Access "Bridging the IT security skills gap"
This article is part of the September 2013 Volume 15 / No. 7 issue of Next-generation firewalls play by new rules
Dell SecureWorks' business relies on having top talent to run its security operation centers and threat analysis groups. As a managed security service provider in the business of filling the holes in its clients' defenses, the company needs a well-trained workforce. Yet, like most firms, SecureWorks is hounded by a dire scarcity of trained security professionals. The situation is so bad that for every 20 open security positions at the company, there is only one qualified candidate, said Jon Ramsey, the firm's chief technology officer. The company has pursued a number of strategies to improve its chances of gaining the right people, from aggressive recruiting tactics to in-house ‘farm teams' for developing talent, to partnerships with universities. On top of that, the company awards higher salaries to the right people, a necessary tactic that not every company can afford. "The people who need security professionals cannot find them," said Ramsey. "And if the company is not a security business, it is hard to justify paying a premium for people who are not core... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Firewalls play by new rules
by David Strom, Contributor
Modern firewalls offer greater application awareness and user controls. Protect your migration strategy with these tips from the pros.
-
Cybersecurity: Global risk management moves beyond regulations
by Kathleen Richards, Features Editor
Global risk management based on the lowest common denominator may not ‘comply' with IP or trade secrets. Analysts see big changes ahead.
-
Firewalls play by new rules
by David Strom, Contributor
-
-
Bridging the IT security skills gap
by Robert Lemos
While poaching security talent may plug short-term gaps, outreach and education will solve the long-term shortfall in IT security professionals.
-
Bridging the IT security skills gap
by Robert Lemos
-
Columns
-
Cybersecurity and global risk assessment enter the boardroom
by Kathleen Richards, Features Editor
Analysts expect security concerns to drive global risk management, but executives may need convincing.
-
Converting to cloud: Ranum Q&A with Lee Heath
by Marcus J. Ranum, Contributor
Not down with Dropbox? Lee Heath embraced shadow IT and improved his company's data security practices in the process.
-
Attack security literacy with brute force
by Doug Jacobson, Julie A. Rursch
Forget the slogans. Reset your security awareness program with actionable information.
-
Cybersecurity and global risk assessment enter the boardroom
by Kathleen Richards, Features Editor
More Premium Content Accessible For Free
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...