Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

// // //
4/27/2021
10:00 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv

Challenging Our Education System to Nurture the Cyber Pipeline

Let's teach students how to teach themselves. Once we do that, we will have taught a generation of students how to think like hackers.

I've yet to come across a company that has all the cybersecurity talent it wants. If you work in technology, you've probably heard someone talk about the "pipeline problem." As you progress deeper into the more niche and technical roles in technology, like cybersecurity, the need for qualified candidates rises to seemingly unachievable counts.

Related Content:

Women Are Facing an Economic Crisis & the Cybersecurity Industry Can Help

Special Report: How Data Breaches Affect the Enterprise

New From The Edge: How to Create an Incident Response Plan From the Ground Up

As we move into the digital age, how do we develop the next generation of problem solvers whose responsibility will be to keep the world safe from cyber threats?

Many of the cybersecurity professionals I've met share a curiosity about how things work and a willingness to test limits. We were the ones who annoyed our parents and teachers with incessant questions: "Why?" and "How?" "Why does y=mx+b?" "How does a plant grow?" And "Don't touch that" inevitably turns into "I wonder what would happen if I touched that?" So, how do we create an environment that fosters this type of thinking to address cybersecurity's pipeline problem?

The answer involves taking a deeper look into our education system and the underlying messages it conveys to our students. Students currently are evaluated against how well they can follow instructions. The students who excel in the classroom are often the ones who are great at following directions, who are eager to please and do what they're told. I was one of those students and, though I've found my way to a rewarding role in cybersecurity, I see opportunities for improvement.

Imagine an education system where we encourage students to break things in a constructive fashion. Break to know why and how. An education system where we're less concerned about the end result than about the student's ability to think outside the box and come to conclusions based on the information they've been provided.

These are the types of students who would thrive in cybersecurity. As penetration testers, they'll be able to think up less-obvious attack chains that expose companies to just as much risk as the more obvious ones. As security operations center analysts, they'll develop more accurate ways for identifying attacker behavior and cut down the time to initial detection. They'll have spent their lives nourishing their own creative problem-solving process and will be well equipped to find answers to the harder questions.

I had a math teacher in grade school who graded students on their ability to follow directions. We were asked to show our work on our assignments and would lose points if we didn't use the methodology he taught to arrive at the right answer, limiting us to learning what was taught and not how things worked.

Life isn't one-size-fits-all. We should celebrate a child's creativity when they come to the right answer, whether or not it's the way we would have done it. This encourages students to continue nurturing their curiosity and develops better thinkers. This is what the cyber pipeline is missing. Thinkers, not "smart people."

How can we create more thinkers? 

  • Ask open-ended questions: As teachers, we can ask students more open-ended questions. Get them to think through their answers, justify them, and reinforce those neural connections in their brains. I had an electrical engineering professor in college who gave students a few blank sheets of paper for the midterm and final. The exam was to write out everything we'd learned in her class up to that point, a difficult task if we hadn't really learned the material. Preparing for these exams demanded that we worry less about memorization of the minutia and focus on a deeper understanding of the material — an understanding that would move us closer to mastery of the subject and enable us to use this same understanding to think creatively and find novel solutions to problems.

  • Pass the teaching baton: The next thing we can do goes along with this idea of mastery: We should assess students on their ability to teach the subject matter on which they're being assessed. Did you ever notice how quickly an answer comes to you when you're drafting the message to a colleague to ask for help? When we teach or communicate complex ideas to another person, it forces us to organize our thoughts in a way that deepens our understanding of the subject matter. In classrooms, we can task students with orally presenting their answers to homework. We can group students with partners and have them take turns explaining their logic to one another in a low-stress setting.

  • Focused mentorship: What about those of us who aren't in the classroom with students? We can focus our efforts on a mentorship that nurtures intellectual curiosity in mentees. Our mentee has an idea? Great. Regardless of whether or not we think it will work, let's let them come to those conclusions on their own. Let's give them opportunities to fail and teach them that failures are a part of success, that our failures are really teaching opportunities.

Straight A's don't translate into the ability to solve problems creatively. We should place less importance on doing things the taught way and focus instead on teaching students to find their own way. We must encourage students to ask why things work the way they do, to deepen their mastery of the fundamentals so they can take creative risks with their understanding. To challenge the way things are done and push them to find a better way to do it. Let's teach them how to teach themselves. Once we do that, we will have taught a generation of students how to think like hackers. We'll have taught them the importance of curiosity in life, and our pipeline will be full of candidates ready to protect the world against coming cyber threats.

Stephanie Aceves is Senior Director, Threat Response SME Lead, at Tanium. Prior to Tanium, she was a part of EY's Cyber Threat Management, both on the Incident Response and Attack & Penetration teams. Before leaving EY to work for Tanium, Stephanie led red team (ethical ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2390
PUBLISHED: 2022-08-12
Apps developed with Google Play Services SDK incorrectly had the mutability flag set to PendingIntents that were passed to the Notification service. As Google Play services SDK is so widely used, this bug affects many applications. For an application affected, this bug will let the attacker, gain th...
CVE-2022-2503
PUBLISHED: 2022-08-12
Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear targe...
CVE-2022-2779
PUBLISHED: 2022-08-12
A vulnerability classified as critical was found in SourceCodester Gas Agency Management System. Affected by this vulnerability is an unknown functionality of the file /gasmark/assets/myimages/oneWord.php. The manipulation of the argument shell leads to unrestricted upload. The attack can be launche...
CVE-2022-38179
PUBLISHED: 2022-08-12
JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack
CVE-2022-38180
PUBLISHED: 2022-08-12
In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases