Cyber Security Market Is In A People-Power Crisis

The rising cybercrime threat has driven the demand for cybersecurity professionals through the roof.

Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to find child pornography offenders. Since then, cybersecurity has grown to include 31 different specialty areas, as categorised by the National Cyber Workforce Framework.

Dr. Jon Haass, Associate Professor and Chair of Cyber Intelligence and Security at Embry-Riddle Aeronautical University’s Prescott, AZ campus, explains that in a criminal scenario, law enforcement uses digital forensics to determine the origin of the offense, the type of activity and the identity of those responsible. One challenge today is that attackers or criminals can use a proxy Internet address, making them virtually untraceable.

Today, there is a whole industry that creates tools for digital forensics. Haass sees great movement toward AI - artificial intelligence, and teaching the computer to recognise anomalies, specifically the programming signatures of the criminals.

Jobs Unfilled

Postings for jobs in this field are up 74 percent over the past five years, according to news.erau. On an all-USA level, average salaries are strong, coming in at $91,000. However, as recently as January 2015 over 200,000 postings for cybersecurity jobs were unfilled.

“There are more cybersecurity jobs than graduates today. Isn Phoenix and Maricopa County alone, over 1,000 cyber professionals are needed,” said Haass, also a member of the Arizona Cyber Security Task Force which is focused on attracting cybersecurity professionals to Arizona. “The good news is that Embry-Riddle is working very hard to produce professionals who can help businesses and the government manage their cybersecurity needs.”

“Our students are working on the solutions while gaining experience through collaborating and consulting,” said Haass. “In one project they gather intelligence and perform analysis on cyber-crimes around the world which are then communicated out to agencies who are focused on cyber counter-terrorism.”

I-HLS:                Staff Training 'Not enough to stop most data breaches':   

 

« 24 Cyber Criminals Arrested
Israel To Assist Nigeria With Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

MindPoint Group

MindPoint Group

MindPoint Group is a specialist Information Security Consulting firm.

Simility

Simility

Simility's multi-layered fraud detection solution uses superior machine learning & device intelligence technology to safeguard your online businesses.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

Assured Clarity

Assured Clarity

Assured Clarity are a global consultancy, specialising in Risk Management and Data Privacy, through Education, Awareness and Training, throughout an organisation.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.