Home Security Australia needs 19,000 security professionals by 2019

 The Australian Government is strugglling to on-board cyber security specialists, with 19,000 needed urgently by next year, according to an opposition cyber security spokesperson.

Giving the keynote address at the recent ISACA 'CACS' Conference in Melbourne, Gai Brodtmann, Shadow Assistant Minister for Cyber Security and Defence, had some interesting remarks in relation to the difficulty in obtaining and retaining cyber security expertise, particularly in government roles.

Brodtmann commenced her remarks with the observation, "In Australia, we will need 19,000 cyber security professionals by next year. We need cyber security experts yesterday and we need them in a broad range of skills, from coders to policy makers. So, how do we get them quick-smart?

"We need to think creatively and we need to think laterally. We need to learn from other nations. We need to think about compressing undergraduate degrees into two years which will include industry experience, again some other nations are considering that. We need to think about intensive degrees, where the students study throughout the year with no break, completing the degree in 12 months.

"We need to think about pathway degrees and diplomas and certificates that can be completed in a summer school. We need to think about pathways through primary and secondary school for cybersecurity careers, identifying talent early and fostering and nurturing it through the education process – this is being seen in Western Australia and in Israel."

But there are bigger issues, particularly around security clearance which (as she observes) can take as long as two years to complete.

Brodtmann continued, "We need to think about managing the security risk of newcomers who are awaiting their positive vet [security vetting to 'Secret' 'Top Secret' etc.], getting them into the workforce, but keeping them on less sensitive work until they are cleared or graduating them up the scale as their positive vet progresses, and again this is something the US is looking at, at the moment.

"We need to think about starting the positive vetting process during high school and TAFE or university, so graduates aren't stretching a living together through a series of part-time jobs for two years while they're waiting for their clearance. And quite often they pull out of the system because two years is a long time to wait."

Indeed. Why would anyone good enough to do the job for government wait two years before they can actually do the work. Private industry beckons; with much higher salaries too.

The author attended the conference as a guest of the organisers.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect