Discover Hidden Cybersecurity Talent

Not having access to technical talent is a common complaint in the cybersecurity world. People with security experience on their resumes are in such high demand, CISOs need to hunt beyond the fields they know. 
 
CISOs need to embrace Infinite Diversity in Infinite Combinations. This means embracing diversity not only of bodies but of talents and experiences.
 
First, focus on acquiring the key cyber-security skills beyond hacking and managing security tools.
Effective cyber defenders leverage their business and managerial skills, including:
 
• Identifying, quantifying, and explaining risk to the organisation’s key activities
• Understanding the value of information and its unique qualities such as timeliness, accuracy, relevance, and privacy
• Recasting business processes to reduce risk while retaining their value
• Communication skills, including expressing patience, perspective-taking, and negotiation
• A clear understanding of the principles of contract law, negligence, and customer obligations.
 
You will find that you can build upon these foundational skills with technical training to level-up new cyber-security professionals. In some cases, it can be more challenging to train traditional IT security “geeks” in these skills, so this might be an easier path for some positions.
 
You can fish for this talent in a much larger ocean beyond traditional IT resumes. Look at customer service, business development, sales, law, finance, insurance, competitive intelligence, and library science. The biggest boost you can get is by finding these people in house and nurturing their careers. The bonus is that by being part of the organisation already, they come to the table with a good grasp of the culture and value streams. 
 
Of course, not everyone in these areas is going to be a solid security pro but within the organisation, you can find seeds to grow.
 
Now that you have a pool to draw from, how do you make the first cut of likely strong security candidates? Above all else, there must be interest and determination to enter the field. More than few people are drawn into the world of cyber-security for the money or prestige only to be dismayed by the amount of work and frustration it entails.
 
If the person you’re looking to bring in is not already a cybersecurity professional, they’re in for a steep ramp-up of technical training. That’s a firehose of reading, classes, certifications, conferences, peer observation, online training, and hands-on work. 
 
Some people embrace the chance to learn new, exciting things while others balk at it. Lean towards recruiting individuals with a “constant learning” attitude. Find out if they are willing to push themselves, not merely to maintain skills but to sweat and struggle to learn new things.
 
A second key skill for cyber-security is risk analysis. 
Every adult human does risk analysis at some level or another. We do it whenever we decide to spend or save money, go to the doctor or wait out an illness, or simply cross a busy intersection. 
 
Obviously in cybersecurity, it’s more complicated and less clear. However, the people you’d want to hire should be deliberate, rational, and consistent in their method of risk analysis.
 
Given that you’re also recruiting talent with organisation and business backgrounds, look at how they can link risk to the needs of the organisation. Ask them what business processes take on unnecessary risks and how that might be reduced. Look at how they would prioritise risks, since we can never eliminate all our exposures but should always tackle the biggest ones.
 
These are just a few of many ideas to help develop your security team. With the variety of security specialisations required by various cyber-security roles in an organisation, remember that not everything lines up perfectly with a security certification or a hacking background. 
 
Even non-IT professionals can make valuable, diverse contributions to a cyber-defense program. Now go out and get them!
 
HelpNetSecuity:    Image: Nick Youngson
 
You Might Also Read: 
 
Cybersecurity Salaries 7% Up In 2018:
 
Making Data Scientists More Productive:
 
Very Few Women Are CISOs:
 
« What’s Happening With China’s Fintech?
Cybercrime Costs Over $600 Billion Annually »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

Early Birds

Early Birds

Early Birds is a Business to Business (B2B) marketplace for Innovators (Startups/Scaleups) and Early Adopters to exchange value early on.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Buchbinder Information Technology Solutions

Buchbinder Information Technology Solutions

Buchbinder Tunick & Company is a premier CPA and advisory firm offering a broad range of assurance, tax, business consulting and IT consulting services.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

Althammer & Kill

Althammer & Kill

Althammer & Kill offers pragmatic solution concepts for data protection and digitization. We advise in the field of data protection, information security and compliance.

Europol - European Cybercrime Centre (EC3)

Europol - European Cybercrime Centre (EC3)

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.