Build A Young Cyber Security Team

Tapping into upcoming talent is the key to Melanie Oldham’s approach to building a cyber security workforce. Melanie Oldham, founder and CEO of Bob’s Business Information Security Awareness, believes younger people are an untapped source of energy and creativity.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

Melanie wants to build a team that lasts, and she does this by going back to school, or university. She takes on students doing a placement as part of their university course or from school, and she takes on apprentices.

This is a different approach from the traditional hiring processes, but then maybe fighting cyber-crime needs a different approach.

She explains: “Traditionally, the natural fit for cyber security workers was seen as either typically ex-police force, or seasoned technical experts.

“I am recruiting quite young and talented individuals, so taking out senior management, the average age of the team is probably about 25, and it’s a diverse team, too.

She explains further: “They are creative, adaptive, they know technology, and they have a real energy for cyber security. The business also enjoys the benefits of innovation that comes with recruiting untapped talent.” There is another benefit, employing staff that way is very cost effective.

Melanie puts it this way: “They’re extremely adaptable, within two months they are able to fit into the businesses way of working.” She cites the example of Dale, who came into the business straight from school in 2013, has come to know Melanie and the business “inside out,” and now heads up the customer service team.

The army of cyber criminals is growing, and its foot soldiers are often young, in some countries hired and trained while still at school. Competing with that army requires just as an innovative approach and maybe the Melanie Oldham way is an effective way.

But there is another ingredient. Tackling cyber-crime is not just about building a team of cyber security professionals, it’s about finding champions, effective communicators, and getting the numbers on your side.

And to achieve this, Melanie Oldham has a cunning plan.

Cyber Security Awareness Training

Bob’s Business’ Cyber Security Awareness Training package is an engaging way to help your organisation become more cyber aware and become compliant with industry standards. 

Bob’s Business is a cyber security awareness training company on a mission to help you bridge the knowledge gap between IT and end users. They will provide your organisation with engaging and memorable ways to help keep your sensitive information secure.

You shouldn’t be taking risks with keeping your company’s sensitive information safe, by aligning your policies with the training courses, you can cause a natural attitude change towards cyber security awareness and GDPR compliance training.

Having gained the ISO 27001 certification, you can trust that Bob’s Business understand your compliance requirements and how solutions can support your organisation develop a secure culture.

Bob’s Business provide interactive, web-based cyber security awareness training that teaches employees how to safeguard their organisation and themselves, protecting critical information. 

They treat each learning program like a marketing campaign, with internal communications to generate awareness, materials to engage the workforce and reinforce key learning messages. 

Their unique approach to learning achieves an outstanding 90% employee engagement rate.

Led by Bob, the courses teach a wide range of topics including how to create the perfect password, the importance of backing up data and what to do in case of a security breach.

- To ensure you have robust cyber security policies in place
- To become compliant with industry standards
- So your employees know what to do in the event of a security breach

Information Age:    Infosecurity Magazine:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods
Routers With Weak Passwords Will Soon Be Illegal In California »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO CCDCOE's mission is to enhance the capability, cooperation and information sharing among NATO, NATO nations and partners in cyber defence.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

National Crime Agency (NCA) - United Kingdom

National Crime Agency (NCA) - United Kingdom

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

DDLS

DDLS

DDLS is Australia's largest provider of corporate IT, process training and cybersecurity training courses and certification programs.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.