Cyber Security Market Is In A People-Power Crisis

The rising cybercrime threat has driven the demand for cybersecurity professionals through the roof.

Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to find child pornography offenders. Since then, cybersecurity has grown to include 31 different specialty areas, as categorised by the National Cyber Workforce Framework.

Dr. Jon Haass, Associate Professor and Chair of Cyber Intelligence and Security at Embry-Riddle Aeronautical University’s Prescott, AZ campus, explains that in a criminal scenario, law enforcement uses digital forensics to determine the origin of the offense, the type of activity and the identity of those responsible. One challenge today is that attackers or criminals can use a proxy Internet address, making them virtually untraceable.

Today, there is a whole industry that creates tools for digital forensics. Haass sees great movement toward AI - artificial intelligence, and teaching the computer to recognise anomalies, specifically the programming signatures of the criminals.

Jobs Unfilled

Postings for jobs in this field are up 74 percent over the past five years, according to news.erau. On an all-USA level, average salaries are strong, coming in at $91,000. However, as recently as January 2015 over 200,000 postings for cybersecurity jobs were unfilled.

“There are more cybersecurity jobs than graduates today. Isn Phoenix and Maricopa County alone, over 1,000 cyber professionals are needed,” said Haass, also a member of the Arizona Cyber Security Task Force which is focused on attracting cybersecurity professionals to Arizona. “The good news is that Embry-Riddle is working very hard to produce professionals who can help businesses and the government manage their cybersecurity needs.”

“Our students are working on the solutions while gaining experience through collaborating and consulting,” said Haass. “In one project they gather intelligence and perform analysis on cyber-crimes around the world which are then communicated out to agencies who are focused on cyber counter-terrorism.”

I-HLS:                Staff Training 'Not enough to stop most data breaches':   

 

« 24 Cyber Criminals Arrested
Israel To Assist Nigeria With Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Eversheds Sutherland

Eversheds Sutherland

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Blake, Cassels & Graydon (Blakes)

Blake, Cassels & Graydon (Blakes)

Blakes is one of Canada’s top business law firms serving national and international clients in specialist areas including cyber security.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

National Cybersecurity Society (NCSS)

National Cybersecurity Society (NCSS)

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Envieta

Envieta

Envieta is a leader in cryptographic solutions. From server to sensor, we design and implement powerful security into new or existing infrastructure.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.