Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

How to Solve the Security Skills Shortage

50%
50%

At RSA, security professionals weighed in on how to close the security skills gap -- if there is one -- and solve staffing problems.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 3   >   >>
tmccreight
50%
50%
tmccreight,
User Rank: Apprentice
3/28/2014 | 1:58:48 PM
Re: Bringing in new perspectives
I think STEM is a great place to start, but I'd like to see business topics brought into the mix as well.  We've moved more to a risk-based, business focused approach with information security.  The IT Security professionals who can communicate in business terms and understand how business deals with risk bring new skills to the security work force.

 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/28/2014 | 1:25:19 PM
Re: Bringing in new perspectives
Tim, What's your opinion on the emphasis on STEM curriculum for budding security professionals. Do you think they need a smattering of liberal arts to make them more well-rounded and skilled at thinking outside the box?
tmccreight
50%
50%
tmccreight,
User Rank: Apprentice
3/27/2014 | 10:28:45 PM
Bringing in new perspectives
I've enjoyed reading the posts and viewing the video from RSA.  Most security professionals who've been in the business for a decade or so have seen the pool of resources slowly dwindle, yet the requirements for positions continually increase over the same time span.

I agree with the comments that Marcus made in the video - we need to look outside the industry sometimes to find a different perspective.  I've made that judgement call, and was pleasantly surprised with the results.  I selected someone with a business and analytics background and trained them in InfoSec.  They did some amazing work on analyzing the mass of data we collected daily, and were able to translate this into business value.  Not bad for a junior hire!
JasonSachowski
100%
0%
JasonSachowski,
User Rank: Author
3/27/2014 | 2:45:38 PM
Re: How to Solve the Security Skills Shortage
Accreditations are an excellent way of validating your committment to becoming a professional in a given competency.  Getting involved in the InfoSec community, such as attending public workgroups, is a good place to network with SME's of all different backgrounds to learn some of the disciplines, concepts, and methodologies.

Additionally, there are other industry certifications available that you could aim for that do not require lengthy experience.  These can be used as stepping stones in gradually demonstrating your committment towards achieving the larger accreditations.
Gurgle
50%
50%
Gurgle,
User Rank: Apprentice
3/27/2014 | 2:26:28 PM
Skills shortage- Personal experience
This one is happening right now though where I work. We have the standard Skill Ladder tree in Job Descriptions for the technical side. Tech, Engineer and Architect. (With jr, sr, principal sub-levels)

It is not the issue of getting past HR. It is the skill set shallowness which we are faced. Most have Network, anti-malware or SysAdmin Security skills. But when looking for higher level skill sets of appSec, PKI, Incident Response,ISO2700x, etc. we have consistent lack of skills in ANY of the candidates.

There are lots of junior and a good number of middle level skills. But above that, it is sad.

If I had a recommendation to someone starting now, Go after DB Sec, AppSec, PKI, or similar. Incident Response or Forensics may be "sexy", they are not where the Skills and money really will be long term.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/27/2014 | 2:24:38 PM
Re: Hire Character, Train Skill
@lafritz What field are you working in now? Is there an IT department where you can apply for an entry level job and pick up some basic skills?  What are some strategies others on this message board can recomment...
mcook300
50%
50%
mcook300,
User Rank: Apprentice
3/27/2014 | 1:35:17 PM
Re: Hire Character, Train Skill
Don't let the experience requirement prevent you from taking the exam.  If someone comes to me and HAS passed the CISSP exam - that shows they know a lot about the MANY areas of Security, and have demonstrated a committment to the Profession or Career (that's another post).  I'd be happy to give that person the opportunity to gain that experience.
Sara Peters
50%
50%
Sara Peters,
User Rank: Author
3/27/2014 | 12:32:06 PM
Re: Hire Character, Train Skill
@lafritz65  Unfortunately you can't receive the CISSP certification until you've worked in security for at least five years. It's one of those catch-22 situations -- how do you get the security job without the certification and how do you get the certification without the job? The infosec industry just doesn't have a clear career path with entry-level positions.

But that shouldn't stop you from taking the courses! Or from applying for security jobs even if you don't seem to fit the requirements listed in the job posting. You've clearly got the motivation, and that is something that every job needs. Good luck!
lafritz65
50%
50%
lafritz65,
User Rank: Apprentice
3/27/2014 | 11:17:20 AM
Re: Hire Character, Train Skill
What would you recommend for someone who wants to break into the Infosec industry?  I have had an interest for years, but do not have any IT security experience, just basic familiarity from working with security professionals and following the industry on sites like Dark Reading for years.  It has been recommended more than once that I get CISSP certified, which I am seriously considering, but I wanted to know your take on it.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/27/2014 | 8:48:38 AM
Re: Hire Character, Train Skill
"While there is no distinguishing skills or experiences that are relevant to being an Information Security Professional"

Jason, what's your view of credentials like CISSP certification or completion of courses in the SANS Curriculum. Shouldn't demonstration of at least a baseline knowledge of InfoSec be a prerequisite for hiring? Or is that a given. 
<<   <   Page 2 / 3   >   >>
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42258
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...
CVE-2020-28968
PUBLISHED: 2021-10-22
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
CVE-2020-28969
PUBLISHED: 2021-10-22
Aplioxio PDF ShapingUp 5.0.0.139 contains a buffer overflow which allows attackers to cause a denial of service (DoS) via a crafted PDF file.
CVE-2020-36485
PUBLISHED: 2021-10-22
Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.
CVE-2020-36486
PUBLISHED: 2021-10-22
Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling.