Developing A Sustainable Cyber Security Workforce

In Britain the cyber security skills gap is a serious problem which has been exacerbated by increasing numbers of employees working from home over the past year. From a cyber security perspective the Coronavirus pandemic has not so much delivered ‘new’ challenges, as rendered challenges that already existed more difficult. Not least, for encouraging cyber criminals  seeking to exploit vulnerable organisations.
 
Research estimates that ransomware attacks in the United Kingdom increased by as much as 70/80% in the third quarter of 2020. 

Indeed, a  recent  report from the Dept.of Culture. Media & Sport (DCMS) found that:

  • Over half of all businesses in the UK lack people with ‘basic skills’ in cyber security, such as storing or transferring personal data, setting up configured firewalls, and detecting and removing malware.
  • Over thirty percent of UK businesses don’t have enough people with advanced technical cyber security skills such as penetration testing and digital forensics.
  • Around 32% don’t have enough people with the right skills to respond effectively to cyber security incidents.
Ultimately, staff development and training is essential to the long-term health of any organisation. This is especially true of cyber security, where the skills that people acquire may make a huge difference to that organisation’s resilience towards threats with the potential to devastate operations and bring business to a standstill. 
 
Cybersecurity is a rapidly changing and advancing field. Keeping up requires addressing your organisation’s needs and identifying what is required to manage current and future cybersecurity risks.
 
Shortfalls in skills and capabilities are manifesting as major security incidents damage organisational performance and reputation. Building tomorrow’s security workforce is essential to address this challenge and deliver robust and long-term security for organisations in the digital age.  Filling the skill shortage will require organisations to change their attitude and approach to hiring, training, and participating in collaborative pipeline development efforts.
 
Cyber security training for employees at all organisational levels is crucial than ever for business survival, growth and defense. Simply relying on the IT department and technical staff to keep cyber criminals and threats at bay is not a practical, workable or feasible approach in the current cyber-crime situation.   
 
 DCMS / GovUK:    Training Zone:   Which 50:       Quickstart

For advice and recommendations  on your organisation’s cyber security and training needs, please contact Cyber Security Intelligence.

You Might Also Read: 
 
Get The Best Cyber Security Audits & Training Available:
 
 
« AI Dominance On The Battlefield
NCSC Focus On Ransomware Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

Mitre

Mitre

At Mitre we work across government to tackle challenges to the safety, stability, and well-being of our nation. Areas of expertise include Cybersecurity.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

RecoLabs (Reco)

RecoLabs (Reco)

Reco empowers organizations to discover their SaaS applications, identities, and data, control access and prevent the risk of exposure.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.