Cyber Security Market Is In A People-Power Crisis

The rising cybercrime threat has driven the demand for cybersecurity professionals through the roof.

Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to find child pornography offenders. Since then, cybersecurity has grown to include 31 different specialty areas, as categorised by the National Cyber Workforce Framework.

Dr. Jon Haass, Associate Professor and Chair of Cyber Intelligence and Security at Embry-Riddle Aeronautical University’s Prescott, AZ campus, explains that in a criminal scenario, law enforcement uses digital forensics to determine the origin of the offense, the type of activity and the identity of those responsible. One challenge today is that attackers or criminals can use a proxy Internet address, making them virtually untraceable.

Today, there is a whole industry that creates tools for digital forensics. Haass sees great movement toward AI - artificial intelligence, and teaching the computer to recognise anomalies, specifically the programming signatures of the criminals.

Jobs Unfilled

Postings for jobs in this field are up 74 percent over the past five years, according to news.erau. On an all-USA level, average salaries are strong, coming in at $91,000. However, as recently as January 2015 over 200,000 postings for cybersecurity jobs were unfilled.

“There are more cybersecurity jobs than graduates today. Isn Phoenix and Maricopa County alone, over 1,000 cyber professionals are needed,” said Haass, also a member of the Arizona Cyber Security Task Force which is focused on attracting cybersecurity professionals to Arizona. “The good news is that Embry-Riddle is working very hard to produce professionals who can help businesses and the government manage their cybersecurity needs.”

“Our students are working on the solutions while gaining experience through collaborating and consulting,” said Haass. “In one project they gather intelligence and perform analysis on cyber-crimes around the world which are then communicated out to agencies who are focused on cyber counter-terrorism.”

I-HLS:                Staff Training 'Not enough to stop most data breaches':   

 

« 24 Cyber Criminals Arrested
Israel To Assist Nigeria With Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

Aptiv

Aptiv

Aptiv is a global technology company that develops safer, greener and more connected solutions enabling the future of mobility.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

Kaine Mathrick Tech (KMT)

Kaine Mathrick Tech (KMT)

KMT deliver comprehensive cyber-first outsourced technology support and solutions that scale with your business.