2017 insights and outlook
CYBERSECURITY PUBLIC SAFETY WORKFORCE - POWERED BY INSPIRATION
Ramona Drucker, Chief Human Capital Strategist, CEO of Tyche Consulting
...Currently, there are hundreds-of-thousands of cybersecurity open positions and only a fraction of those jobs can be filled with the right talent. Meetings after meetings, we ask the same question, “where are they”; we then open a job req, close a job req, re-write the job req, and eventually cancel the position. As Talent Acquisition professionals, it feels like we’ve been interviewing and hiring the same 8 qualified candidates for the same 100 vacancies now for years..
The need for End-User Education - Tyche
Reduce risks across the organization.
Promote end-user responsibility among consultants and third-party vendors.
Demonstrate a commitment at organizational level.
Register as a CyberSAFE firm.
The Looming Cybersecurity Crisis And Why Opportunity Youth Are The Solution
Michael Echols is the CEO of the International Association of Certified ISAOs; former Deputy Director, Strategic Engagement and Cyber Infrastructure Resilience (SECIR), DHS
...In spite of many powerful innovations to make us more cyber secure, both governmental and private sector actors have failed to address the glaring talent gap in this field. There is a worrisome shortage of individuals with the skills and experience needed to protect our country against the asymmetrical threats we face...
Current Trends in Workforce Development
Most respondents view professional certifications as either equivalent to, or more important than, formal education.
Enterprises consider personal endorsements and formal education to be the least important cyber security candidate qualifications.
Close to 70 percent of hiring enterprises require a security certification for open cyber security positions.
Over a quarter of enterprises report that the time to fill cyber security and information security positions is one-half year.
Ten Ways Evolving Technology Affects Cybersecurity
Corporate Security Breaches
The majority of these corporate security breaches occur when hackers exploit employees through social engineering and scams.
Unlike regular phishing emails that target random people, culprits who normally lead spear phishing scams are seeking information for monetary gain; business secrets or private information.
Social Media Security Breaches
Not only do social media sites give hackers access to personal information, some sites can also share your exact whereabouts at any point in time. And if someone knows where you are – they also know where you are not.
Advanced Employee Training
With the expanding smartphone market, people are becoming more technologically savvy and need to be educated as technology develops. Proper training should be employed so that the company’s workforce understands the cybersecurity threats, and how to avoid them.
In the past, botnets were set up to take email and password credentials, which were very useful to spammers. However, with the emergence and advancements in technology, botnets are collecting more data from computers such as name, address, age, financial information, online activity and more..