<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cibersecurity &#8211; The Valley Talent</title>
	<atom:link href="https://thevalleytalent.es/en/category/ciberseguridad-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://thevalleytalent.es/en/</link>
	<description>Headhunter Perfiles Digitales - Empresas</description>
	<lastBuildDate>Wed, 11 Sep 2019 11:12:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://thevalleytalent.es/wp-content/uploads/2019/06/favicon-talent.png</url>
	<title>Cibersecurity &#8211; The Valley Talent</title>
	<link>https://thevalleytalent.es/en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Europe will have a shortage of 350.000 cybersecurity expert profiles in 2022</title>
		<link>https://thevalleytalent.es/en/2019/02/28/europe-will-have-a-shortage-of-350-000-cybersecurity-expert-profiles-in-2022/</link>
					<comments>https://thevalleytalent.es/en/2019/02/28/europe-will-have-a-shortage-of-350-000-cybersecurity-expert-profiles-in-2022/#respond</comments>
		
		<dc:creator><![CDATA[emartin]]></dc:creator>
		<pubDate>Thu, 28 Feb 2019 16:59:53 +0000</pubDate>
				<category><![CDATA[Cibersecurity]]></category>
		<category><![CDATA[Talent]]></category>
		<guid isPermaLink="false">https://thevalleytalent.es/2019/02/28/en-2022-europa-necesitara-350-000-perfiles-de-experto-en-ciberseguridad/</guid>

					<description><![CDATA[The lack of talent in cybersecurity increases the digital risks that companies are exposed to; is your company prepared? Qualified talent is essential to boost the cybersecurity sector Cybersecurity specialists can come from different academic disciplines; they don&#8217;t need to be engineers or systems experts Taking care of cybersecurity has become a key factor in [...]]]></description>
										<content:encoded><![CDATA[<p><strong>The lack of talent in cybersecurity increases the digital risks that companies are exposed to; is your company prepared?</strong></p>
<ul>
<li><strong>Qualified talent is essential to boost the cybersecurity sector</strong></li>
<li><strong>Cybersecurity specialists can come from different academic disciplines; they don&#8217;t need to be engineers or systems experts</strong></li>
<li><strong>Taking care of cybersecurity has become a key factor in brand reputation and user confidence</strong></li>
</ul>
<p>In 2017 alone, the <strong>CNN-CERT</strong> (Spanish Acronym for “Incident Response Centre of the National Cryptological Centre” at the CNI) dealt with 26,500 cyber incidents, which meant a 26.55% increase from 2016. This increase reflects the delicate situation in which companies find themselves and the pressure to protect both public and private entities from these types of online threats.</p>
<p>The cost of cybersecurity is increasing exponentially for companies. The rise of “cybercrime as a service” and the increase in hacking tools and services that were previously only accessible to a few have blurred the profile of the classic cybercriminal making it possible for virtually anyone, attracted by the high economic return and ease of cyberattacks, to have access to them. To make matters worse, the lack of qualified candidates in IT security is added to this situation. Companies are exposed to more risks since their control and response capacity is limited.</p>
<p>On February 20 we held an exclusive Cybersecurity breakfast event, and we had the pleasure of having Adolfo Hernández, deputy director and cofounder of <strong><a href="http://www.thiber.org/" target="_blank" rel="noopener noreferrer">THIBER</a></strong>, a cybersecurity think-tank research centre specialized in cyberspace protection, and Head of Advanced Cyber Defence at Sabadell Bank.</p>
<p>We focused on the topic of “How to make the most of the digital economy by managing corporate digital risks”. The conclusions we drew have defined the main trends and the challenges of the cybersecurity sector today:</p>
<ul>
<li><b>Identify, attract and retain talent</b></li>
</ul>
<p>One of the main challenges for companies when tackling cybersecurity threats is to first be able to identify, attract and retain talent. According to Adolfo Hernández, Spain is a specialized talent powerhouse in this area and has become a leading destination for cybersecurity offshoring. This is demonstrated by the creation of different cybersecurity hubs in large multinational companies and the existence of a growing regional business network that offers quality services at competitive prices.</p>
<p>According to a study by ISC2 (International Information System Security Certification Consortium), by 2022 there will be a shortage of 350,000 cybersecurity professionals in Europe. It has been stressed that extensive prior technical experience should not be a barrier to entry. In fact, not all cybersecurity profiles have to be engineers; other figures such as political scientists and criminologists are also required to help understand the motivation, economic model and profiles behind cyberattacks.</p>
<ul>
<li><strong>Confidence in CYBERSECURITY </strong></li>
</ul>
<p>Cybercrime is the fastest growing crime and has a huge impact on consumer confidence in the digital market, as Adolfo Hernández explained to us. Cybersecurity has become an essential factor in measuring the confidence consumers have in a company. The news that Moody’s is already studying how to build the cyber risk that a company has into business credit ratings is really driving home the fact that a cyberattack goes beyond being an economic problem; it can become a serious reputational problem.</p>
<ul>
<li><strong>Hyperconnectivity and Cybersecurity</strong></li>
</ul>
<p>Hyperconnectivity stands out as one of the biggest obstacles to cybersecurity. The Internet of things means that a cyberattack can affect several devices (mobile phones, Smart TVs, connected vehicles, security cameras&#8230;)</p>
<p>The digital population has increased by more than 366 million users in 2019 versus January last year. More than 3.2 billion people are active Internet users who don’t limit themselves to just one device; there are millions of objects connected through the Internet of Things (IoT). Therefore, the more connected we are, the more we are exposed to risks.</p>
<ul>
<li><strong>Disparity between those who protect and those who attack</strong></li>
</ul>
<p>The relationship between the cybersecurity professional and the cyber attacker is significantly imbalanced. Those in charge of protecting companies have to deal with different tasks on a daily basis that have nothing to do with the objective of defending against all possible attacks; such as dealing with audit departments, limited budgets, lack of corporate awareness, lack of specialised talent and regulatory compliance. On the other hand, the only task the attacker has is to find a vulnerability to attack: this is a complete imbalance. At <a href="https://thevalleytalent.es/en"><strong>The Valley Talent</strong></a>, we consider it essential that companies have the ability to identify qualified talent and integrate them correctly into their corporate structures. This way, they are better equipped to respond to cyberattacks.</p>
<p>Companies that attract and retain the best talent in this sector will develop cyber capabilities to securely face the digital challenge. The challenges at hand are to make cybercrime less profitable and combating it an even fight.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thevalleytalent.es/en/2019/02/28/europe-will-have-a-shortage-of-350-000-cybersecurity-expert-profiles-in-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are the most in-demand cybersecurity roles?</title>
		<link>https://thevalleytalent.es/en/2019/01/10/perfiles-ciberseguridad-mas-demandados/</link>
					<comments>https://thevalleytalent.es/en/2019/01/10/perfiles-ciberseguridad-mas-demandados/#respond</comments>
		
		<dc:creator><![CDATA[emartin]]></dc:creator>
		<pubDate>Thu, 10 Jan 2019 12:25:59 +0000</pubDate>
				<category><![CDATA[Cibersecurity]]></category>
		<guid isPermaLink="false">https://thevalleytalent.es/2019/01/10/perfiles-ciberseguridad-mas-demandados/</guid>

					<description><![CDATA[Proactive, results-oriented, cross-cutting professionals with great analytical skills. We explain the procedure the HR department needs to follow to integrate a plan that minimises the risks and the impact of a security incident. The latest Risk Report from the World Economic Forum ranked cyberattacks and data theft as two of the five main risks. According [...]]]></description>
										<content:encoded><![CDATA[
<ul class="wp-block-list">
<li><strong>Proactive, results-oriented, cross-cutting professionals with great analytical skills.</strong></li>
<li><strong style="font-size: 14.4px;">We explain the procedure the HR department needs to follow to integrate a plan that minimises the risks and the impact of a security incident.</strong></li>
</ul>



<p>The latest Risk Report from the World Economic Forum ranked cyberattacks and data theft as two of the five main risks. According to this report, the cost of cybercrime to companies in the next five years could reach 8 billion dollars.</p>
<p>Every entity that has an online presence, generates information through its business activity, or whose systems are hosted in the cloud is exposed. Luckily, organizations are beginning to realise the need to develop a plan that minimizes the risks and impact of a security incident. The enormous repercussions of events like the one that happened last year with the ransomware “Wannacry” macro attack have set off alarm bells.</p>
<p>Cybersecurity profiles are playing a fundamental role in organizations and are supporting the creation of new teams from managerial positions.</p>



<p><strong>Among others, the most in-demand cybersecurity positions are: Ethical hacker, CISO, CSO and DPO</strong>. Different types of professionals responsible for managing this issue are:</p>



<ul class="wp-block-list">
<li>
<p><strong>CISO (Chief Information Security Officer):</strong> Responsible for aligning the cybersecurity strategy with the company&#8217;s objectives. In charge of establishing security policies based on the activity of the company and setting up the necessary measures and controls.</p>
</li>
</ul>



<ul class="wp-block-list">
<li><strong>CSO (Chief Security Officer):</strong> Responsible for the internal security of the organization. Establishes continuity plans, has a complete vision of the business, is up to date with regulatory changes, knows the possible risks in cybersecurity, etc..</li>
</ul>



<ul class="wp-block-list">
<li>
<p><strong>DPO (Data Protection Officer):</strong> Has a legal and regulatory compliance profile and, according to the new European Data Protection regulations, will be a mandatory position in Public Organisations and in certain private companies.</p>
</li>
<li>
<p><strong>Security Analyst:</strong> In charge of detecting any possible technical vulnerabilities in the company&#8217;s computer systems and networks.</p>
<p><strong>Security Architect:</strong> Responsible for designing the prior cybersecurity architecture to ensure all developments in the environment are secure.</p>
</li>
<li>
<p><strong>Ethical hacker:</strong> Up to date on the techniques used by cybercriminals. Tests companies&#8217; security systems to analyse potential hazards and thus solve them.</p>
</li>
<li>
<p><strong>Forensic Specialist:</strong> Specialises in performing thorough postmortem analyses of systems and networks after a security or cyber-attack incident.</p>
</li>
<li>
<p><strong>Incident Specialist:</strong> Responsible for coordinating activities should security incidents occur and is responsible for activating the control plan so that the teams work in alignment and that incidents have the least possible impact.</p>
</li>
<li>
<p><strong>Head of intelligence:</strong> Expert in detecting and analysing external threats to protect the company&#8217;s reputatio</p>
</li>
</ul>



<p><strong>What skills are necessary?</strong> Although the skills will vary, generally speaking, we can say that cross-cutting knowledge, great analytical skills, and knowing how to work under pressure are required. At the technical level, they must be able to draw up plans to safeguard computer files; be proficient in the management of different operating systems, networks and programming languages; implement cryptographic protocols and security tools; analyse and detect threats and develop techniques to prevent them; know the current regulations and have a good command of malware analysis, among other capabilities.</p>
<p><strong>How can these profiles be integrated into the organization?</strong> Depending on the size of the company, these professionals will be integrated differently. If they are hired internally, they are usually placed in the IT, Systems and Cybersecurity or R&amp;D departments. However, they must always work closely with management and have a generalised approach that takes the other departments in the organization into account.</p>
<p><strong>Internal training is of high importance</strong>. According to the latest data, more than 90% of security breaches are caused by non-compliance of the protocols by staff. That&#8217;s exactly why certain basics that protect the security of the company must be put into place: the identity of anyone who requests information must be confirmed; strong passwords should be used; the saving of sensitive company information on hard disks should be avoided, the installation of programs from unknown sources should be prohibited, antiviruses on computers must always be updated&#8230;</p>
<p><strong>Take out a cyber insurance policy</strong>. Many insurers offer cyber risk insurance as a solution to possible threats. They usually cover both the damages to the company as well as the economic damages that may be caused to third parties or to the employees themselves. Of course, to be able to take one out, a certain level of security must already be in place.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thevalleytalent.es/en/2019/01/10/perfiles-ciberseguridad-mas-demandados/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
