• Skip to primary navigation
  • Skip to content

SMB ISAO

Small to Medium-size Business Information Sharing and Analysis

833-SMB-SAFE
Become A Member
  • Home
  • About Us
  • Partners
  • Resources
    • Why Should We Share?
    • Frequently Asked Questions
    • Become A Partner
    • News & Events
    • Blog
  • Contact Us

Archives for August 24, 2017

The Hunt for In-House Cybersecurity Talent

August 24, 2017 By Mike Shugart Leave a Comment

More and more companies are finding their organizations grossly exposed to cyber-attacks because of a shortage in cybersecurity-trained IT specialists. Unfortunately for many of these companies, their current in-house IT specialists have maybe a year of basic cybersecurity experience, but lack the wealth of knowledge necessary to effectively stop these ever-evolving cyber-attacks. These specialists must continually acquire higher levels of cybersecurity education if they hope to keep up with these attacks and how to stop them.

The good news is that there are a lot of opportunities for organizations to properly train up their current IT talent and help them acquire the necessary experience and education to effectively combat cyber-attacks. Organizations need to begin seeking out talent from within their organization, and then cultivate that talent. So, how can you identify and acquire great IT talent with promising cybersecurity skills? These three suggestions are a good place to start:

  1. Adjust Your Expectations.

    Because of the shortage of extensively experienced cybersecurity specialists, you will most likely need to adjust your expectations. You may need to change job descriptions to ask for interest in cybersecurity as opposed to demanding experience. If you’re a large enough company, then you definitely have a chance at getting one of the few well-trained specialists, but even then, you may have to be willing to invest more into training an individual.

    You may find that it’s best to take someone who is already familiar with your company and your practices that you can then train into a new role. Essentially, drop expectations, start looking for potential, and jump at it when you find it.

  2. Seek Opportunity Everywhere.

    With your expectations adjusted, you can start looking for cybersecurity potential everywhere. Thinking outside the box will help you to identify talent in many places. You may find that an older tech professional who doesn’t have a lot of experience with new tech and cyber-attacks is the perfect candidate. His or her extensive tech foundation could actually be the perfect platform for cyber-training.

    Or, you may find a current employee who works in a totally different department and doesn’t have any experience with tech, but has a lot of interest, is a quick-learner, and is coachable. You’d probably be surprised how many now cyber-security professionals made a last-minute jump to IT. So, keep your eyes open, and look everywhere.

  3. Watch for Interest First.

    Interest matters most! You can do a lot with a person who’s interested in cyber-security and willing to learn. So, as part of looking everywhere, send out inquiries within your organization to find out if there are any current employees who have an interest in cyber-security and in furthering their career.

    Look into new methods for identifying individuals who might like cybersecurity. Hold an interest meeting, send out a company-wide email, and/or put up flyers all around. You never know who will respond, so put the opportunity in front of as many eyes as possible.

Filed Under: Uncategorized

  • Home
  • ABOUT US
  • PARTNERS
  • RESOURCES
  • CONTACT US
2005 Aeroplaza Drive, Colorado Springs, CO 80916 | 877-412-9407
Copyright © 2019 SMBISAO™.
Privacy Statement | Terms and Conditions

YOU ARE BEING REDIRECTED TO:

Why am I being redirected?
Membership to SMB iSAO includes the major benefit product: Survive Cyber. By becoming an SMB iSAO member and signing into to Survive Cyber, members gain access to SMB IiAO‘s Hall of Fame award-winning Information Sharing Platform. The Survive Cyber product is powered by SMB iISAO and provides members with access to our advanced security operation center, threat intelligence alerts curated by our cybersecurity analysts, and critical legal protections accessible only through compliance with CISA. In addition, Survive Cyber provides access to a content rich resource portal and up to $100,000 in Cyber Security Insurance coverage. Billing will be processed by SMBISAO.