziprecruiter.com/salaries
25. ISSA - https://www.issa.org/
WiCYS - https://www.wicys.org/
WSC - https://womenscyberjutsu.org/
ACIC - https://www.acic-auto.org/
ISACA - https://www.isaca.org/en/why-isaca
RSA Conference - https://www.rsaconference.com/en
SANS.Org - https://www.sans.org/
ISC2 - https://www.isc2.org/about
AISP -https://www.aisp.sg/
28. ISC2.org - https://www.isc2.org/Research/Workforce-Study
30