{"id":3781,"date":"2016-11-25T12:15:00","date_gmt":"2016-11-25T12:15:00","guid":{"rendered":"http:\/\/localhost\/projects\/horsesforsources\/tomorrows-cyber-security-unicorn_112516\/"},"modified":"2021-12-03T11:24:42","modified_gmt":"2021-12-03T11:24:42","slug":"tomorrows-cyber-security-unicorn_112516","status":"publish","type":"post","link":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/","title":{"rendered":"What does Tomorrow\u2019s Cyber-Security Unicorn Look Like?"},"content":{"rendered":"

The prevalence of high-profile cyber-attacks is on the increase. In the last two weeks alone we have witnessed the exposure of 412 million accounts from the FriendFinder network, 20,000 Tesco bank customers lost money in the UK and Three Mobile lost personal data from 133,000 customers. Not only are these attacks becoming more frequent, they are also increasing in severity with the Tesco incident seen as the worst banking security failure to date<\/a> by some commentators.<\/p>\n

The trouble is the talent pool is empty. Security staff have always been always been hard to find, and currently there is a drastic shortage of cyber security professionals across the globe. As I discussed in my recent PoV Is HR the Missing Link in Your Cyber Security Strategy?<\/a>. In the U.S alone there are 209,000 unfilled cyber security jobs.<\/p>\n

So, with all this in mind, why are cyber security professionals so hard to find?\u00a0 What skills, qualifications or characteristics distinguish them?<\/p>\n

Well, according to IT compliance provider IT Governance<\/a> and the U.S. News and World Report, individuals looking to establish a career in cyber security should begin with a degree in computer science, programming or engineering. This should then be followed this up with industry standard security qualifications offered by Microsoft, CISCO, and HP. For those wishing to become true specialists, an industry recognized qualification specifically within security should be sought. Examples include Certified Ethical Hacker (CEH) or GIAC Certified Penetration Tester (GPEN) certificates. So a lengthy and hard path to follow giving rise to the reality that candidates with these qualifications are scarce.<\/p>\n

So, we have started to see organizations looking to tap into new sources for security talent. The UK public sector is leading this charge by instead of looking for qualified individuals rather focusing on recruiting candidates with the correct behavioral and cognitive capabilities who can then be trained on the job.<\/p>\n

The UK\u2019s National Cyber Security Program is looking to hire 50 candidates who have the ability to excel in cyber security. The program, whilst been open to all individuals, will primarily target soldiers, doctors and nurses whose attention to detail and pressured thinking ability would allow them to excel in cyber security.<\/p>\n

Apart from being a healthcare professional or one of Her Majesty\u2019s finest, what specific traits do cyber security hopefuls need? Well according to recruiting specialist DHi Group<\/a>, individuals need the following characteristics:<\/p>\n

    \n
  1. Ability to work methodically and is very detail oriented<\/li>\n
  2. Eagerness to dig into technical questions and examine them from all sides<\/li>\n
  3. Enthusiastic and highly adaptable<\/li>\n
  4. Strong analytical and diagnostic skills<\/li>\n
  5. Demonstrated skills in innovation and collaboration<\/li>\n
  6. Keep a current understanding of vulnerabilities from the Internet<\/li>\n
  7. Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods<\/li>\n
  8. Ability to get the job done.<\/li>\n<\/ol>\n

    The Bottom Line<\/strong><\/span><\/p>\n

    The solution to the cyber security shortage is not rocket science. Companies must start thinking ahead and training the future professionals. Pump the money you spend on sky high salaries of the seasoned professionals with a mix of junior staff and a decent training program. The scarcity is fueled by the lack of junior and mid-level positions. Get the characteristics, not the qualification, and train on the job! Is this groundbreaking? Absolutely not, but what this approach does do, is help to redress the supply\/demand crisis for this critical business issue.<\/p>\n","protected":false},"excerpt":{"rendered":"

    The prevalence of high-profile cyber-attacks is on the increase. In the last two weeks alone we have witnessed the exposure…<\/p>\n","protected":false},"author":3,"featured_media":3782,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[92,97],"tags":[458],"ppma_author":[19],"yoast_head":"\nWhat does Tomorrow\u2019s Cyber-Security Unicorn Look Like? - Horses for Sources | No Boundaries<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What does Tomorrow\u2019s Cyber-Security Unicorn Look Like? - Horses for Sources | No Boundaries\" \/>\n<meta property=\"og:description\" content=\"The prevalence of high-profile cyber-attacks is on the increase. In the last two weeks alone we have witnessed the exposure...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/\" \/>\n<meta property=\"og:site_name\" content=\"Horses for Sources | No Boundaries\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-25T12:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-03T11:24:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2021\/12\/5838358861c70727033696.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"675\" \/>\n\t<meta property=\"og:image:height\" content=\"321\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Phil Fersht\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pfersht\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Phil Fersht\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/\",\"url\":\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/\",\"name\":\"What does Tomorrow\u2019s Cyber-Security Unicorn Look Like? - Horses for Sources | No Boundaries\",\"isPartOf\":{\"@id\":\"https:\/\/www.horsesforsources.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2021\/12\/5838358861c70727033696.jpg\",\"datePublished\":\"2016-11-25T12:15:00+00:00\",\"dateModified\":\"2021-12-03T11:24:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.horsesforsources.com\/#\/schema\/person\/c4f084ff7ad43632f537b3b30918e69f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#primaryimage\",\"url\":\"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2021\/12\/5838358861c70727033696.jpg\",\"contentUrl\":\"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2021\/12\/5838358861c70727033696.jpg\",\"width\":675,\"height\":321},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.horsesforsources.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What does Tomorrow\u2019s Cyber-Security Unicorn Look Like?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.horsesforsources.com\/#website\",\"url\":\"https:\/\/www.horsesforsources.com\/\",\"name\":\"Horses for Sources | No Boundaries\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.horsesforsources.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.horsesforsources.com\/#\/schema\/person\/c4f084ff7ad43632f537b3b30918e69f\",\"name\":\"Phil Fersht\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.horsesforsources.com\/#\/schema\/person\/image\/86ee0c0ac2d033eed87f327162eb27f7\",\"url\":\"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2020\/11\/phill-150x150.png\",\"contentUrl\":\"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2020\/11\/phill-150x150.png\",\"caption\":\"Phil Fersht\"},\"description\":\"Phil Fersht is\u00a0a world-renowned analyst, writer and visionary in\u00a0emerging technologies, automation, digital business models, and the alignment of\u00a0enterprise operations to\u00a0drive customer impact and competitive advantage\",\"sameAs\":[\"http:\/\/hfsresearch.com\/team\/phil-fersht\",\"https:\/\/www.linkedin.com\/in\/pfersht\/\",\"https:\/\/x.com\/pfersht\"],\"url\":\"https:\/\/www.horsesforsources.com\/author\/phil-fherst\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What does Tomorrow\u2019s Cyber-Security Unicorn Look Like? - Horses for Sources | No Boundaries","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/","og_locale":"en_US","og_type":"article","og_title":"What does Tomorrow\u2019s Cyber-Security Unicorn Look Like? - Horses for Sources | No Boundaries","og_description":"The prevalence of high-profile cyber-attacks is on the increase. In the last two weeks alone we have witnessed the exposure...","og_url":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/","og_site_name":"Horses for Sources | No Boundaries","article_published_time":"2016-11-25T12:15:00+00:00","article_modified_time":"2021-12-03T11:24:42+00:00","og_image":[{"width":675,"height":321,"url":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2021\/12\/5838358861c70727033696.jpg","type":"image\/jpeg"}],"author":"Phil Fersht","twitter_card":"summary_large_image","twitter_creator":"@pfersht","twitter_misc":{"Written by":"Phil Fersht","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/","url":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/","name":"What does Tomorrow\u2019s Cyber-Security Unicorn Look Like? - Horses for Sources | No Boundaries","isPartOf":{"@id":"https:\/\/www.horsesforsources.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#primaryimage"},"image":{"@id":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#primaryimage"},"thumbnailUrl":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2021\/12\/5838358861c70727033696.jpg","datePublished":"2016-11-25T12:15:00+00:00","dateModified":"2021-12-03T11:24:42+00:00","author":{"@id":"https:\/\/www.horsesforsources.com\/#\/schema\/person\/c4f084ff7ad43632f537b3b30918e69f"},"breadcrumb":{"@id":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#primaryimage","url":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2021\/12\/5838358861c70727033696.jpg","contentUrl":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2021\/12\/5838358861c70727033696.jpg","width":675,"height":321},{"@type":"BreadcrumbList","@id":"https:\/\/www.horsesforsources.com\/tomorrows-cyber-security-unicorn_112516\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.horsesforsources.com\/"},{"@type":"ListItem","position":2,"name":"What does Tomorrow\u2019s Cyber-Security Unicorn Look Like?"}]},{"@type":"WebSite","@id":"https:\/\/www.horsesforsources.com\/#website","url":"https:\/\/www.horsesforsources.com\/","name":"Horses for Sources | No Boundaries","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.horsesforsources.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.horsesforsources.com\/#\/schema\/person\/c4f084ff7ad43632f537b3b30918e69f","name":"Phil Fersht","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.horsesforsources.com\/#\/schema\/person\/image\/86ee0c0ac2d033eed87f327162eb27f7","url":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2020\/11\/phill-150x150.png","contentUrl":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2020\/11\/phill-150x150.png","caption":"Phil Fersht"},"description":"Phil Fersht is\u00a0a world-renowned analyst, writer and visionary in\u00a0emerging technologies, automation, digital business models, and the alignment of\u00a0enterprise operations to\u00a0drive customer impact and competitive advantage","sameAs":["http:\/\/hfsresearch.com\/team\/phil-fersht","https:\/\/www.linkedin.com\/in\/pfersht\/","https:\/\/x.com\/pfersht"],"url":"https:\/\/www.horsesforsources.com\/author\/phil-fherst\/"}]}},"authors":[{"term_id":19,"user_id":3,"is_guest":0,"slug":"phil-fherst","display_name":"Phil Fersht","avatar_url":{"url":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2024\/02\/Phil-Fersht-HFS-Updated.jpg","url2x":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2024\/02\/Phil-Fersht-HFS-Updated.jpg"},"first_name":"Phil","last_name":"Fersht","user_url":"http:\/\/hfsresearch.com\/team\/phil-fersht","description":"Phil Fersht is\u00a0a world-renowned analyst, writer and visionary in\u00a0emerging technologies, automation, digital business models, and the alignment of\u00a0enterprise operations to\u00a0drive customer impact and competitive advantage"}],"_links":{"self":[{"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/posts\/3781"}],"collection":[{"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/comments?post=3781"}],"version-history":[{"count":0,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/posts\/3781\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/media\/3782"}],"wp:attachment":[{"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/media?parent=3781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/categories?post=3781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/tags?post=3781"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/ppma_author?post=3781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}