Build A Young Cyber Security Team

Tapping into upcoming talent is the key to Melanie Oldham’s approach to building a cyber security workforce. Melanie Oldham, founder and CEO of Bob’s Business Information Security Awareness, believes younger people are an untapped source of energy and creativity.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

Melanie wants to build a team that lasts, and she does this by going back to school, or university. She takes on students doing a placement as part of their university course or from school, and she takes on apprentices.

This is a different approach from the traditional hiring processes, but then maybe fighting cyber-crime needs a different approach.

She explains: “Traditionally, the natural fit for cyber security workers was seen as either typically ex-police force, or seasoned technical experts.

“I am recruiting quite young and talented individuals, so taking out senior management, the average age of the team is probably about 25, and it’s a diverse team, too.

She explains further: “They are creative, adaptive, they know technology, and they have a real energy for cyber security. The business also enjoys the benefits of innovation that comes with recruiting untapped talent.” There is another benefit, employing staff that way is very cost effective.

Melanie puts it this way: “They’re extremely adaptable, within two months they are able to fit into the businesses way of working.” She cites the example of Dale, who came into the business straight from school in 2013, has come to know Melanie and the business “inside out,” and now heads up the customer service team.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

But there is another ingredient. Tackling cyber-crime is not just about building a team of cyber security professionals, it’s about finding champions, effective communicators, and getting the numbers on your side.

And to achieve this, Melanie Oldham has a cunning plan.

Cyber Security Awareness Training

Bob’s Business’ Cyber Security Awareness Training package is an engaging way to help your organisation become more cyber aware and become compliant with industry standards. 

Bob’s Business is a cyber security awareness training company on a mission to help you bridge the knowledge gap between IT and end users. They will provide your organisation with engaging and memorable ways to help keep your sensitive information secure.

You shouldn’t be taking risks with keeping your company’s sensitive information safe, by aligning your policies with the training courses, you can cause a natural attitude change towards cyber security awareness and GDPR compliance training.

Having gained the ISO 27001 certification, you can trust that Bob’s Business understand your compliance requirements and how solutions can support your organisation develop a secure culture.

Bob’s Business provide interactive, web-based cyber security awareness training that teaches employees how to safeguard their organisation and themselves, protecting critical information. 

They treat each learning program like a marketing campaign, with internal communications to generate awareness, materials to engage the workforce and reinforce key learning messages. 

Their unique approach to learning achieves an outstanding 90% employee engagement rate.

Led by Bob, the courses teach a wide range of topics including how to create the perfect password, the importance of backing up data and what to do in case of a security breach.

- To ensure you have robust cyber security policies in place
- To become compliant with industry standards
- So your employees know what to do in the event of a security breach

Information Age:    Infosecurity Magazine:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods
Routers With Weak Passwords Will Soon Be Illegal In California »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

NetExtend

NetExtend

NetExtend services include backup and recovery, endpoint protection, network monitoring, cloud portal and billing and payment solutions.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.