The Cyber Skills Gap & How We Act For The Future

There is a great Chinese proverb that says: “The best time to plant a tree is 20 years ago, the second-best time is now.” I love this because beautifully sums up where we are today with the cyber skills shortages we face. Go back 20 years and it was a mad rush towards digital transformation - what a good news story, better client experience delivered on a lower cost base.

Roll forward 5 years… “Oh, the online platforms we’ve created are not actually very secure, sorry about that - it seems youngsters in their bedrooms are hacking our systems for fun.” Roll on a further 5 years and we get to: “Hang on, the adversary has morphed into serious and organised crime and now we’re being extorted for millions.” 

And on and on until today… we now have a new digital revolution taking place which we have snappily called  'Industry 4.0’. This integration of intelligent digital technologies into manufacturing and industrial processes, and their speedy, often cost-driven but not security driven adoption into modern manufactured elements (cars, aeroplanes, watches, medical equipment, fridges, smart factories, intelligent cities to name a few) leaves us even more exposed to threat. 
 
In the last 20 years we as a nation have underinvested in developing cyber skills. It’s only in the last decade that higher education establishments have offered dedicated cyber security degree and master’s courses (though their relevance in modern commercial settings is up for debate). Only within the last 12 years has legislation come about to protect personal data and discover/punish those that lose or abuse it.

The result of all this is that the pressure on existing cyber capability has expanded even more, without a corresponding increase in industry-ready entry level practitioners. Companies are under huge pressure to meet demand; the fact is that they no longer want entry level capability, they want 3 - 4-year veterans. 
 
With this new Industrial Revolution (Industry 4.0) beginning to gather steam, there is a specific need to create a training ladder, to ensure practitioners are being sufficiently trained and assessed at every level of their career - which is exactly what we at The Cyber Scheme have done.

We need to cross skill and to upskill, bringing together each side of the revolution: Engineers, meet the IT crowd.

Both of course speak different languages, and have differing approaches to suit their specific areas, for example regarding health and safety. It’s one thing to electrocute yourself in an IT environment; quite another to bring down a manufacturing facility or a nuclear power plant. With the advent of IoT/OT technologies, the stakes are ever higher.
 
With training and with competence measurement we can build into the existing engineering and IT disciplines the knowledge, skills, abilities and tasks to counter the threat associated with these developments.

We have the scars and the memories of how the last 20 years have played out, and we know serious and organised crime will and does take advantage of our slowness - just look at the troubles Jaguar Land Rover and the automotive industry generally have encountered recently; that cool keyless entry isn’t so cool when a 15yr can steal your car inside 3 minutes.

The easy returns for crime gangs are just too tempting; we know we have to skill up before the bad guys do. That’s why now is the second-best time to plant that tree.

Charles White is CEO of The Cyber Scheme

You Might Also Read: 

Is Artificial Intelligence The Answer To The Cybersecurity Skills Shortage?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Insights From An Early Adopter Of Microsoft 365 Copilot
A Deep Dive Into Deepfakes & The Threat To Digital Identity Verification »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

FINX Capital

FINX Capital

FINX strives to solve the cybersecurity issues with its proprietary technolog, FINX SHIELD, by utilizing big data, blockchain combined with artificial intelligence.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.