How Can We Realise Cyber Resilience Through Education?

In today's global and interconnected economy, the importance of cyber resilience cannot be underestimated. It is no longer about securing networks and devices but about providing trust in the increasingly complex technologies and processes that societies rely on. Education in the profession matters.
 
The launch of the UK Cyber Security Council’s certification mapping tool is set to provide cyber professionals with useful resources to better understand the requirements for their desired career path. This further highlights the benefits of educational programs, as it provides a roadmap for their security careers and ensures that they are equipped with the knowledge needed to succeed and aligned to a specific role they would like to secure in the future.
 
Creating Rounded Professionals 

We all understand the benefits of educating cyber professionals so that they are able to create robust systems and identify and prevent cyber threats. What continues to be a challenge is educating those in cybersecurity so that they understand risk and can translate that risk into a strategy that gets buy-in across the business or organisation.
 
Cybersecurity has risen well up the ranks of risks that senior business leaders think about, becoming a major concern for CEOs and boards. Concern, however, needs to be translated into proper action, and this requires having people with not only technical competencies but business leadership skills that can enable and drive change across a whole enterprise.

One of the practical ways in which cybersecurity education can improve to deliver this is through a greater focus on understanding risk-based approaches to cybersecurity and learning how to work cross-functionally with business unit leaders and senior executives to enact and drive a strategy forward.
 
At the moment, this is lacking. As we continue to develop cybersecurity education programmes and frameworks, we need to ensure that there are modules and certifications that bring together the technical and the strategic. Cybersecurity practitioners need to understand how they translate the strategies and processes they are responsible for into something that the wider organisation wants to implement. Without these skills, cybersecurity approaches will never reach the point of creating cyber-resilient organisations.
 
Bringing Industry & Academia Together 

Given the interconnectedness of the global economy, no single entity can solve cybersecurity challenges alone. One of the criticisms that has been levelled at cybersecurity education frameworks is that there is not enough industry involvement in the delivery and sharing of knowledge, and this is something that needs to be corrected.
 
One of the reasons why bringing people with academic and real-world insight together is so important is because implementing a cyber resilience strategy is both a complex and also very human process. There are multiple pitfalls over which efforts can stumble or get completely waylaid. There need to be opportunities to learn best practices and then understand how they react to reality and how cyber professionals can ensure their cyber resilience strategies stay on track.
 
This is going to include understanding how to work with board members and the CEO, how to engage leaders of locations in other countries, and how to influence from the shop or office floor all the way to the top. These can all be challenging conversations, and understanding first-hand how someone successfully went about them and achieved what they set out to do can help to demystify what, on the face of it, is a daunting task.  

Building A Digitally Secure Future 

Education is key to developing the cybersecurity leaders of tomorrow and ensuring that businesses are equipped to navigate the complex and ever-evolving landscape of cybersecurity threats.

By investing in a holistic education journey, it will be possible to develop a more secure digital future. However, this is only going to be achieved if the cyber community understands how to move past a profession focused on securing technology to one of delivering global resilience.

Will Dixon isDirector of Academy and Community at ISTARI 

You Might Also Read: 

Why We Should Worry About A War On Cybercrime:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Iranian Government Uses Android Malware For Mobile Surveillance
France Fines Clearview AI For Failing To Pay The Previous Fine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

National Center for Manufacturing Sciences (NCMS)

National Center for Manufacturing Sciences (NCMS)

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

360° Online Brand Protection

360° Online Brand Protection

360° Online Brand Protection have developed a response to monitor counterfeiting and piracy activity at the online point of sale.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

Integris

Integris

Integris offers best-in-class services like dedicated vCIOs, specialized security and compliance advisory services, a 24/7 help desk, and more.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.