This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

SC Total Security Conference: HR needs to appreciate skills as well as qualifications

Share this article:

HR models that deem suitability of applicants need to be more flexible to ensure that the best people are not excluded.

Speaking at the SC Magazine Total Security Conference, Stephanie Daman, CEO of the Cyber Security Challenge said that there is a danger of a ‘lost generation' particularly among those who do not have qualifications but proven skills.

She said: “What we can do is provide ways to translate skills to industry, as a lot of people do not have qualifications, so we can push through courses, or look at apprenticeships or internships to help meet the talented people.

“When you have got an individual with proven skill, who does not have three A-levels, then you have got a real problem. HR has one view of shape of person and people of that shape may not be best person to do cyber security. We need to look at HR, as some applicants are good and others need to look at how to get people with talent in even if they do not fit the profile. Engaging with HR may be simplest way to overcome this.”

Daman highlighted statistics from e-skills which showed that 90 per cent of companies had difficulty recruiting in this space space, while IET statistics from April 2013 found that only 14 per cent of small to medium enterprises had sufficient talent to meet the gap. “Our sponsors say they cannot find people – they will read 300 CVs and only four will be relevant, so there firmly is a cyber security skills shortage,” she said.

“To me it is pretty fundamental; everything is online and everything is linking to the internet and entire prosperity, and if we don't have right people, we are risking all of that.”

Daman said that the root of the problem is on two areas: the first is the ‘lost generation' who were not taught proper skills in schools; while the second is whether schools are teaching correctly?

“If we were more focused on schools we could have acted and this has been raised and the government is replying, so there is hope for the future and these kids will not be a lost generation and will see something worth pursuing,” she said.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Mixed results for key Government cyber-initiatives

Mixed results for key Government cyber-initiatives

The Government's Verify scheme to confirm IDs is behind scheuduled uptake, but its CISP threat intelligence sharing scheme is ahead of target.

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...

Cyber security still a learning curve for most companies

Cyber security still a learning curve for most ...

Poor network visibility, outdated security tools, a skills shortage and a lack of control in the cloud are just some of the reasons companies are struggling with cyber-security, say two ...