Bank of England CIO Sets A Cybersecurity Challenge

Bank of England CIO Robert Elsey plays a central role in protecting the UK's financial sector. Elsey runs a cyber security division that protects around £575 billion sterling payments and securities every day, helps to track all bank notes in circulation and secures £140 billion of gold deposits in the vault. 

The Bank's unique challenges are intensified by a nationwide digital skills gap, which led Elsey to a novel way to boost the bank's defences: a face-to-face cyber security competition that tests the skills of 30 of untapped talents in the UK to identify the next-generation of experts.

The 30 best applicants earn an invitation to the iconic building on Threadneedle Street (pictured) that has been the Bank of England’s home since 1734. They then compete in teams on a series of banking-themed tasks developed by the Bank's security team to simulate the experience of working at a leading financial institution. The competitors combat and contain a cyber attack by planning and improving security architecture, educate staff on the threats and carry out a forensic investigation of the attack.

The event helps the Bank attract talent from diverse backgrounds and show them that technology careers are more varied than they might imagine.

"It starts to show the different qualities you need," says Elsey. "It's not just coding anymore. There's everything from business case history to the climate and sponsoring initiatives. We've got people from all kinds of different backgrounds now working in technology and it's making it a much better place."

The competition combines technical challenges with tests of broader skills. An exercise inspired by Dragons Den requires teams to improve a network design by spending a £1 million budget on a cyber security shopping list, while a pitching competition invites them to present their ideas for a phishing awareness training programme.

"What was nice is that those people that did get involved through a less technical setting could flex their skills in different areas, and could appreciate why it would attract different people in the future," says Elsey.

New sources of cyber security talent

The top 10 performers in the challenge will then attend three-day masterclass in November, and the top performers earn an interview for a role on the Bank of England's security team.

Elsey hopes they will inject some youth into an aging workforce. Only 12% of the cyber security workforce is under the age of 35, while 53% of it is over 45, according to the Center for Cyber Safety and Education’s Global Information Security Workforce Study. This could create new dangers as more experts reach retirements.

"We try to avoid and weed out those who are in the industry," says Elsey. "We're looking for more of the younger students who are interested, or people who are thinking about moving into cyber security."

Their efforts paid off. Around 60% of the competitors were in secondary or further education, while two-thirds were participating in their first event involving Cyber Security Challenge UK, the non-profit organisation that arranged the competition with the Bank.

"It was more about raising awareness that it's not just people who can code that go to these competitions and add value," says Elsey. "In fact, some of our big success stories are people who did mathematics, who hadn't considered technology and coding before, but actually, as mathematicians, they're data scientists and they're analysts.

"Those types of individuals fit in really well with that kind of inquisitive mindset...Where we have done very well in the bank in trying to attract good, diverse employee base is by trying to look in those pockets of people that wouldn't normally think about it, but when they're in it, they love it".

CIO:

You Might Also Read:

Bank of England: Cyberattacks A 'Clear and Present Danger':

US Banks Face A Growing Threat

« Police Are Mishandling Digital Forensic Evidence
Cybercrime Is Increasing In Scotland »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe