2017 insights and outlook

OUR National Resilience Depends On Bold Cybersecurity Leaders

Michael Echols MAY 2017: Our adversaries do not need Congressional approval or an acquisitions strategy to provide support to their project or their co-conspirators. They work together in support of each other’s efforts to infiltrate the networks of American institutions. Over the past two years, we have lost over 20 million Federal records, millions of medical data sets, and confidence in our election system due to the actions of hackers. Nonetheless, leaders at the highest levels of Government haven’t come up with a solution that is proportionate to the size of the problem.

The current situation can be summed up with the old adage “the good, the bad and the ugly.”



Ramona Drucker, Chief Human Capital Strategist, CEO of Tyche Consulting  

...Currently, there are hundreds-of-thousands of cybersecurity open positions and only a fraction of those jobs can be filled with the right talent. Meetings after meetings, we ask the same question, “where are they”; we then open a job req, close a job req, re-write the job req, and eventually cancel the position. As Talent Acquisition professionals, it feels like we’ve been interviewing and hiring the same 8 qualified candidates for the same 100 vacancies now for years..

The need for End-User Education - Tyche

Reduce risks across the organization.

Promote end-user responsibility among consultants and third-party vendors.

Demonstrate a commitment at organizational level.

Register as a CyberSAFE firm.


The Looming Cybersecurity Crisis And Why Opportunity Youth Are The Solution

Michael Echols is the CEO of the International Association of Certified ISAOs; former Deputy Director, Strategic Engagement and Cyber Infrastructure Resilience (SECIR), DHS

...In spite of many powerful innovations to make us more cyber secure, both governmental and private sector actors have failed to address the glaring talent gap in this field.  There is a worrisome shortage of individuals with the skills and experience needed to protect our country against the asymmetrical threats we face...

ISACA State of Cyber Security 2017 W hite Paper

ISACA State of Cyber Security 2017 White Paper

Current Trends in Workforce Development

Key Findings:

Most respondents view professional certifications as either equivalent to, or more important than, formal education.

Enterprises consider personal endorsements and formal education to be the least important cyber security candidate qualifications.

Close to 70 percent of hiring enterprises require a security certification for open cyber security positions.

Over a quarter of enterprises report that the time to fill cyber security and information security positions is one-half year.


Ten Ways Evolving Technology Affects Cybersecurity

Corporate Security Breaches

The majority of these corporate security breaches occur when hackers exploit employees through social engineering and scams.

Spear Phishing

Unlike regular phishing emails that target random people, culprits who normally lead spear phishing scams are seeking information for monetary gain; business secrets or private information.

Social Media Security Breaches

Not only do social media sites give hackers access to personal information, some sites can also share your exact whereabouts at any point in time. And if someone knows where you are – they also know where you are not.

Advanced Employee Training

With the expanding smartphone market, people are becoming more technologically savvy and need to be educated as technology develops. Proper training should be employed so that the company’s workforce understands the cybersecurity threats, and how to avoid them.


In the past, botnets were set up to take email and password credentials, which were very useful to spammers. However, with the emergence and advancements in technology, botnets are collecting more data from computers such as name, address, age, financial information, online activity and more..