Build A Young Cyber Security Team

Tapping into upcoming talent is the key to Melanie Oldham’s approach to building a cyber security workforce. Melanie Oldham, founder and CEO of Bob’s Business Information Security Awareness, believes younger people are an untapped source of energy and creativity.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

Melanie wants to build a team that lasts, and she does this by going back to school, or university. She takes on students doing a placement as part of their university course or from school, and she takes on apprentices.

This is a different approach from the traditional hiring processes, but then maybe fighting cyber-crime needs a different approach.

She explains: “Traditionally, the natural fit for cyber security workers was seen as either typically ex-police force, or seasoned technical experts.

“I am recruiting quite young and talented individuals, so taking out senior management, the average age of the team is probably about 25, and it’s a diverse team, too.

She explains further: “They are creative, adaptive, they know technology, and they have a real energy for cyber security. The business also enjoys the benefits of innovation that comes with recruiting untapped talent.” There is another benefit, employing staff that way is very cost effective.

Melanie puts it this way: “They’re extremely adaptable, within two months they are able to fit into the businesses way of working.” She cites the example of Dale, who came into the business straight from school in 2013, has come to know Melanie and the business “inside out,” and now heads up the customer service team.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

But there is another ingredient. Tackling cyber-crime is not just about building a team of cyber security professionals, it’s about finding champions, effective communicators, and getting the numbers on your side.

And to achieve this, Melanie Oldham has a cunning plan.

Cyber Security Awareness Training

Bob’s Business’ Cyber Security Awareness Training package is an engaging way to help your organisation become more cyber aware and become compliant with industry standards. 

Bob’s Business is a cyber security awareness training company on a mission to help you bridge the knowledge gap between IT and end users. They will provide your organisation with engaging and memorable ways to help keep your sensitive information secure.

You shouldn’t be taking risks with keeping your company’s sensitive information safe, by aligning your policies with the training courses, you can cause a natural attitude change towards cyber security awareness and GDPR compliance training.

Having gained the ISO 27001 certification, you can trust that Bob’s Business understand your compliance requirements and how solutions can support your organisation develop a secure culture.

Bob’s Business provide interactive, web-based cyber security awareness training that teaches employees how to safeguard their organisation and themselves, protecting critical information. 

They treat each learning program like a marketing campaign, with internal communications to generate awareness, materials to engage the workforce and reinforce key learning messages. 

Their unique approach to learning achieves an outstanding 90% employee engagement rate.

Led by Bob, the courses teach a wide range of topics including how to create the perfect password, the importance of backing up data and what to do in case of a security breach.

- To ensure you have robust cyber security policies in place
- To become compliant with industry standards
- So your employees know what to do in the event of a security breach

Information Age:    Infosecurity Magazine:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods
Routers With Weak Passwords Will Soon Be Illegal In California »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

Fyde

Fyde

Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.