How Can We Realise Cyber Resilience Through Education?

In today's global and interconnected economy, the importance of cyber resilience cannot be underestimated. It is no longer about securing networks and devices but about providing trust in the increasingly complex technologies and processes that societies rely on. Education in the profession matters.
 
The launch of the UK Cyber Security Council’s certification mapping tool is set to provide cyber professionals with useful resources to better understand the requirements for their desired career path. This further highlights the benefits of educational programs, as it provides a roadmap for their security careers and ensures that they are equipped with the knowledge needed to succeed and aligned to a specific role they would like to secure in the future.
 
Creating Rounded Professionals 

We all understand the benefits of educating cyber professionals so that they are able to create robust systems and identify and prevent cyber threats. What continues to be a challenge is educating those in cybersecurity so that they understand risk and can translate that risk into a strategy that gets buy-in across the business or organisation.
 
Cybersecurity has risen well up the ranks of risks that senior business leaders think about, becoming a major concern for CEOs and boards. Concern, however, needs to be translated into proper action, and this requires having people with not only technical competencies but business leadership skills that can enable and drive change across a whole enterprise.

One of the practical ways in which cybersecurity education can improve to deliver this is through a greater focus on understanding risk-based approaches to cybersecurity and learning how to work cross-functionally with business unit leaders and senior executives to enact and drive a strategy forward.
 
At the moment, this is lacking. As we continue to develop cybersecurity education programmes and frameworks, we need to ensure that there are modules and certifications that bring together the technical and the strategic. Cybersecurity practitioners need to understand how they translate the strategies and processes they are responsible for into something that the wider organisation wants to implement. Without these skills, cybersecurity approaches will never reach the point of creating cyber-resilient organisations.
 
Bringing Industry & Academia Together 

Given the interconnectedness of the global economy, no single entity can solve cybersecurity challenges alone. One of the criticisms that has been levelled at cybersecurity education frameworks is that there is not enough industry involvement in the delivery and sharing of knowledge, and this is something that needs to be corrected.
 
One of the reasons why bringing people with academic and real-world insight together is so important is because implementing a cyber resilience strategy is both a complex and also very human process. There are multiple pitfalls over which efforts can stumble or get completely waylaid. There need to be opportunities to learn best practices and then understand how they react to reality and how cyber professionals can ensure their cyber resilience strategies stay on track.
 
This is going to include understanding how to work with board members and the CEO, how to engage leaders of locations in other countries, and how to influence from the shop or office floor all the way to the top. These can all be challenging conversations, and understanding first-hand how someone successfully went about them and achieved what they set out to do can help to demystify what, on the face of it, is a daunting task.  

Building A Digitally Secure Future 

Education is key to developing the cybersecurity leaders of tomorrow and ensuring that businesses are equipped to navigate the complex and ever-evolving landscape of cybersecurity threats.

By investing in a holistic education journey, it will be possible to develop a more secure digital future. However, this is only going to be achieved if the cyber community understands how to move past a profession focused on securing technology to one of delivering global resilience.

Will Dixon isDirector of Academy and Community at ISTARI 

You Might Also Read: 

Why We Should Worry About A War On Cybercrime:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Iranian Government Uses Android Malware For Mobile Surveillance
France Fines Clearview AI For Failing To Pay The Previous Fine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

Secura

Secura

The Secura Cyber Security and Intelligence system predicts and prevents security threats by discovering hidden patterns through the meticulous analysis of large amounts of data.

Mnemonica

Mnemonica

Mnemonica specializes in providing data protection system, information security compliance solutions, cloud and managed services.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

BI.ZONE

BI.ZONE

BI.ZONE creates high-tech products and solutions to protect IT infrastructures and applications, and provides services from cyber intelligence and proactive defence to cybercrime investigation.

FortifyData

FortifyData

FortifyData is the next generation of cyber risk management–a comprehensive platform that continuously evaluates your third-party, internal and people risks.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.