Latest Cybersecurity Crisis: Where's the Talent?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Next

Existing Skills

Consider how to leverage your existing skills.

If you're a programmer, your expertise may come in handy for creating more secure software development lifecycles, or you may be qualified for a security engineering position where you help utilize vendor APIs to incorporate automation and orchestration. If you're a network admin, you can transition into more of a network security-monitoring role. Chances are cyber defense has a position to fill that can utilize your existing skills, so expand your horizon to see how what you bring to the table may fit some of these emerging positions.

One of the biggest challenges in the cybersecurity field is that there aren't enough qualified experts to manage the volume of attacks, alerts, audits, incident response drills, infrastructure upgrades and compliance reports. And that's not even getting into threat hunting or risk hunting. So, how do we get more skilled workers and white hats on board to fight the growing number of bad guys out there?

According to Ben Johnson, chief security strategist, Bit9 + Carbon Black, steps are being taken to make improvements – technology (in some situations) helps automate things, reducing the amount of human interaction needed, programs to incentivize entrance into the information security field are being formed, mainstream exposure in the entertainment industry, such as the movie Black Hat and the TV show CSI: Cyber, increases the "cool" factor, etc. However, the industry still has an urgent need for technology professionals, analytical thinkers and engineers. For those looking to get into a market that's currently red hot, and those looking to refresh their perspective, Johnson has identified some tips to keep in mind.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

infra97-290x195 7 Tips to Improve Data Backup and Ensure Business Continuity

With today's modern solutions, enterprises should be able to transform backup and recovery from a low-level legacy IT function to a modern function delivering continuity and value to the entire business. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.