Apple building

Major Companies Pledge To Take Steps Toward Building Cybersecurity Workforce

Large employers like Google, Facebook, Johnson & Johnson and Apple have committed to closing the gap of cybersecurity jobs.

Some of the world’s largest corporations have agreed to a set of steps that they hope will help close a major cybersecurity jobs gap.

Organized by the Aspen Cybersecurity Group, a part of the Aspen Institute, the initiative takes aim at prioritizing “real-world skills over degrees” so that more workers are deemed qualified to fill crucial positions in the security industry.

John Carlin, the chair of the Aspen Institute’s cybersecurity and technology program and a former assistant attorney general for national security, announced the coalition on Wednesday, stating the need to seek candidates outside of those who have bachelor’s and more advanced degrees.

There will be at least 500,000 vacant cybersecurity jobs in the U.S. by 2021, Carlin added.

“It should deeply concern all Americans that businesses and government agencies are struggling to find enough cybersecurity workers,” he wrote, referencing the amount of money lost in cybersecurity breaches each year.

The companies include tech giants Apple, Google, Facebook and IBM along with fellow partner organizations AIG, Cloudflare, Cyber Threat Alliance, Duke Energy, IronNet, Northrop Grumman, Symantec, Unisys, Verizon and PwC.

In addition to widening recruitment beyond applicants with four-year degrees, the companies have also committed to using “non-gender biased job descriptions” and focusing on core job requirements rather than using over-technical language. Companies have pledged to making career paths “understandable and accessible to current employees and job seekers,” Carlin wrote.

While there are structural forces that have led to fewer Americans being qualified for cyber jobs, including a lack of integrated cybersecurity curriculum in schools and universities, Carlin said that the industry must act now to do what it can to attract a more diverse workforce.

“Companies and government agencies already have the power to narrow the cyber workforce gap simply by changing their internal processes,” he wrote. “Many organizations are leaving large pools of skilled candidates untapped, in part because of overly complex job requirements that disqualify more than 50% of applicants.”

More organizations, including government agencies and smaller companies, may sign on to the initiative as well, according to the release.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Securing the Flow of Operations

    The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3