• Complain

Leeza Garber - Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity

Here you can read online Leeza Garber - Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Business Expert Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Leeza Garber Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity
  • Book:
    Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity
  • Author:
  • Publisher:
    Business Expert Press
  • Genre:
  • Year:
    2022
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Building a successful cybersecurity team is no longer optional.

Cyberthreats evolve at a staggering pace, and effective cybersecurity operations depend on successful teams. Unfortunately, statistics continue to illustrate that employers are not finding the people they need.

The Can. Trust. Will. system guides the C-Suite, HR professionals and talent acquisition to build unbeatable cybersecurity teams through advanced hiring processes and focused on-boarding programs. Additionally, this book details how successful cybersecurity ecosystems are best built and sustained, with expert analysis from high-level government officials, Fortune 500 CSOs and CISOs, risk managers, and even a few techies.

Those already in the field (and newbies) will glean invaluable knowledge about how to find their most effective position within a cybersecurity ecosystem. In a tech-driven environment, cybersecurity is fundamentally a human problem: and the first step is to hire for the human element.

Leeza Garber: author's other books


Who wrote Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity? Find out the surname, the name of the author of the book and a list of all author's works by series.

Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents
Guide

Can Trust Will Can Trust Will Hiring for the Human Element in the New - photo 1

Can. Trust. Will.

Can. Trust. Will.

Hiring for the Human Element in the New Age of Cybersecurity

Leeza Garber and Scott Olson

Can Trust Will Hiring for the Human Element in the New Age of Cybersecurity - photo 2

Can. Trust. Will.:
Hiring for the Human Element in the New Age of Cybersecurity

Copyright Business Expert Press, LLC, 2022.

Can. Trust. Will. is a Registered Trademark of Leeza Garber and Scott Olson

Cover design by Divya Pidaparti

Interior design by Exeter Premedia Services Private Ltd., Chennai, India

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any meanselectronic, mechanical, photocopy, recording, or any other except for brief quotations, not to exceed 400 words, without the prior permission of the publisher.

First published in 2022 by

Business Expert Press, LLC

222 East 46th Street, New York, NY 10017

www.businessexpertpress.com

ISBN-13: 978-1-63742-167-3 (paperback)

ISBN-13: 978-1-63742-168-0 (e-book)

Business Expert Press Business Law and Corporate Risk Management Collection

Collection ISSN: 2333-6722 (print)

Collection ISSN: 2333-6730 (electronic)

First edition: 2022

10 9 8 7 6 5 4 3 2 1

Description

Cyber threats evolve at a staggering pace, and effective cybersecurity operations depend on successful teams. Unfortunately, statistics continue to illustrate that employers are not finding the people they need.

The Can. Trust. Will. system guides the C-Suite, human resources professionals, and talent acquisition to build unbeatable cybersecurity teams through advanced hiring processes and focused onboarding programs. Additionally, this book details how successful cybersecurity ecosystems are best built and sustained, with expert analysis from high-level government officials, Fortune 500 CSOs and CISOs, risk managers, and even a few techies.

Those already in the field (and newbies) will glean invaluable knowledge about how to find their most effective position within a cybersecurity ecosystem. In a tech-driven environment, cybersecurity is fundamentally a human problem: and the first step is to hire for the human element.

Keywords

cybersecurity; human resources; information technology; data breach; hiring; c-suite; onboarding; interview; career; behavioral interview; budget; budget process; security budget; IT; talent acquisition

Contents

Why We Chose to Write This Book

From humble beginnings of the Arpanet and a worm called Creeper, cybersecurity as a field has grown by leaps and bounds. Now, in the year 2022, every private corporation, government entity, public school, private university, mom-and-pop shop, massive financial institution, and local bank branch must consider cybersecurity and the people they hire to carry out cybersecurity directives. The massive growth of the field is staggering, with demand for cybersecurity experts estimated to be growing twelve times faster than the current job market in the United States. In short, every industry is struggling to find and retain employees that address cybersecurity needs. The structured solution offered in this book will guide the C-Suite, internal and external talent acquisition teams, and human resource professionals charged with navigating this challenging arena. Eligible employees come from information technology, engineering, security, privacy, risk, legal, computing, and human resources backgrounds, each offering a different piece of the puzzle. Compounding the complexity of the concept we term cybersecurity is the variety of fulltime, part-time, contract, and As A Service (AAS) employees every employer must consider. What we have found, over and over again, is that cybersecurity is fundamentally a human problemand must be addressed accordingly.

We have been fortunate enough to speak with leaders in this space from a wide range of backgrounds, and have incorporated their valuable insight into our hiring model. From the Director of the National Initiative for Cybersecurity Education at the National Institute of Standards and Technology in the U.S. Department of Commerce; to the Director of Information Security Governance Risk and Compliance for the University of Wisconsin System; to the Vice President and Chief Security Officer of Dominion Energy (a major energy supplier for the U.S. government and countless private entities); to the former Chief Information Officer of the U.S. Air Force and current Senior Vice President of Leidos (the largest IT provider in the federal market); to the Director of Technology Infrastructure and Information Security of a Major League Baseball Team.

Outline

Technology is inherently and firmly rooted in everyday life. Safe interaction with information technology systems is increasingly important. Fortunately, many companies are aware of the risk and corresponding liability which arise from maintaining ever-growing amounts of data, and they emphasize building systems which will stay ahead of cyber threat vectors. Developing and implementing solutions to ongoing cyberattacks and data breaches requires creative, focused, and highly trained employees. The challenge is finding the right people who are capable of creating effective solutions to evolving problems. As a result, the cyber world is struggling to find the human capital it needs.

It was predicted that there would be 3.5 million unfilled cybersecurity jobs globally by 2021, up from one million positions in 2014.

Compounding this problem is the fact that clear descriptions of job roles and responsibilities are substantially lacking. The research shows that professionals in the field of cybersecurity respond better to clearly defined job requirements and descriptions. Vague descriptions are not only a

Defining who you need for certain roles is more challenging for jobs relating to cybersecurity because these positions are situated in a rapidly evolving field involving specialized skills which must be adapted to unique workplace environments. Even though the initial strategy at the outset is often to set the bar high, begin reviewing applicants, and then compromise on one or a few competencies, this compromise is rarely realized. This is because once a good enough candidate is identified, at least one person in the approval pipeline will ask why a candidate who fails to meet the job description is being considered at all. But there are valuable cybersecurity candidateswhether for technical, compliance, risk, legal, or executive rolesthat come from all different backgrounds and can be trained. The real question is: do you know (and understand) what you need?

The single most important part of this process is often overlooked by most hiring professionals, and not only those focused on cybersecurity. To hire effectively, you must know, in specific detail, exactly who and what you need for each specific position. Job competencies, particularly those based on surveys or industry research, are insufficient because they are too general. Relying on credentials or completion of specific training courses, without a deeper dive, is also not enough to differentiate between candidates who will succeed and those who will fail. Defining who you need for certain roles is more challenging for jobs relating to cybersecurity because these positions present a field that involves specialized skills the president of Montreat College (which is a National Center of Academic Excellence in Cyber Defense Education), explains why cybersecurity is a human problem:

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity»

Look at similar books to Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity»

Discussion, reviews of the book Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.