Closing The Skills Gap Starts At School

Despite the UK’s cybersecurity sector being worth over $5 billion and widely regarded as the largest in Europe, it suffers from a real scarcity of talent. More than half of all businesses and charities are facing a basic technical cyber security skills gap, falling to 18% in the public sector. 

We hear so much about how the younger generation are inseparable from their devices and can master new technologies and apps far faster than their older peers. At the same time, we also experience the damage of data breaches, hacks to persons, companies, and national infrastructure.

In this current digital-first climate, why then are we not seeing more young people pursue careers in IT security? This is even more puzzling when we consider the rising cost of a university education and growing scrutiny of the value of degrees. 
To put it in perspective: the average annual salary for jobs in cyber security is £72,500, a good deal more than the average graduate salary of £23,000. It’s not only our young people who are potentially missing out, but the UK economy too.

A lack of specialised skills in the IT sector will negatively impact the UK’s ability to defend itself against increasingly sophisticated threats. This fact hasn’t gone unnoticed by the UK government. 

At the end of 2018, the then Minister for Digital and the Creative Industries, Margot James, highlighted cyber security as ‘a top priority for the government, it is central not only to our national security but also fundamental to becoming the world’s best digital economy.’ 

Recognising the skills gap, the government launched an Initial Cyber Security Skills strategy, promising £2.5 million in funding to establish a UK Cyber Security Council to develop a skilled workforce for the future. 

This is a positive move, but it isn’t only the task of the government to address the skills shortage. In August of this year the Government appointed the Institution of Engineering and Technology (IET) as the lead organisation to design and deliver the new UK Cyber Security Council, so we wait to see what changes this will bring. 

Collective Responsibility
The responsibility for closing the skills gap and promoting cybersecurity as a rewarding, beneficial and highly-valued career choice does not fall to a single party. Instead, it must be the work of stakeholders from multiple areas: government and private investors, the cybersecurity industry, education, trade bodies, not-for-profit organisations, IT department heads and HR.
Importantly, these parties mustn’t wait for the problem to become even worse before they address it, or be too reliant on encryption software. It’s already pretty acute, and with the ramifications of Brexit still not fully understood, further brain-drain from the UK back to Europe is a real possibility. The time to act, therefore, is now. 

The rewards of cybersecurity must therefore be championed at an early age and integrated into the curriculum in much the same way as subjects like English, Maths and Drama are.

By 2021, there’ll be a predicted 3.5 million unfilled cybersecurity positions worldwide. We naturally need to ensure that the proportion of empty roles in the UK is as small as possible. However, we also have a wider responsibility to ensure that the global cybersecurity industry is buoyant, diverse, and sustainable. 

Technology and the Internet are universal, and it’s crucial that cyber talent is similarly unrestricted by borders. Education on the importance of the sector should start at an early age (with public and private sector buy-in), and continue with ongoing investment in in-house and outsourced IT talent across all industries.

TechRadar

You Might Also Read: 

Teaching Kids Cyber Skills:

Very Few UK Girls Took Computing A-level:

 

 

« BBC Goes To The Darkside On Tor
British Elections: Labour Party Suffers Second Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

Telspace Africa

Telspace Africa

Telspace Africa provide the highest level of IT security solutions including advisory, penetration testing, vulnerability assessments, red teaming, social engineering and training.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Cybersecurity & Infrastructure Security Agency (CISA)

Cybersecurity & Infrastructure Security Agency (CISA)

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

HancomWITH

HancomWITH

Hancomwith is an information security company. We provide optimized blockchain solutions in areas including next-generation authentication, security and digital asset transaction.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.