Cybersecurity Hiring Woes? Time to Consider a New Collar Approach

IBM is leading an industrywide effort to close the IT skills gap by hiring new collar professionals who lack formal degrees but possess requisite skills.

The post Cybersecurity Hiring Woes? Time to Consider a New Collar Approach appeared first on Security Intelligence.

Continue reading Cybersecurity Hiring Woes? Time to Consider a New Collar Approach

Overcoming the Skills Gap With On-the-Job Training

Organizations can address the cybersecurity skills gap by looking to tap the pool of millennials entering the information security workforce.

The post Overcoming the Skills Gap With On-the-Job Training appeared first on Security Intelligence.

Continue reading Overcoming the Skills Gap With On-the-Job Training

Five Strategies to Help Recent Graduates Close the Awareness Gap

IT leaders are struggling to find qualified job candidates due to an awareness gap and the inability of recent graduates to articulate their skills.

The post Five Strategies to Help Recent Graduates Close the Awareness Gap appeared first on Security Intelligence.

Continue reading Five Strategies to Help Recent Graduates Close the Awareness Gap

Closing the Cybersecurity Skills Gap With a New Collar Approach

In response to the ever-widening cybersecurity skills gap, many organizations are hiring new collar workers to fill open IT positions.

The post Closing the Cybersecurity Skills Gap With a New Collar Approach appeared first on Security Intelligence.

Continue reading Closing the Cybersecurity Skills Gap With a New Collar Approach

The IT Gig Economy: Are Freelances or FTEs Your Best Fit?

While CISOs may prefer to hire full-time security professionals, many organizations are leveraging the gig economy to bridge the cybersecurity skills gap.

The post The IT Gig Economy: Are Freelances or FTEs Your Best Fit? appeared first on Security Intelligence.

Continue reading The IT Gig Economy: Are Freelances or FTEs Your Best Fit?

CISO Succession Planning Takes Preparation

In light of the skills shortage and the highly competitive CISO job market, careful succession planning is the key to leaving your company in good hands.

The post CISO Succession Planning Takes Preparation appeared first on Security Intelligence.

Continue reading CISO Succession Planning Takes Preparation

It’s Not Too Late: Take Back Control of Your Cybersecurity Now

“Take Back Control of Your Cybersecurity Now,” the new e-book by Paul Ferrillo and Chris Veltsos, is an invaluable resource for nontechnical professionals.

The post It’s Not Too Late: Take Back Control of Your Cybersecurity Now appeared first on Security Intelligence.

Continue reading It’s Not Too Late: Take Back Control of Your Cybersecurity Now

The CISO as a Digital Trust Diplomat

As digital trust diplomats, CISOs must be tactful in their negotiations and should able to influence colleagues and superiors.

The post The CISO as a Digital Trust Diplomat appeared first on Security Intelligence.

Continue reading The CISO as a Digital Trust Diplomat

Representation of Women in Cybersecurity Remains Stagnant, Despite Recent Efforts to Balance the Scales

According to a new study, the gap between men and women in cybersecurity barely closed since 2015 despite widespread efforts to raise awareness.

The post Representation of Women in Cybersecurity Remains Stagnant, Despite Recent Efforts to Balance the Scales appeared first on Security Intelligence.

Continue reading Representation of Women in Cybersecurity Remains Stagnant, Despite Recent Efforts to Balance the Scales