Employee Management

 

 

https://sm.asisonline.org/Pages/Companies-Look-to-Retain-Cyber-Talent.aspxCompanies Look to Retain Cyber Talent2019-07-01T04:00:00Zhttps://adminsm.asisonline.org/pages/megan-gates.aspx, Megan Gates<p>​The economy grows. Companies create more jobs. A music artist tops the charts for the fifth week in a row. Wi-Fi speed increases. But a trend on the rise is not always a good thing, and that’s currently what’s happening with the cybersecurity workforce.</p><p>​​(ISC)² revealed in its latest <a href="https://www.isc2.org/Research/Workforce-Study" target="_blank">workforce survey</a> that the cybersecurity workforce gap increased to more than 2.9 million globally in 2018—surpassing earlier estimates that 1.8 million cybersecurity positions would be unfilled by 2020.</p><p>“Despite increases in tech spending, this imbalance between supply and demand of skilled professionals continues to leave companies vulnerable,” according to the survey. “It’s no surprise that research shows the shortage of cybersecurity professionals is now the number one job concern among those who already work in the field.”</p><p>To reach that conclusion, (ISC)² surveyed nearly 1,500 cybersecurity and IT professionals who spend at least 25 percent of their time working on cybersecurity activities as part of their employment. These professionals were from North America, Latin America, Asia-Pacific (APAC), and Europe.</p><p>The survey found that while there is a global shortage of more than 2.9 million workers, the APAC region has been impacted the most.</p><p>“APAC is experiencing the highest shortage, at around 2.15 million, in part thanks to its growing economies and new cybersecurity and data privacy legislation being enacted throughout the region,” the survey found.</p><p>For instance, many nations—such as China—have created new requirements to store citizens’ data within their borders. This has put pressure on businesses to hire new talent to stand up these operations to be compliant with the new regulations.</p><p>North America follows APA​C with roughly 498,000 unfilled jobs; then Europe, the Middle East, and Africa with 142,000; and Latin America with 136,000. </p><p>While the workforce shortage is impacting regions at different rates, some of the overall effects of the shortage are the same. For example, 59 percent of survey respondents said their companies were at a “moderate or extreme risk of cybersecurity attacks” because of the lack of personnel.</p><p>The shortage also has an impact on existing cybersecurity staff. Many reported that they lacked the resources to do their jobs effectively (29 percent), had an inadequate budget for key security initiatives (28 percent), and lacked the time to do their jobs effectively (27 percent).</p><p>To address the shortage, some companies are planning to devote more resources toward cybersecurity and hiring new staff. </p><p>Areas that respondents identified as being most critical to their continued development in the field included security awareness, risk assessment and analysis management, security administration, network monitoring, and incident investigation and response.</p><p>Cybersecurity workers also stressed in the survey that while they spend time on incident response and endpoint security management, they would prefer to devote more energy to high-value tasks like threat intelligence analysis, penetration testing, and forensics.</p><p>Despite these findings, most cybersecurity professionals (68 percent) said they were somewhat or very satisfied with their positions and are thinking about the long-term trajectory of their careers and professional development.</p><p>“Whether companies are supporting training and certification efforts, or cybersecurity pros are pursuing them independently, one obstacle rises to the top,” the survey found. “They all report that they need more time carved out for professional development. Again, companies have an opportunity to step up in ways that have a meaningful influence on cybersecurity operations.<span style="background-color:#ffffff;">”</span></p><p>To address the cyber workforce shortage, employers are taking a variety of approaches. Some are changing their recruitment strategies to look at factors beyond degrees, instead focusing on experience and the ability of individuals to learn on the job, said Jeffrey Dodson, global chief information security officer and vice president of cybersecurity at BAE Systems, in a panel at ISC West in Las Vegas.</p><p>BAE’s approach mirrors what the survey found is happening elsewhere: organizations are paying less attention to the degrees candidates have and giving more credence to experience.</p><p>For instance, (ISC)² survey respondents said the most important qualifications for employment in cybersecurity are relevant work experience (49 percent), knowledge of advanced cybersecurity concepts (47 percent), and certifications (43 percent). Just 20 percent of respondents said a cybersecurity, or related, undergraduate degree was an important qualification for employment.</p><p>“As professionals gain on-the-job cybersecurity work experience, organizations can help close the gap by providing more training opportunities—and focusing on the types of training that those already in the cybersecurity field find the most helpful,” according to the survey.</p><p>Dodson said BAE is embracing this approach, and while the initiative has received some pushback from human resources personnel, it has also helped with recruiting the millennial workforce—which now represents a majority of the overall workforce—and, with Generation X, 35 percent of the existing cyber workforce.</p><p>Other changes that organizations can make to recruit talent, and retain it, inclu​de creating flexible work schedules for improved work–life balance, the opportunity to work on meaningful projects, and regular check-ins with supervisors for feedback. These efforts help employees feel engaged in the workplace and are more likely to encourage them to stay in their positions, said Dodson’s copanelists and ASIS International Young Professionals Council members Angela Osborne, PCI, regional director at Guidepost Solutions, and Michael Brzozowski, CPP, PSP, risk and compliance manager at Symcor.</p><p>Another recruitment strategy that organizations are taking is more of a grassroots approach to reach segments of the population that might otherwise be overlooked or unengaged.</p><p>One company that’s embracing this philosophy in a unique way is Bugcrowd. Founded in 2013, Bugcrowd is a crowdsourced security testing company that provides bug bounty services to clients, including Mastercard, iJet, Motorola Mobility, and more (See “<a href="/Pages/Most-Wanted---Computer-Bugs.aspx">Most Wanted: Computer Bugs​</a>,” <em>Security Management </em>August 2015).</p><p>Bugcrowd, however, doesn’t hire traditional employees. Instead, it relies on a crowd of researchers to sign up to participate in its public and private bug bounty operations. These researchers come from a variety of backgrounds, including cybersecurity professionals already employed elsewhere looking for some extra cash and researchers who make their livings off bug bounties.</p><p>To recruit new researchers, the company created the Ambassador Program. It hosts small events and security meetups—often one-day conferences where Bugcrowd ambassadors identify potential researchers with valuable skill sets. Ambassadors then offer to introduce the recruit to the vice president of researcher growth or point him or her towards additional Bugcrowd training material, says CSO and Vice President of Operations David Baker.</p><p>Some recruits are also encouraged to participate in Bugcrowd’s competition events—such as a capture the flag cybersecurity competition.</p><p>“Those who do well at the game are recruited into our platform,” Baker says. “We help you get onboarded and into the public programs. Then when they do well in the public programs, they get recruited into the private programs—which are more lucrative for the researcher because there’s less competition within them.”</p><p>Bugcrowd also attempts to match researchers with bug bounty programs that cater to their skill sets. For instance, the company built a taxonomy of cyber vulnerabilities. It looks at the area a researcher tends to gravitate towards—such as configuration bugs—to match with a client that is looking to test its resilience to that vulnerability. </p><p>“It’s important for the researcher because it takes advantage of their unique skills, and by taking advantage of what they’re good at, it’s going to ensure that they earn money,” Baker says. “On the flip side with our customers, it makes for a much more positive experience for them.”</p><p>For instance, being well-matched means researchers are more likely to identify vulnerabilities in clients’ systems that can be addressed to enhance their overall security. And, in some instances, developing a strong relationship with a researcher can lead to hiring that individual for an internal cybersecurity role. ​​</p><p>Bugcrowd is also taking the initiative to educate its workforce based on feedback from researchers who want to learn more about new threats to increase their skill sets, says Casey Ellis, chief technology officer and cofounder of Bugcrowd.</p><p>To do this, in 2018, the company launched <a href="https://www.bugcrowd.com/hackers/bugcrowd-university/" target="_blank">Bugcrowd University</a>, which provides free education and training modules to its researcher community. The education is developed in-house and consists primarily of webinars that researchers can work their way through at their own pace.</p><p>And Baker says that both the recruitment and education efforts are helping increase researcher engagement. While he did not specify how many active researchers there were when the company was created in 2013, Baker did say that as of April 2019 there were 4,000 active researchers—1,000 of which were added within the last year.</p><p>“We are a marketplace,” he explains. “… routinely we need to grow our research community. That means that we’re making sure we’re identifying talent at the grassroots level to get researchers and smart people who want to be part of our community.”</p>

Employee Management

 

 

https://sm.asisonline.org/Pages/Companies-Look-to-Retain-Cyber-Talent.aspx2019-07-01T04:00:00ZCompanies Look to Retain Cyber Talent
https://sm.asisonline.org/Pages/Book-Review-Reducing-Turnover-in-the-Services-Sector.aspx2019-05-01T04:00:00ZBook Review: Reducing Turnover in the Services Sector
https://sm.asisonline.org/Pages/Federal-Misconduct.aspx2018-11-01T04:00:00ZFederal Misconduct
https://sm.asisonline.org/Pages/Career-in-Security-Pathways.aspx2018-11-01T04:00:00ZCareer Pathways in Security
https://sm.asisonline.org/Pages/Building-a-Hostility-Free-Work-Place.aspx2018-11-01T04:00:00ZBuilding a Hostility-Free Workplace
https://sm.asisonline.org/Pages/How-to-Foster-A-Safety-Culture.aspx2018-10-01T04:00:00ZHow to Foster A Safety Culture
https://sm.asisonline.org/Pages/An-Investment-in-Employees.aspx2018-10-01T04:00:00ZAn Investment in Employees
https://sm.asisonline.org/Pages/Integrating-Robots-in-the-Workplace.aspx2018-09-26T04:00:00ZIntegrating Robots in the Workplace
https://sm.asisonline.org/Pages/Artful-Manipulation.aspx2018-09-01T04:00:00ZArtful Manipulation
https://sm.asisonline.org/Pages/Stay.aspx2018-09-01T04:00:00ZStay
https://sm.asisonline.org/Pages/Lessons-in-Violence-Prevention.aspx2018-09-01T04:00:00ZLessons in Violence Prevention
https://sm.asisonline.org/Pages/Harassment-in-the-Academies.aspx2018-09-01T04:00:00ZHarassment in the Academies
https://sm.asisonline.org/Pages/Five-Ways-To-Mitigate-Operational-Stress.aspx2018-09-01T04:00:00ZFive Ways To Mitigate Operational Stress
https://sm.asisonline.org/Pages/The-Fraudster-Down-the-Hall.aspx2018-08-01T04:00:00ZThe Fraudster Down the Hall
https://sm.asisonline.org/Pages/Checking-In-and-Coaching-Up.aspx2018-07-01T04:00:00ZPerformance Conversations: Checking In & Coaching Up
https://sm.asisonline.org/Pages/Bully-Bosses-Can-Inflict-More-Damage-with-Negative-References.aspx2018-05-17T04:00:00ZBully Bosses Can Inflict More Damage with Negative References
https://sm.asisonline.org/Pages/How-to-Lead-a-Diverse-Security-Workforce.aspx2018-05-01T04:00:00ZHow to Lead a Diverse Security Workforce
https://sm.asisonline.org/Pages/Stopping-Distracted-Driving.aspx2018-04-01T04:00:00ZBehind the Wheel: Stopping Distracted Driving
https://sm.asisonline.org/Pages/Identify-the-Gaps.aspx2018-04-01T04:00:00ZIdentify the Gaps
https://sm.asisonline.org/Pages/Four-Trends-That-Will-Shape-Recruiting-in-2018.aspx2018-03-22T04:00:00ZFour Trends That Will Shape Recruiting in 2018