Build A Young Cyber Security Team

Tapping into upcoming talent is the key to Melanie Oldham’s approach to building a cyber security workforce. Melanie Oldham, founder and CEO of Bob’s Business Information Security Awareness, believes younger people are an untapped source of energy and creativity.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

Melanie wants to build a team that lasts, and she does this by going back to school, or university. She takes on students doing a placement as part of their university course or from school, and she takes on apprentices.

This is a different approach from the traditional hiring processes, but then maybe fighting cyber-crime needs a different approach.

She explains: “Traditionally, the natural fit for cyber security workers was seen as either typically ex-police force, or seasoned technical experts.

“I am recruiting quite young and talented individuals, so taking out senior management, the average age of the team is probably about 25, and it’s a diverse team, too.

She explains further: “They are creative, adaptive, they know technology, and they have a real energy for cyber security. The business also enjoys the benefits of innovation that comes with recruiting untapped talent.” There is another benefit, employing staff that way is very cost effective.

Melanie puts it this way: “They’re extremely adaptable, within two months they are able to fit into the businesses way of working.” She cites the example of Dale, who came into the business straight from school in 2013, has come to know Melanie and the business “inside out,” and now heads up the customer service team.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

But there is another ingredient. Tackling cyber-crime is not just about building a team of cyber security professionals, it’s about finding champions, effective communicators, and getting the numbers on your side.

And to achieve this, Melanie Oldham has a cunning plan.

Cyber Security Awareness Training

Bob’s Business’ Cyber Security Awareness Training package is an engaging way to help your organisation become more cyber aware and become compliant with industry standards. 

Bob’s Business is a cyber security awareness training company on a mission to help you bridge the knowledge gap between IT and end users. They will provide your organisation with engaging and memorable ways to help keep your sensitive information secure.

You shouldn’t be taking risks with keeping your company’s sensitive information safe, by aligning your policies with the training courses, you can cause a natural attitude change towards cyber security awareness and GDPR compliance training.

Having gained the ISO 27001 certification, you can trust that Bob’s Business understand your compliance requirements and how solutions can support your organisation develop a secure culture.

Bob’s Business provide interactive, web-based cyber security awareness training that teaches employees how to safeguard their organisation and themselves, protecting critical information. 

They treat each learning program like a marketing campaign, with internal communications to generate awareness, materials to engage the workforce and reinforce key learning messages. 

Their unique approach to learning achieves an outstanding 90% employee engagement rate.

Led by Bob, the courses teach a wide range of topics including how to create the perfect password, the importance of backing up data and what to do in case of a security breach.

- To ensure you have robust cyber security policies in place
- To become compliant with industry standards
- So your employees know what to do in the event of a security breach

Information Age:    Infosecurity Magazine:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods
Routers With Weak Passwords Will Soon Be Illegal In California »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

SECURITYMADEIN.LU

SECURITYMADEIN.LU

SECURITYMADEIN.LU is the main online source for cyber security in Luxembourg providing news, information and a toolbox of cyber security solutions.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Identifid

Identifid

Identifid offers a suite of fraud prevention and identity authentication solutions to businesses and governments using the latest advances in AI, vision processing, and biometric recognition.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.

Cyber Grant

Cyber Grant

Cyber Grant excel in designing cybersecurity solutions for data protection. Our approach and vision, centered on ease-of-use, establish us as a benchmark in the industry for safeguarding information.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.