According to the ISC2, the cybersecurity sector is faced with a shortfall of roughly four million professionals, which is an alarming 12.6% increase from 2022. In the face of an ever-evolving threat landscape
CVP Microsoft Security | Board of Directors, Aptiv
According to the ISC2, the cybersecurity sector is faced with a shortfall of roughly four million professionals, which is an alarming 12.6% increase from 2022. In the face of an ever-evolving threat landscape, it’s clear that the demand for more cyber professionals is glaringly high. But companies are not only faced with trying to fill that gap, as now they must also combat the hackers posing as job applicants, seizing on the workforce demand as a means of attack!
This deceptive strategy is particularly challenging to detect and requires heightened vigilance during the recruitment process. As security leaders, we must strike the right balance between tightened hiring protocols and diligent applicant screening as the need becomes increasingly critical. The stakes are high, but together we can create robust hiring practices that fortify our defenses and workforce. 💜
https://lnkd.in/gyVgyDD3
Bad actors posing as job applicants for open cybersecurity roles and using deepfakes to try and pass the interviews is just another use case highlighting the growing need for stronger security across both voice and video communication channels.
At DeepTrust we are addressing this very issue and are helping security teams defend their voice and video calls from social engineering, vishing, and deepfakes.
Please take a moment to read Vasu Jakkal's post and the WSJ article she shared!
CVP Microsoft Security | Board of Directors, Aptiv
According to the ISC2, the cybersecurity sector is faced with a shortfall of roughly four million professionals, which is an alarming 12.6% increase from 2022. In the face of an ever-evolving threat landscape, it’s clear that the demand for more cyber professionals is glaringly high. But companies are not only faced with trying to fill that gap, as now they must also combat the hackers posing as job applicants, seizing on the workforce demand as a means of attack!
This deceptive strategy is particularly challenging to detect and requires heightened vigilance during the recruitment process. As security leaders, we must strike the right balance between tightened hiring protocols and diligent applicant screening as the need becomes increasingly critical. The stakes are high, but together we can create robust hiring practices that fortify our defenses and workforce. 💜
https://lnkd.in/gyVgyDD3
I’ve seen two instances of fake #cybersecurity workers in the last few years.
This was happening even before #GenAi took off, but as WSJ and Vasu Jakkal point out, now it’s accelerating due to convergence of extreme demand, #ai, and growing rewards for the attackers.
One was actually hired, but a different person showed up and we had to figure out legal way to terminate - it’s not always straightforward. The other, we found that the person talking during the interview and the person doing the interactive work were two different people. Even before deepfakes, this was a scourge.
I’ve also seen it happen further down the supply chain in MSPs and MSSPs. It’s even harder to fight when you can’t directly interrogate the offender.
One of the most dangerous attacks comes when the offender is volunteering their way into an open source supply chain attack. Look up XZ utils hack earlier this year. Microsoft saved all our collective ##### on that one!
Sometimes they want access to do damage, other times it’s simply financial.
Reinforces my long held belief: hire people you know and people they know. Challenging to scale, but much less risk for trusted positions.
Beyond that, risk management is critical.
#zerotrust applies to people, too - especially when the person is supposed to be a security control!
CVP Microsoft Security | Board of Directors, Aptiv
According to the ISC2, the cybersecurity sector is faced with a shortfall of roughly four million professionals, which is an alarming 12.6% increase from 2022. In the face of an ever-evolving threat landscape, it’s clear that the demand for more cyber professionals is glaringly high. But companies are not only faced with trying to fill that gap, as now they must also combat the hackers posing as job applicants, seizing on the workforce demand as a means of attack!
This deceptive strategy is particularly challenging to detect and requires heightened vigilance during the recruitment process. As security leaders, we must strike the right balance between tightened hiring protocols and diligent applicant screening as the need becomes increasingly critical. The stakes are high, but together we can create robust hiring practices that fortify our defenses and workforce. 💜
https://lnkd.in/gyVgyDD3
According to the ISC2, the cybersecurity sector is faced with a shortfall of roughly four million professionals, which is an alarming 12.6% increase from 2022. In the face of an ever-evolving threat landscape, it’s clear that the demand for more cyber professionals is glaringly high. But companies are not only faced with trying to fill that gap, as now they must also combat the hackers posing as job applicants, seizing on the workforce demand as a means of attack!
This deceptive strategy is particularly challenging to detect and requires heightened vigilance during the recruitment process. As security leaders, we must strike the right balance between tightened hiring protocols and diligent applicant screening as the need becomes increasingly critical. The stakes are high, but together we can create robust hiring practices that fortify our defenses and workforce. 💜
https://lnkd.in/gyVgyDD3
According to the ISC2, the cybersecurity sector is faced with a shortfall of roughly four million professionals, which is an alarming 12.6% increase from 2022. In the face of an ever-evolving threat landscape
CVP Microsoft Security | Board of Directors, Aptiv
According to the ISC2, the cybersecurity sector is faced with a shortfall of roughly four million professionals, which is an alarming 12.6% increase from 2022. In the face of an ever-evolving threat landscape, it’s clear that the demand for more cyber professionals is glaringly high. But companies are not only faced with trying to fill that gap, as now they must also combat the hackers posing as job applicants, seizing on the workforce demand as a means of attack!
This deceptive strategy is particularly challenging to detect and requires heightened vigilance during the recruitment process. As security leaders, we must strike the right balance between tightened hiring protocols and diligent applicant screening as the need becomes increasingly critical. The stakes are high, but together we can create robust hiring practices that fortify our defenses and workforce. 💜
https://lnkd.in/gyVgyDD3
𝙋𝙡𝙚𝙖𝙨𝙚, 𝘿𝙤𝙣'𝙩 𝙏𝙚𝙡𝙡 𝘼𝙣𝙮𝙤𝙣𝙚.........🤫
In conversation with a potential client looking for a senior Cyber Security/ IT Security leader yesterday, the reason they turned to us is that they do not want it known that they are looking for such a person, 𝗻𝗼𝘁 𝗯𝗲𝗰𝗮𝘂𝘀𝗲 𝗶𝘁 𝗶𝘀 𝗰𝗼𝗻𝗳𝗶𝗱𝗲𝗻𝘁𝗶𝗮𝗹, it's because they do not want to be bombarded with 'non' relevant applicants (lots of them) applying through an online job ad and do not want to be bombarded with unsolicited CV's.
The company tried the direct route for other Cyber Security/ IT Security roles and they quickly established that the hidden costs 💰 & hidden time 🕰️ it took to try and get someone onboard totally outweighed reaching out to a specialist recruiter, someone who has an engaged 🤗 community & knows what people within their network are looking for from their next role.
So for your next Cyber Security or IT Security hire, remember, the direct route may seem cheaper and faster, but not always. Reach out to us and let us do the hard work for you 👍.
#ciso#cisos#cisolife#cyber#cybersecurity#cyberjobs#infosec#infosecjobs#informationsecurity#jobs
Check out this Cyber job heat map!
According to CyberSeek, "there are only enough cybersecurity workers in the United States to fill 72% of the cybersecurity jobs that employers demand."
This map shows you where the greatest disparities between openings and skilled employees are by percentage.
CyberSeek also shows the openings in Cyber roles by title. Check it out!
#cybersecuirty#cyberjobs#knowledgeispowerhttps://lnkd.in/duuPQtsS
Financial services executive- esp. in operations & risk management. Regarded as a strong leader, in-demand public speaker, outstanding decision maker. Work remotely due to medical issue but travel as needed
This little nugget was buried in a daily news recap I get from The Wall Street Journal.... definitely NOT what most job applicants or recruiters want to read - this has the potential to make the number of applicants for jobs explode in size and also to make the initial, already convoluted, front end screening to become more byzantine and arduous.... Here's what it says: Companies in the market for cybersecurity professionals could face a new method of attack, made harder to spot because of artificial intelligence: Hackers posing as job applicants. https://lnkd.in/ewhgAMjU
Beware of hackers posing as job applicants!
As cyber threats rise, some security leaders are ramping up hiring scrutiny to spot bad actors. The cybersecurity sector faces a global shortfall of 4 million professionals, and fraudsters are exploiting this demand. Lili Infante, CEO of CAT Labs, shared at WSJ's Tech Live: Cybersecurity conference that her firm has weeded out over 50 North Korean spies posing as candidates! These infiltrators aim to steal intellectual property and exploit vulnerabilities.
Stay vigilant and enhance your hiring processes!
https://lnkd.in/gTua-bSg
Beware of hackers posing as job applicants!
As cyber threats rise, some security leaders are ramping up hiring scrutiny to spot bad actors. The cybersecurity sector faces a global shortfall of 4 million professionals, and fraudsters are exploiting this demand. Lili Infante, CEO of CAT Labs, shared at WSJ's Tech Live: Cybersecurity conference that her firm has weeded out over 50 North Korean spies posing as candidates! These infiltrators aim to steal intellectual property and exploit vulnerabilities.
Stay vigilant and enhance your hiring processes!
https://lnkd.in/g7xkH4U3