Cyber Security Market Is In A People-Power Crisis

The rising cybercrime threat has driven the demand for cybersecurity professionals through the roof.

Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to find child pornography offenders. Since then, cybersecurity has grown to include 31 different specialty areas, as categorised by the National Cyber Workforce Framework.

Dr. Jon Haass, Associate Professor and Chair of Cyber Intelligence and Security at Embry-Riddle Aeronautical University’s Prescott, AZ campus, explains that in a criminal scenario, law enforcement uses digital forensics to determine the origin of the offense, the type of activity and the identity of those responsible. One challenge today is that attackers or criminals can use a proxy Internet address, making them virtually untraceable.

Today, there is a whole industry that creates tools for digital forensics. Haass sees great movement toward AI - artificial intelligence, and teaching the computer to recognise anomalies, specifically the programming signatures of the criminals.

Jobs Unfilled

Postings for jobs in this field are up 74 percent over the past five years, according to news.erau. On an all-USA level, average salaries are strong, coming in at $91,000. However, as recently as January 2015 over 200,000 postings for cybersecurity jobs were unfilled.

“There are more cybersecurity jobs than graduates today. Isn Phoenix and Maricopa County alone, over 1,000 cyber professionals are needed,” said Haass, also a member of the Arizona Cyber Security Task Force which is focused on attracting cybersecurity professionals to Arizona. “The good news is that Embry-Riddle is working very hard to produce professionals who can help businesses and the government manage their cybersecurity needs.”

“Our students are working on the solutions while gaining experience through collaborating and consulting,” said Haass. “In one project they gather intelligence and perform analysis on cyber-crimes around the world which are then communicated out to agencies who are focused on cyber counter-terrorism.”

I-HLS:                Staff Training 'Not enough to stop most data breaches':   

 

« 24 Cyber Criminals Arrested
Israel To Assist Nigeria With Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

National Security Agency (NSA)

National Security Agency (NSA)

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Qubitekk

Qubitekk

Qubitekk has developed quantum cryptography solutions for the machine-to-machine (M2M) communications market.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.