Attract and Retain Great Cyber Security Talent

What strategies can companies use to retain talented IT Security specialists and attract potential hires?

A growing need for cyber-security organisations to recruit the best and brightest to defend governments, organisations and businesses from attack has meant that the market for university graduates in the cyber-security sector has expanded rapidly over the last few years.

According to UK government figures, the UK cyber-security sector is worth more than £6 billion and employs 40,000 people. In addition to national demands, the cyber export market grew from £850 million to more than £1 billion during 2013, and is expected to reach £2 billion by 2016. All this investment is to tackle the growing ‘business' of cyber-crime – an example of which can be seen in GOV.UK's recent findings that 81 percent of large corporations reported a cyber-breach in 2014, with an estimated cost to organisations between £600,000 to £1.15 million per attack

BAE Systems Applied Intelligence have significantly stepped up their graduate recruitment programme in recent years, in recognition of the need for the UK to foster talent within the cyber-security sector if we are to tackle cyber-crime effectively. For example, in 2014, over a third of BAE Systems' graduate intake – around 120 out of 287 – joined BAE Systems Applied Intelligence, to help companies and organisations protect themselves and their customers from fraud, cyber-attack and digital criminality. To achieve these solid graduate numbers and attract the best talent, in a landscape that is becoming increasingly competitive, BAe are focusing on utilising expert alumni and keeping the enthusiasm up once graduates come in-house.

At its core, the ability to attract bright graduates lies in the relationships your company has with universities and organisations that produce the strongest talent. An example could be the Cyber Security Challenge UK.

Backed by more than 50 sponsors from across government, industry and academia, including BAE Systems Applied Intelligence, the Challenge incorporates a range of competitions, including a schools-specific programme, that test the knowledge and skills of the UK's young people. Within the Challenge, participants experience face-to-face competitions with adversaries, as well as a series of technical challenges that are assessed by a number of its experts within the cyber-security field.

What is interesting about challenges and competitions such as this is that they motivate us to continue the fun when the graduates come in-house. As too often happens, once companies get graduates in they relegate these junior members to the most menial, unexciting tasks. In order to retain and engage with our graduates BAe set them up with strong mentors and experts who will challenge them and test them on a daily basis.

If we are to effectively and efficiently tackle the cyber-attacks that we are starting to see with more regularity we must come together as an industry and do our best to get the best and brightest young people on our side.
SC Magazine: http://bit.ly/1NkdQFv

 

« The Dark Web Uncovered
Asking Just 4 Questions Will Stop 90% of Hacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

Deepwatch

Deepwatch

The Deepwatch Platform helps organizations reduce risk through early and precise threat detection and remediation.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

Modern Networks

Modern Networks

Modern Networks is a leading provider of IT managed services to the UK’s commercial property sector and medium sized enterprises.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

TisOva

TisOva

TisOva is an innovative cybersecurity startup dedicated to addressing the growing issue of online scams targeting students.

ThreatMate

ThreatMate

ThreatMate empowers businesses with comprehensive tools to detect, protect, and remediate against cyber threats.