Story image

Working in the cyber security industry

16 Nov 16

One of the ways in which STOP. THINK. CONNECT. - which describes itself as “the global online safety awareness campaign to help all digital citizens stay safer and more secure online” – works towards achieving its aims is by inviting participating partners such as ESET to offer tips and advice in the course of its frequent Twitter chats.

On October 20th, the subject of one of these events was recognising and combating cybercrime. These generally take the form of commentary from a wide range of organisations in response to specific questions. 

What are some examples of cybercrime-fighting careers, and what skills are needed for a cybersecurity job?

Not that I have a secret yearning to launch a new career in careers counselling, but I do actually get asked to give such advice quite a lot, probably because people think someone as old as I am, after 30 years or so in or on the borders of the security business, must have something useful to say.

The questions we were asked were as follows:

  • Can you provide a rough outline of what cybersecurity has come to mean as a discipline and a career? How has it come to be incorporated into the larger fields of IT and computer science/programming?
  • With that in mind, what should we be teaching the next generation of IT and computer science specialists about cybersecurity?
  • On a practical level, what does the day-to-day work of cybersecurity look like, and what kind of person/personality is well suited to this kind of work?
  • What kinds of coursework and practical training should students look for in an advanced degree in cybersecurity, and what kind of experience outside of the classroom is helpful in cultivating expertise in the field?
  • How did you get into the field, what drew you to it, and how have you seen it evolve over the last decade or so?
  • What are employers looking for in cybersecurity hires and how should someone who’s aiming to enter the field prepare him or herself?
  • What should we be teaching the next generation, and even the current generation of information security specialists and technicians, both in terms of skills and ethics?
  • How is the interplay between government policies, technological innovations, economic forces, and social dynamics impacting the evolution of cybersecurity, and what are the biggest factors shaping education and employment in the field?
  • From your perspective, what are the one or two biggest misconceptions that people seem to have — even people “in the know” — about cyberattacks, malware, and information security?

Those seem to me to be questions that may well interest people contemplating a career path in security, and if nothing else you’ll get a wide range of viewpoints. 

Article by David Harley, We Live Security

IP theft: A global issue catching NZ businesses off guard
“We have this incredible record of innovation in New Zealand. But our innovative businesses haven’t always been meticulous in shoring up their IP."
Why A/NZ organisations need to improve compliance protocols
Only a mere 4% of IT decision makers and data managers surveyed said their organisation faced no data management challenges. 
What the people say - Gartner’s November Customers’ Choices
A roundup of the latest Gartner Peer Insight Customers’ Choices from Backup and Recovery to Business Intelligence and Analytics, and more.
BlackBerry buys out cybersecurity AI firm Cylance
“We are eager to leverage BlackBerry’s mobility and security strengths to adapt our advanced AI technology to deliver a single platform.”
Data protection is key to building customer trust
"New data compliance rules offer an opportunity for businesses to re-evaluate their processes and improve data management and customer loyalty."
NZ Internet Task Force joins iSANZ Hall of Fame
NZITF chair Barry Brailey and former chairs Mike Seddon and Paul McKitrick received the award in Auckland last week.
Quantum computing: The double-edged sword for cybersecurity
Quantum computing is quickly moving from science fiction to reality.
Three ways to achieve data security whilst enabling BYOD
"A mobility strategy is now more important than ever before, that said, selecting the right one is often no small task."