
The Secure CiO
How to Hire and Retain Great Cyber Security Talent to Protect your Organisation
- 130 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
The Secure CiO
How to Hire and Retain Great Cyber Security Talent to Protect your Organisation
About this book
Are you a CIO currently leading, or would like to lead, cyber or information security professionals? Do you find the idea of going to market in search of a security leader a daunting task? The current security job market has become increasingly difficult to navigate for hiring managers and candidates alike. Many roles globally, sit vacant for months and the uncertainty this can cause for CIOs, on top of their mounting workload, is difficult to address and causes increased risk for the organisation. This book provides a step-by-step framework to address the challenges of finding and retaining cyber security leaders. Guiding CIOs and their peers through the establishment of a Security Agenda, this straightforward framework doesn't end at contract signing. From establishing non-negotiable traits to ensuring the new leader effectively transitions into the role, The Secure CIO removes the burden of hiring a cyber security leader. Written by respected information security blogger, Claire Pales, this book is for any CIO leading security staff - whether currently hiring or still considering the best way to address cyber risk in an organisation.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
24 April 2017, Dept. of the Prime Minister and Cabinet, Australia
- At any time, there are 350,000 open roles for cyber security professionals in the U.S.7
- 78% of AISA members surveyed believe that lack of clarity about skills required contributes to difficulties in recruiting for cyber security roles.8
- Difficulties in recruiting because of wage restrictions and the tendency to leave positions unfilled are consistent with evidence of the limited growth of cyber security teams; 52% reported that their team had remained about the same or grown by less than 10%, while more than 11% of respondents reported a decrease.9
- Australia will likely need about 11,000 additional cyber security workers over the next decade â for technical as well as non-technical positions â just to meet the industryâs âbusiness-as-usualâ demand forecasts.10
- Attract, train and retain more women (more on this in chapter 6). At only 11% of the cyber security workforce (and yet 48% of the general workforce),11 more women would contribute to this great industry, if only they knew about it.
- Collaborate; get involved. Enterprises, academia and government need to work together to educate the community on the need for more cyber security professionals.
- Address ongoing development, as well as access to mentors and sponsors, which is critical to attracting, developing, and retaining professionals in the cyber security workforce.
https://www.csoonline.com/article/3206688/it-careers/firms-look-beyond-job-boards-to-find-and-recruit-cybersecurity-talent.html.
https://www.cyberscoop.com/women-in-cybersecurity-wage-gap-report/.
theyâll work for your money.
theyâll work for you with blood, sweat and ...
Table of contents
- Introduction
- The five-step framework for effective hiring
- The Dilemma
- Section 1
- Chapter 1, The state of the industry
- Chapter 2, What is your why?
- Chapter 3, Security maturity
- Chapter 4, What others are saying - Part 1
- Chapter 5, Aligning to business strategy
- Section 2
- Chapter 6, Where to?
- Chapter 7, What skills and outcomes are non-negotiable?
- Chapter 8, Letâs get real â the true job description
- Section 3
- Chapter 9, To recruiter or not to recruiter?
- Chapter 10, Candidate review
- Chapter 11, Surround yourself with supporters
- Chapter 12, Are you allowing for stretch?
- Chapter 13, What others are saying, Part 2
- Section 4
- Chapter 14, The tour of duty
- Chapter 15, The expectation gap
- Section 5
- Chapter 16, Welcome
- Chapter 17, Update
- Chapter 18, What is coaching?
- Chapter 19, What does the candidate need?
- Chapter 20, Addressing the stretch
- Chapter 21, Where to from here?
- Chapter 22, Itâs never a âwrapâ
- Valuable references/links
- Acknowledgements