Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Cybersecurity experts need technological and soft skills

13/09/2016 by Usha Tyagi

W1siziisijiwmtyvmdkvmtmvmdgvndkvmduvoty1l0n5ymvyihnly3vyaxr5lmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

In an age when cybercrime continues to increase, companies around the world are having to take steps to protect themselves from breaches. Though this often includes hiring security experts with the right technological skills to handle modern computer networks, an expert is calling for chief security officers (CSOs) to also maintain soft skills.

Talking of the rising need to focus on digital security, Palo Alto Network Regional Chief Security Officer Sean Duca said that professionals need to have expertise in automation as well as tech skills. CSOs are not able to rely on legacy security software anymore. Nor can they be sure that manual efforts to identify and isolate threats will always work. “The only way to deal with adversaries using automated tools is to automate defences and manage the change from protecting the perimeter to real-time monitoring,” Duca said.

Duca went on to explain that security officers need to use software that can automate quietly in the background and make intelligent actions to prevent breaches and reduce risks. There is also the need to remember that every document opened or shared in the cloud creates more potential data that could be stolen and, therefore, it needs protecting. “It is important that CSOs don’t simply rely on a system to detect a threat or challenge in real time, but also think about minimising the risk.”

There are a raft of other skills that modern CSOs also need. Though many experts may be armed with technological know-how, it is also vital that they have business acumen. To gain adequate money, resources and tools to properly safeguard companies, CSOs must be able to communicate properly with board members and stakeholders. If this is lacking, many experts will not be able to conduct their role effectively.

Robert Half Asia Pacific Senior Managing Director David Jones explained that the IT security role has evolved over the past few years. Now, in addition to having analytical skills, candidates need to have extremely well developed communication and business acumen expertise. “CSOs with the ability to clearly articulate cybersecurity issues, and the impact a data breach can have on an organisation, in a language that senior management and non-IT employees understand, are highly sought-after,” Jones explained.

Many firms around the world continue to struggle in the recruitment of cybersecurity experts. The problem has been made worse by the evolving cybercrime world, with new technologies bringing security risks with them.

 

 

About Us

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...