{"id":82385,"date":"2022-05-23T15:23:13","date_gmt":"2022-05-23T04:23:13","guid":{"rendered":"https:\/\/www.institutedata.com\/blog\/cyber-security-graduate-ez-yiap-shares-his-insights-into-his-institute-of-data-capstone-project\/"},"modified":"2024-06-24T16:44:17","modified_gmt":"2024-06-24T05:44:17","slug":"cyber-security-graduate-ez-yiap-shares-his-insights-into-his-institute-of-data-capstone-project","status":"publish","type":"post","link":"https:\/\/www.institutedata.com\/nz\/blog\/cyber-security-graduate-ez-yiap-shares-his-insights-into-his-institute-of-data-capstone-project\/","title":{"rendered":"Cyber Security Graduate, Ez Yiap, Shares His Insights Into His Institute of Data Capstone Project"},"content":{"rendered":"<p>At the Institute of Data, all our students create a capstone project to highlight the knowledge and talents that they&#8217;ve gained through their time with us.<\/p>\n<p>It&#8217;s a perfect opportunity for them to get creative with their new skills, apply them in a business situation, and create something they can bring to future job interviews and employment opportunities as proof of their strengths and abilities.<\/p>\n<p>In this write-up, <a href=\"https:\/\/www.institutedata.com\/blog\/from-travel-to-cyber-security-how-ez-re-booted-his-career\/\" target=\"_blank\" rel=\"noopener\">cyber security graduate Ez Yiap<\/a> shares his insights into his capstone project.<\/p>\n<h3><b>Hi Ez, please tell us about your capstone project.<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The Institute of Data (IOD) encouraged us to choose a capstone that demonstrated transferrable skills we could bring to the cyber security industry and what we had learned in the programme. The point of the capstone was also to highlight an aspect of cyber security that we enjoy or have in particular interest.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I developed a conceptual framework that organisations, communities and educational institutions could use to promote cyber security influence and advocacy. It is called the <em>S.A.L.E.S. Framework for Cyber Security<\/em>. S.A.L.E.S. stands for Stories to Address Learning and Empower Security.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The framework breaks down each of those five letters into a domain with cyber security categories and subcategories that address the use of storytelling to embed a secure culture, foundational cyber security concepts, knowledge, awareness and practical application.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The framework is built on three pillars:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Discover:<\/strong> Understanding and connecting people to cyber security.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Deliver:<\/strong> Creating knowledge sharing and accessibility to cyber security foundations, concepts, practices, controls, pathways and people.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Drive:<\/strong> Navigating a purposeful and empowered journey to a clear cyber security culture.<\/span><\/li>\n<\/ul>\n<h3><b>Interesting. How did you come up with the idea?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">I entered the world of cyber security without prior experience or understanding of it and without a background in information technology (IT).<\/span><\/p>\n<p>I found the IOD cyber security programme incredibly valuable in giving me a foundational knowledge and practical job applications.<\/p>\n<p>The more I learned and trained, the more I kept thinking how useful it would have been in so many of my previous jobs, and my life in general, to know this stuff.<\/p>\n<p><span style=\"font-weight: 400;\">Additionally, undertaking my journey into the cyber security industry after a decade working in the travel industry, I was exposed to the juxtaposition of crazy high demand for talent, and so many job opportunities but also the chellenge of landing a job.<\/span><\/p>\n<p>I began to realise there are certain industry and recruiting stigmas, as well as an overwhelmingly outdated organisational culture of where cyber security fits into the picture of business and education.<\/p>\n<p><span style=\"font-weight: 400;\">So, I figured why not use my capstone project to bring a fresh attitude, perspective and take on how we can use the strongest bond of community \u2013 storytelling \u2013 to drive a new kind of cyber security culture.<\/span><\/p>\n<h3><b>That shows great initiative. Where and how did you find the data?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">I had quite the journey of digging up the data to build my capstone project.<\/span><\/p>\n<p>It really evolved as I built out the framework, and bits and pieces of the concept and varying inspirations came together.<\/p>\n<p>I had anecdotal evidence about the <a href=\"https:\/\/fieldeffect.com\/blog\/overcoming-the-cybersecurity-talent-shortage#:~:text=The%20cybersecurity%20skills%20gap%20refers,outpaced%20traditional%20education%20and%20training.\" target=\"_blank\" rel=\"noopener\">cyber security resources talent gap<\/a>, maturity in organisations, and the gap in education\/awareness. But then I had to find the research and evidence to back that up. It required plenty of online research via educational institutions, government publications, news articles, publications\/blogs\/posts from recruiters, industry experts and more.<\/p>\n<p><span style=\"font-weight: 400;\">To push my capstone from being just a nice idea into an actual practical working platform, I looked to existing cyber security and information security frameworks, standards and guidelines. I found inspiration in the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener\">NIST Cybersecurity Framework<\/a> (CSF) publication as a way to holistically model the S.A.L.E.S Framework.<\/span><\/p>\n<p>This meant my framework could be used by pretty much anyone or any entity in either full, limited or focused capacity.<\/p>\n<p>Further, providing flexibility and encouraging adaptability was something important to the audience that came out of my research.<\/p>\n<h3><b>Did you have any challenges along the way?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The biggest challenge was probably breaking down the five functions into fifteen categories and then a further thirty-nine subcategories. On top of that, having to build out the description and examples of all of those to create clear, practical application and instruction for the implementation of the framework.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Developing the concept of the S.A.L.E.S. framework also found me met with challenges such as whether to target a specific demographic or audience versus keeping the framework broad and generic.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lastly, part of the challenge was to hold back and not get too carried away because it truly could be professionally developed, and I didn\u2019t have the resources to take it that far.<\/span><\/p>\n<h3><b>How did you overcome those challenges?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In breaking down the framework, I had to persist with an extensive examination of how existing frameworks work and how they are utilised and implemented.<\/span><\/p>\n[su_quote]I talked to peers, my IOD trainer, and friends objectively removed from cyber security to get input and run ideas by them.[\/su_quote]\n<p><span style=\"font-weight: 400;\">I did have to remind myself that the capstone is intended to be demonstrative and proof of concept, so it is okay to work within a certain scope and take it only so far.<\/span><\/p>\n<h3>As a cyber security graduate, how would you approach it differently in an industry setting?<\/h3>\n<p><span style=\"font-weight: 400;\">In my case, the capstone project being a cultural framework, there isn\u2019t really something that I would do differently in applying it within a job.<\/span><\/p>\n<p>The framework presentation provides a long list of use cases and how to implement it, including an eight-step guide.<\/p>\n<p><span style=\"font-weight: 400;\">To bring this into existence as part of a <a href=\"https:\/\/www.institutedata.com\/nz\/blog\/entry-level-job-in-cyber-security\/\">cyber security job<\/a>, I would follow that implementation and work on understanding the scope, purpose and goals of the organisation I was working with or for.<\/span><\/p>\n<h3><b>What was the end result of your project?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The end result was that I was both able to reinforce the <a href=\"https:\/\/www.institutedata.com\/nz\/courses\/cyber-security-programme\/\">Cyber Security Programme&#8217;s<\/a> content that I\u2019d learned through the project as well as demonstrate a way to use my knowledge and skillset practically and professionally.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The project affirmed for me that one of the transferrable and much-needed strengths I bring to the cyber security industry is knowledge and experience in creating a culture to drive organisational change.<\/span><\/p>\n<p>In my introduction to studying cyber security, I picked up the principle of cyber security needing to support the organisation\u2019s goals.<\/p>\n<p>For me, this means that unless you build a cyber security programme and journey on a strong, well-defined culture, you won\u2019t ever fully utilise cyber security to push the organisation forward.<\/p>\n<h3><b>Was there a specific person who helped you along the way?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">My IOD trainer Michael Choeng was very supportive and helpful in finalising my capstone project.<\/span><\/p>\n<p>Working in a cohort with like-minded students was great to bounce ideas off and help validate my direction in the project.<\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.linkedin.com\/in\/ez-yiap\/\" target=\"_blank\" rel=\"noopener\"><strong>Connect with Ez on LinkedIn<\/strong><\/a><strong> for more on his capstone presentation, hacking his way into the cyber security industry and experience with the Institute of Data.<\/strong><\/span><\/p>\n<p>If you would like to learn more about what is taught in the Institute of Data&#8217;s Cyber Security Programmes, <a href=\"https:\/\/www.institutedata.com\/nz\/courses\/cyber-security-programme\/\">download a Cyber Security Course Outline.\u00a0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the Institute of Data, all our students create a capstone project to highlight the knowledge and talents that they&#8217;ve gained through their time with us. It&#8217;s a perfect opportunity for them to get creative with their new skills, apply them in a business situation, and create something they can bring to future job interviews&hellip;<\/p>\n","protected":false},"author":1,"featured_media":62386,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[592,2729,583],"tags":[],"class_list":["post-82385","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-change-nz","category-case-studies-nz","category-cyber-security-nz"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/posts\/82385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/comments?post=82385"}],"version-history":[{"count":3,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/posts\/82385\/revisions"}],"predecessor-version":[{"id":82397,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/posts\/82385\/revisions\/82397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/media\/62386"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/media?parent=82385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/categories?post=82385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/tags?post=82385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}