Are we ready for the cyber employee? – Canadian Government Executive

NEWS

SEARCH

Security
October 5, 2012

Are we ready for the cyber employee?

In numerous interviews with senior military commanders over the past several years, Vanguard magazine has often posed the question: what does the future cyber warrior look like?

Militaries have been coming to terms with the cyber domain for some time now, securing their systems and seeking methods to exploit adversaries. But is the cyber solider different from the individual a military might normally recruit? Is he possibly more like Sheldon Cooper or any of his The Big Bang Theory cohort, exceptionally knowledgeable of the intricacies of the domain but more likely to ridicule his commanding officer for lacking a PhD than obediently following orders.    

Not exactly the ideal recruit but perhaps precisely the type of individual cyber operations require.

Winn Schwartau, a leading authority on all things cyber, raised the issue at the opening of the 3rd annual Privacy, Access and Security Congress in Ottawa on Thursday morning. His focus was not the military, but rather the larger public and private sectors. He noted the recent calls by Homeland Security Secretary Janet Napolitano and a U.K. parliamentary committee for more cyber security professionals. Even the director of the National Security Agency, in a rare appearance at DEFCON, asked the hacking community to get more involved.

Schwartau wondered, though, whether both sectors are ready to hire the types of individuals who might be best suited for this type of work. In short, do we have discriminatory hiring practices? he asked.

Because there is currently a difference between the needed skill sets and the ability of many organizations to successfully integrate those into their culture. With so much emphasis placed on degrees and professional certification, is your office ready for someone like Lisbeth Salander?

“Skills should come first,” he said, and the formal education second. “We need to stop finding reasons not to hire.”

That also means being more accepting of failure. In a domain that requires a willingness to experiment to problem-solve, teaching and embracing failure are critical.

So, what does the cyber warrior look like? In an interview in 2009, Lieutenant-Colonel David Gosselin, then the commandant of the Canadian Forces School of Communications and Electronics, summed up a warrior as: “someone who understands the intricacies of their weapon system in service to others. This means that a warrior understands the capabilities and vulnerabilities of their weapon system, and is capable of executing a plan that ensures that they prevail and overcome any threat or limitation of the weapon system in service to society.” (You can read the article at http://www.vanguardcanada.com/NetOpsWarriorThatcher)

The Congress continues today at the Westin Ottawa.

About this author

0 comments

There are no comments for this post yet.

Be the first to comment. Click here.

Security
 
Earlier this month I had the privilege of testifying as an...
 
Canadian Government Executive Media, (CGE) publisher of Canadian Government Executive magazine...
 
In the last few years, we’ve seen various federal governments warning...
 
Canadian Government Executive is excited to announce the agenda for TechGov...
 
In the wake of the WannaCry outbreak, corporate executives, IT professionals,...
 
Facebook Pages can be an essential tool for businesses and charities,...
 
Cybersecurity professionals have sounded the alarm for years, and they are...
 
CBC deserves full credit for exposing the presence of IMSI catchers...
 
Security professionals have an obligation to communicate risks and recommendations to...
 
Over the decades, technology has been grafted into governments around the...
 
In this episode, J. Richard Jones talks about being candid about...
 
Criminals have reportedly threatened to take over 250 million Apple accounts...
 
In this episode, hear more about how Canada is a prime...
 
While the incoming administration of President-elect Donald Trump is being buffeted...
 
In the world that we are living in today, free and...
 
The RCMP adopted a new media strategy earlier this month by...
 
What would tomorrow’s cybersecurity look like? That’s an intriguing question to...
 
Terrorism operates with deadly regularity. In June 2016, a gunman who...
 
Just as the federal government has begun consultations on cyber security,...
 
Efforts by the government to counter the radicalization of young Canadians...
 
Canadian healthcare organizations and businesses in the financial industry are the...
 
Please to view this Content. (Not a member? Join Today! )...
 
Please to view this Content. (Not a member? Join Today! )...
 
Please to view this Content. (Not a member? Join Today! )...
 
Please to view this Content. (Not a member? Join Today! )...
 
Please to view this Content. (Not a member? Join Today! )...
 
The challenge is clear: a fast-paced industry pressures organizations to simultaneously...
 
As populations grow and age, the demand for services increases. As...
 
By Michael Murphy Not all assets can and should be equally...
 
Please to view this Content. (Not a member? Join Today! )...
 
Please to view this Content. (Not a member? Join Today! )...
 
Now more than ever, organizations in both the public and private...
 
Please to view this Content. (Not a member? Join Today! )...
 
Please to view this Content. (Not a member? Join Today! )...
 
Please to view this Content. (Not a member? Join Today! )...
 
Please to view this Content. (Not a member? Join Today! )...
 
As the battle between the FBI and Apple continues to escalate,...
 
Please to view this Content. (Not a member? Join Today! )...
 
Meet Bob Heart.  He is an outstanding employee who works hard...
 
A new study released yesterday, Securing the C-Suite, Cybersecurity Perspectives from...
 
Please to view this Content. (Not a member? Join Today! )...
 
Please to view this Content. (Not a member? Join Today! )...
 
Yesterday, Ontario Supreme Court Justice John Sproat ruled that the Peel...
 
I wrote about accountability more than a year ago. Recently, a...
 
Intelligence agencies have had widespread and long-running programs to gather, analyze...
 
What concerns me is whether or not we’ve got the balance...
 
One of the consequences of the Information Age in which we...
 
In March of 2011, the east coast of Japan was rocked...
 
BYOD is hot! But is it for you? If yes, which...
 
Protecting critical infrastructure from cyber threats is the shared responsibility of...
 
In numerous interviews with senior military commanders over the past several...
 
In early February, James R. Clapper, the U.S. director of national...
 
The widespread adoption of mobile devices as enterprise-level tools is occurring...
 
CGE Vol.13 No.2 February 2007 Public security, once a task relegated...
 
CGE Vol. 14 No.4 April 2008 In recent years, policy makers...
 
L’univers de la sécurité des TI évolue rapidement. À mesure que...
 
The world of IT security is rapidly evolving. As quickly as...
 
Cyber attacks don’t have to look highly sophisticated. Hackers are purposely...
 
The announcement regarding the establishment of Shared Services Canada (SSC) was...
 
There was probably a day in spring of AD 72 that...
 
The changing face of public and personal privacy in the face...
 
What role should governments and public servants play in safeguarding personal...
 
Some title Some author
Some excerpt
 
Some title Some author
Some excerpt
Earlier this month I had the privilege of testifying as an...

Member Login

Forgot Password?

Join Us

Password Reset
Please enter your e-mail address. You will receive a new password via e-mail.