Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 28 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Could human resources be the main problem for hiring the right people into security positions?

by The Gurus
September 10, 2020
in Opinions & Analysis
Share on FacebookShare on Twitter

Pre-requisite requirements for hiring by Human Resources may cause the best people not being considered for jobs in security.

Speaking to IT Security Guru, Cyber Security Challenge CEO Stephanie Daman said that there is often an issue where a company will have a hiring policy and if a person doesn’t fit with a qualifications minimum but has the right skill set, they may not be seen.
“The problem is two-fold: there are people with the underlying skills but HR does not recognise this as the people do not have the right qualifications and while they may have the right skills but not the qualifications that are specified,” she said.
“Also at every stage, there are people who do not understand the importance of particular skills and the youth of our profession. There has got to be a better approach as security people do not fit within a traditional way of education sometimes and once this is an older industry, the traditional ways of hiring will work.”
Amar Singh, chair of the UK Chapter security group of ISACA, said that he “100 per cent agreed”, and said that this issue is huge as job descriptions are written too objectively and they need to be more subjective.
“This is especially the case when you start off as HR has to know what you need for the job and they objectify it,” he said.
“HR has made it objective and the tough part is certificates are put in, but you never get the role filled. There needs to be a balance of subjectivity and objectivity and sometimes a job is senior level and it needs a narrative of it, reports to and from but managers don’t want to put it down as once it is written it is set in stone.”
James Lyne, SANS instructor and global head of security research at Sophos, said that the bigger issue is standardisation where people want skills and certifications and know what skills they need; but it is not a case of “one size fits all”.
“Many certifications are about proven knowledge and not experience, and the problem has been that employers require experience, but it should be on capability and should focus on educating people outside the organisation on what a security role looks like,” he said.
“There is a perception of security being a role rather than being multiple roles, and there is a challenge in managing roles and certifications. There are a lot of skills out there; the biggest thing that education requires is multiple paths for experience, capability and certifications. Employers need to use all three and being in a talent deficit, the functions in security don’t get this yet.”
Asked if this problem can be overcome, Damon said: “We are getting there. It is just an old process that is not helped by this sector moving too swiftly as universities try to keep up to speed with cyber security, which is going faster than any curriculum and businesses have to look at it that way too.
FacebookTweetLinkedIn
ShareTweet
Previous Post

Trustwave completes acquisition of Application Security

Next Post

US CERT issues warning about CryptoLocker

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information