Build A Young Cyber Security Team

Tapping into upcoming talent is the key to Melanie Oldham’s approach to building a cyber security workforce. Melanie Oldham, founder and CEO of Bob’s Business Information Security Awareness, believes younger people are an untapped source of energy and creativity.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

Melanie wants to build a team that lasts, and she does this by going back to school, or university. She takes on students doing a placement as part of their university course or from school, and she takes on apprentices.

This is a different approach from the traditional hiring processes, but then maybe fighting cyber-crime needs a different approach.

She explains: “Traditionally, the natural fit for cyber security workers was seen as either typically ex-police force, or seasoned technical experts.

“I am recruiting quite young and talented individuals, so taking out senior management, the average age of the team is probably about 25, and it’s a diverse team, too.

She explains further: “They are creative, adaptive, they know technology, and they have a real energy for cyber security. The business also enjoys the benefits of innovation that comes with recruiting untapped talent.” There is another benefit, employing staff that way is very cost effective.

Melanie puts it this way: “They’re extremely adaptable, within two months they are able to fit into the businesses way of working.” She cites the example of Dale, who came into the business straight from school in 2013, has come to know Melanie and the business “inside out,” and now heads up the customer service team.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

But there is another ingredient. Tackling cyber-crime is not just about building a team of cyber security professionals, it’s about finding champions, effective communicators, and getting the numbers on your side.

And to achieve this, Melanie Oldham has a cunning plan.

Cyber Security Awareness Training

Bob’s Business’ Cyber Security Awareness Training package is an engaging way to help your organisation become more cyber aware and become compliant with industry standards. 

Bob’s Business is a cyber security awareness training company on a mission to help you bridge the knowledge gap between IT and end users. They will provide your organisation with engaging and memorable ways to help keep your sensitive information secure.

You shouldn’t be taking risks with keeping your company’s sensitive information safe, by aligning your policies with the training courses, you can cause a natural attitude change towards cyber security awareness and GDPR compliance training.

Having gained the ISO 27001 certification, you can trust that Bob’s Business understand your compliance requirements and how solutions can support your organisation develop a secure culture.

Bob’s Business provide interactive, web-based cyber security awareness training that teaches employees how to safeguard their organisation and themselves, protecting critical information. 

They treat each learning program like a marketing campaign, with internal communications to generate awareness, materials to engage the workforce and reinforce key learning messages. 

Their unique approach to learning achieves an outstanding 90% employee engagement rate.

Led by Bob, the courses teach a wide range of topics including how to create the perfect password, the importance of backing up data and what to do in case of a security breach.

- To ensure you have robust cyber security policies in place
- To become compliant with industry standards
- So your employees know what to do in the event of a security breach

Information Age:    Infosecurity Magazine:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods
Routers With Weak Passwords Will Soon Be Illegal In California »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

Swiss CyberSecurity

Swiss CyberSecurity

Swiss CyberSecurity is a non-profit group based in Geneva, set up to provide information and as a forum for discussion of topics related to CyberSecurity.

National Cyber Security Centre (NCSC) - New Zealand

National Cyber Security Centre (NCSC) - New Zealand

The role of the NCSC is to help New Zealand’s most significant public and private sector organisations to protect their information systems from advanced cyber-borne threats.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

Axxum Technologies

Axxum Technologies

Axxum Technologies is a premier provider of Network Communications and Information Technology Security Solutions.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.