Discover Hidden Cybersecurity Talent

Not having access to technical talent is a common complaint in the cybersecurity world. People with security experience on their resumes are in such high demand, CISOs need to hunt beyond the fields they know. 
 
CISOs need to embrace Infinite Diversity in Infinite Combinations. This means embracing diversity not only of bodies but of talents and experiences.
 
First, focus on acquiring the key cyber-security skills beyond hacking and managing security tools.
Effective cyber defenders leverage their business and managerial skills, including:
 
• Identifying, quantifying, and explaining risk to the organisation’s key activities
• Understanding the value of information and its unique qualities such as timeliness, accuracy, relevance, and privacy
• Recasting business processes to reduce risk while retaining their value
• Communication skills, including expressing patience, perspective-taking, and negotiation
• A clear understanding of the principles of contract law, negligence, and customer obligations.
 
You will find that you can build upon these foundational skills with technical training to level-up new cyber-security professionals. In some cases, it can be more challenging to train traditional IT security “geeks” in these skills, so this might be an easier path for some positions.
 
You can fish for this talent in a much larger ocean beyond traditional IT resumes. Look at customer service, business development, sales, law, finance, insurance, competitive intelligence, and library science. The biggest boost you can get is by finding these people in house and nurturing their careers. The bonus is that by being part of the organisation already, they come to the table with a good grasp of the culture and value streams. 
 
Of course, not everyone in these areas is going to be a solid security pro but within the organisation, you can find seeds to grow.
 
Now that you have a pool to draw from, how do you make the first cut of likely strong security candidates? Above all else, there must be interest and determination to enter the field. More than few people are drawn into the world of cyber-security for the money or prestige only to be dismayed by the amount of work and frustration it entails.
 
If the person you’re looking to bring in is not already a cybersecurity professional, they’re in for a steep ramp-up of technical training. That’s a firehose of reading, classes, certifications, conferences, peer observation, online training, and hands-on work. 
 
Some people embrace the chance to learn new, exciting things while others balk at it. Lean towards recruiting individuals with a “constant learning” attitude. Find out if they are willing to push themselves, not merely to maintain skills but to sweat and struggle to learn new things.
 
A second key skill for cyber-security is risk analysis. 
Every adult human does risk analysis at some level or another. We do it whenever we decide to spend or save money, go to the doctor or wait out an illness, or simply cross a busy intersection. 
 
Obviously in cybersecurity, it’s more complicated and less clear. However, the people you’d want to hire should be deliberate, rational, and consistent in their method of risk analysis.
 
Given that you’re also recruiting talent with organisation and business backgrounds, look at how they can link risk to the needs of the organisation. Ask them what business processes take on unnecessary risks and how that might be reduced. Look at how they would prioritise risks, since we can never eliminate all our exposures but should always tackle the biggest ones.
 
These are just a few of many ideas to help develop your security team. With the variety of security specialisations required by various cyber-security roles in an organisation, remember that not everything lines up perfectly with a security certification or a hacking background. 
 
Even non-IT professionals can make valuable, diverse contributions to a cyber-defense program. Now go out and get them!
 
HelpNetSecuity:    Image: Nick Youngson
 
You Might Also Read: 
 
Cybersecurity Salaries 7% Up In 2018:
 
Making Data Scientists More Productive:
 
Very Few Women Are CISOs:
 
« What’s Happening With China’s Fintech?
Cybercrime Costs Over $600 Billion Annually »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

DataArt

DataArt

DataArt is a global technology consultancy that designs, develops and supports unique software solutions. Areas of activity include software security testing.

MXC Security

MXC Security

MXC designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.