You are on page 1of 2

IT Security Career Paths and Certifications

with Marc Menninger

IT Security Timeline

1969 1975 1977 1979 1982 1983 1985 1986 1988 1989 1990

First message First test Apple II FFIEC Commodore ARPANET Windows Computer Morris worm SANS ARPANE
sent via of TCP/ IP 64 migrated to 1.0 Fraud and → CERT Institute decommis-
ARPANET between TCP/IP Abuse Act founded sioned →
two Internet
ISACA networks “WarGames” (ISC)² born
founded founded
HTTP,
“Cuckoo’s HTML, first
Egg” web server,
first web
browser

1992 1993 1994 1995 1996 1999 2000 2001 2002 2003 2004

Michelangelo First DEF CISSP SSL High-profile Melissa virus ILOVEYOU NIST FISMA National PCI DSS
virus CON credential- website de- worm chooses Cyber
conference launched BS 7799 facements Back Orifice AES Sarbanes- Security
“Sneakers” (CIA, USAF, 2000 Oxley Division
SAS 70 Vladimir etc.) First major opens
Levin hacks GLBA DDoS attack California within
Citibank HIPAA involving enacts first
Dept. of
DNS data breach-
Homeland
COBIT notification
Security
servers as law
reflectors Anonymous
formed
Code Red
worm

IT Security Career Paths and Certifications with Marc Menninger


1 of 2
2005 2006 2007 2008 2009 2010 2011 2012 2014 2015

NIST SP VA loses Successful Cloud Conficker Stuxnet FedRAMP Marriott OPM White
800-53 laptop spear phish- Security worm worm hacked hacked House
containing ing attack Alliance SSAE 16/ hacked
ISO/IEC data on 26.6 of Office of FAA hacked US Cyber SOC 2 Farmers Target
27001 veterans Secretary of Command Insurance hacked Anthem
HITECH activated Bank of hacked hacked
and families Defense
TJX hacked America Sony hacked
21,549 sites Country hacked Mastercard Pentagon
hacked Home hacked
defaced of Estonia
PlayStation Depot
at once suffers
Network SCADA hacked IRS hacked
by single 22-day
hacked systems of
hacker DDoS US Postal United
6 countries
attack Reported including US Service Airlines
hacks hacked hacked hacked
of DoD,
Pentagon, CIA
NASA, etc. Director’s
email
700,000 hacked
websites
defaced SSL official-
at once ly replaced
by single by TLS 1.2
hacker

Trends:
• Attacks: more sophisticated, frequent, and successful

• Need for security professionals increasing: regulatory requirements, business self-protection, customer demands, etc.

Legend:
• Technology
• Hacks, Attacks, and Data Breaches
• Laws, Rules, Standards, and Regulations
• Certifications and Organizations

IT Security Career Paths and Certifications with Marc Menninger


2 of 2

You might also like