Reshaping The Tomorrow’s Cybersecurity Teams


Today’s cybersecurity will not exist as tomorrow’s cybersecurity. With time and space, the converging factors are changing the enterprise cybersecurity making us realize that we need to change the way we approach it. Among the converging factors, the first and foremost not to be overlooked is the fact that the cybercriminals have aced their game by penetrating organizations using the non technical means. With the boon of social engineering and phishing techniques, they possess the capability to bypass organization’s increasingly advanced defences by manipulating the insiders to gain access. As per a research, social engineering and phishing techniques were the most common methods of compromise last year.

Block chain network and programming concept on technology background

The second fact is that the volume of data in all the organizations is growing beyond expectations and has been stored in the most decentralized manner aiding in difficulties to ensure if they are optimally protected. IDC predicts that the worldwide volume of the data will increase tenfold by 2025 to 163 zettabytes where the majority of them are created and managed by the enterprises. Therefore, the increase in the latest technologies implies a larger attack surface, new attack vectors and more points of vulnerability for the organizations to secure.

What more have been added to these challenges is that the organizations are also facing an acute shortage of skilled cybersecurity talent that are able to address the rapidly growing threat landscape and at the same time manage the huge security technologies that has already been employed by their organization. In order to address these challenges, the organizations must focus on recruiting cybersecurity analysts from the non-traditional disciplines and backgrounds. Some of the non-traditional disciplines that the organizations must focus on are:

  • Data Scientists: Data Scientists come to the rescue when there is an immense growth of the enterprise data. The data scientists are skilled individuals familiar with the using of machine learning to parse through the large volumes of data to look for the usual patterns or anomalies that may pint towards a breach.
  • Statisticians: Statisticians and mathematicians can work on the risk management strategies as they excel at gauging organizational risk tolerance and determining incident possibilities and their calculations.
  • Investigators, Military and Law Enforcement: The individuals having the background in law enforcement, military services or any other types of investigators must be appointed as they are the experienced threat hunters having capabilities to adopt black hat mindset while build criminal profiles and establish modulus operandi. They could participate in the Dark Web communities and conduct investigations to predict what the opponents may be planning.
  • Liberal Arts: People from the psychology, sociology and philosophy would be an added benefit as these people can help the organizations to understand the human side of the equation while they bear creative and as well as abstract thinking matching the mindsets of the black hats.

Disclaimer: does not promote or endorse claims that have been made by any parties in this article. The information provided here is for the general purpose only and unintended to promote or support purchasing and/or selling of any products and services or serve as a recommendation in the involvement of doing so. Neither nor any member is responsible directly or indirectly for any loss or damage caused or alleged to be caused by or in relation with the reliance on or usage of any content, goods or services mentioned in this article.



Please enter your comment!
Please enter your name here