Last one
Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-03-20 00:00:00 |
Pourquoi vous devez planifier le pire de la cybersécurité Why you need to plan for the worst in cybersecurity (lien direct) |
Nous avons parlé à Jacqueline Kehoe de la cyber-paysage de l'Irlande et de la façon dont les organisations peuvent adopter la mise à niveau.
Le directeur de Cyber Skills de Munster Technological University (MTU), l'exposition initiale de Jacqueline Kehoe \\ à l'informatique et aux ordinateurs pendant ses études, bien que brève, lui a suffi pour lui faire le désir de construire une carrière dans le domaine. Alors qu'elle naviguait sur son propre voyage professionnel, elle a rapidement eu l'occasion de donner aux autres les compétences qui l'avaient aidée.
"J'ai [eu] une longue carrière extrêmement enrichissante en tant qu'ingénieur logiciel", a déclaré Kehoe à SiliconRepublic.com. «J'ai rejoint MTU il y a huit ans en tant que chercheur de logiciel travaillant sur des projets de l'industrie et lorsque le rôle de gérer une initiative éducative pour créer des cours de cybersécurité s'est présenté, c'était une excellente occasion pour moi d'utiliser mon expérience technique de l'industrie pour créer des cours de cybersécurité pour les personnes sur le lieu de travail.»
En ce qui concerne la préparation des étudiants et des professionnels pour une carrière dans l'espace de cybersécurité, elle a noté qu'il était important de faire le point sur le paysage actuel. Beaucoup de choses ont changé ces dernières années, dans cette prévention, bien que toujours cruciale, n'est plus le seul objectif des efforts d'une entreprise pour se protéger. Au contraire, le succès dans le cyber commence par vous et votre organisation adaptable et prête à résoudre les problèmes.
«La cybersécurité est maintenant devenue beaucoup plus sur la résilience et la capacité de se remettre d'une attaque que de prévention. Bien que nous devons encore mettre beaucoup de travail en défense, nous devons nous assurer que nous avons une sauvegarde en cas d'incident. Comme ils disent, l'attaquant ne doit avoir raison qu'une fois, le défenseur doit avoir raison tout le temps.»
Avenir du cyber
«Presque tout le monde a été victime d'une sorte d'attaque ou d'escroquerie à ce stade. Au cours des quatre dernières années dans ce secteur, nous avons vu une prise de conscience accrue de la nécessité d'un upskilling, qui montre les campagnes du NCSC [National Cyber Security Center] et d'autres travaillent.
«Le financement du gouvernement pour soutenir davantage la mise en œuvre et les campagnes pour sensibiliser à la sensibilisation à se poursuivre. Les réglementations à venir telles que NIS2 et Dora obligent les gens à développer leurs compétences et leurs compétences en personnel.»
Pour les professionnels qualifiés en cybersécurité, il y a un certain nombre de voies de carrière à emprunter, comme Kehoe l'a noté. La cybersécurité et la sensibilisation à la sécurité personnelle et professionnelle sont si vitales, presque tout le monde a un certain niveau d'expérience. Pour le techniquement compétent, il existe des opportunités dans le réseautage informatique, l'ingénierie, la sécurité du cloud, les tests de pénétration, la réponse aux incidents, le CISO et plus encore.
Pour les non techniques, il existe des rôles de cybersécurité tout aussi passionnants dans des domaines tels que la gestion des risques, le juridique, la communication et l'éducation, pour n'en nommer que quelques-uns. "Le cadre Nistnice définit 52 rôles et ce n'est probablement pas tous", a-t-elle déclaré.
Le paysage actuel se prête à une culture d'apprentissage et de mise à jour. Selon Kehoe, traditionnellement le chemin vers une carrière dans le cyber a impliqué un diplôme informatique, puis un diplôme de troisième cycle ou de maîtrise en cybersécurité. Cependant, conformément à l'évolution des idéaux autour de l'éducation et de la progression de carrière, les micro-crédités et les voies alternatives peuvent offrir un moyen unique de renverser dans des domaines spécifiques, par exemple dans les cyber réglementation.
«Ceux-ci sont livrés en ligne et le so |
Cloud
Technical
|
|
★★★
|
 |
2025-01-07 00:00:00 |
Cyber Skills Award Winner: Systems Architecture Security, Dean Mitchell (lien direct) |
The Munster Technological University Faculty of Engineering & Science Awards recognise and celebrate students who have shown academic excellence throughout the year. This year, Cyber Skills honours four students who excelled in their chosen pathway.
One of those four students is Dean Mitchell who shares his experience of studying Systems Architecture Security with Cyber Skills and the value of the pathway to him both personally and professionally.
"I started with Hewlett Packard Enterprise as a regular Level 1 technical support.
At this time, i am an Infrastructure Engineer supporting Cyber Security applications and process.
I\'ve been in this role for over 7 years now.
My company regularly encourages and helps employees to expand knowledge through various service and methods.
Ordinarily, i would not be able to avail of these learning opportunities, due to workload and family life responsibilities.
The once a week evening time courses, along with self paced learning offered allowed me to benefit from these online courses.
This course allowed me to visualize and verbalize the services i support from an infrastructure security standpoint rather than the usual service flow or operations support viewpoint.
Some key examples:
Understanding why a certain cryptographic protocol is \'better\' than another in specific use cases and why protocols become obsolete.
Choosing which security standards to follow and breadown of the sections to help focus on each area when needed.
Designing and planning the security diagram and security strategy for a theoretical cloud based service.
When reviewing new services to be supported or developed, the knowledge gained will help me highlight gaps in the security design, along with the ability to explain why the gap exists
I would advise anyone looking to apply to a course, to check in on the timing and scheduling, it could surprise you with how accessible these courses can be, even to people with a loaded schedule."
The Munster Technological University Faculty of Engineering & Science Awards recognise and celebrate students who have shown academic excellence throughout the year. This year, Cyber Skills honours four students who excelled in their chosen pathway.
One of those four students is Dean Mitchell who shares his experience of studying Systems Architecture Security with Cyber Skills and the value of the pathway to him both personally and professionally.
"I started with Hewlett Packard Enterprise as a regular Level 1 technical support.
At this time, i am an Infrastructure Engineer supporting Cyber Security applications and process.
I\'ve been in this role for over 7 years now.
My company regularly encourages and helps employees to expand knowledge through various service and methods.
Ordinarily, i would not be able to avail of these learning opportunities, due to workload and family life responsibilities.
The once a week evening time courses, along with self paced learning offered allowed me to benefit from these online courses.
This course allowed me to visualize and verbalize the services i support from an infrastructure security standpoint rather than the usual service flow or operations support viewpoint.
Some key examples:
Understanding why a certain cryptographic protocol is \'better\' than another in specific use cases and why protocols become obsolete.
Choosing which security standards to follow and breadown of the sections to help focus on each area when needed.
Designing and planning the security diagram and security strategy for a theoretical cloud based service.
When reviewing new services to be supported or developed, the knowledge gained will help me highlight gaps in the security design, along with the ability to explain why the gap exists
I would advise anyone looking to apply to a course, to check in on the timing and scheduling, it could surprise you with how accessible these courses can be, even to people with a loaded schedule."
|
Cloud
Technical
|
|
★★★
|
 |
2024-12-13 00:00:00 |
Cyber Skills Award Winner: Secure Network Operations, Garrett Downey (lien direct) |
The Munster Technological University Faculty of Engineering & Science Awards recognise and celebrate students who have shown academic excellence throughout the year. This year, Cyber Skills honours four students who excelled in their chosen pathway.
One of those four students is Garrett Downey who shares his experience of studying Secure Network Operations with Cyber Skills and the value of the pathway to him both personally and professionally.
"With a strong background in Technical Support, I decided to pivot into cybersecurity to help protect modern infrastructures from modern evolving threats. I discovered Cyber Skills through NewsTalk radio, and after exploring the course offerings, I found that the Secure Network Operations pathway perfectly aligned with my career goals and interests.
The course\'s modules - covering risk management, securing network services, implementing firewalls and IDS/IPS, and expert log analysis - offered exactly the knowledge and skills I needed to make this shift. The online distance learning format was ideal for balancing my studies with other commitments.
One of the standout features of the course was the access to the Cyber Range, where I could put theory into practice, honing my skills in a safe, simulated environment. This hands-on experience was invaluable in solidifying my understanding of the concepts taught, and building confidence in applying them to real-world scenarios.
Completing the Secure Network Operations course has already positively impacted my career. Motivated by this success, I have since started an MSc in Cybersecurity at MTU to deepen my expertise further and continue advancing in the information security field. This journey has been transformative, reinforcing my passion for cybersecurity and my commitment to safeguarding today\'s digital landscapes."
The Munster Technological University Faculty of Engineering & Science Awards recognise and celebrate students who have shown academic excellence throughout the year. This year, Cyber Skills honours four students who excelled in their chosen pathway.
One of those four students is Garrett Downey who shares his experience of studying Secure Network Operations with Cyber Skills and the value of the pathway to him both personally and professionally.
"With a strong background in Technical Support, I decided to pivot into cybersecurity to help protect modern infrastructures from modern evolving threats. I discovered Cyber Skills through NewsTalk radio, and after exploring the course offerings, I found that the Secure Network Operations pathway perfectly aligned with my career goals and interests.
The course\'s modules - covering risk management, securing network services, implementing firewalls and IDS/IPS, and expert log analysis - offered exactly the knowledge and skills I needed to make this shift. The online distance learning format was ideal for balancing my studies with other commitments.
One of the standout features of the course was the access to the Cyber Range, where I could put theory into practice, honing my skills in a safe, simulated environment. This hands-on experience was invaluable in solidifying my understanding of the concepts taught, and building confidence in applying them to real-world scenarios.
Completing the Secure Network Operations course has already positively impacted my career. Motivated by this success, I have since started an MSc in Cybersecurity at MTU to deepen my expertise further and continue advancing in the information security field. This journey has been transformative, reinforcing my passion for cybersecurity and my commitment to safeguarding today\'s digital landscapes."
|
Studies
Technical
|
|
★★
|
 |
2024-10-10 00:00:00 |
L'équipe de cyber compétences contribue à un nouveau livre blanc sur le développement du scénario d'exercice de cybersécurité Cyber Skills Team Contributes to New Whitepaper on Cyber Security Exercise Scenario Development (lien direct) |
A new whitepaper on "Cyber Exercise Scenarios" has been published by the European Cyber Security Organisation (ECSO). This publication offers an invaluable resource for professionals developing cyber attack scenarios in cyber ranges, providing a structured and unified approach to these exercises.
The whitepaper was spearheaded by ECSO\'s Working Group 5 (WG5) on Skills & Human Factors, with key leadership from Nina Olesen and Arnaud de Vibraye. Special recognition goes to WG5 chairs Csaba Virág and Matteo Merialdo, who were instrumental in driving this initiative forward.
Cyber Ireland, along with the Cyber Skills project team, including Donna O\'Shea, George O\'Mahony, Dean Brennan, and Anila Mjeda, played a significant role in providing technical contributions to the whitepaper. Additionally, insights from Research Ireland\'s National Challenge Fund Cyber Shock project, co-led by Tom Newe, were instrumental in shaping the content of the publication.
You can download the Cyber Exercise Scenarios here New Whitepaper on Cyber Security Exercise Scenario Development
A new whitepaper on "Cyber Exercise Scenarios" has been published by the European Cyber Security Organisation (ECSO). This publication offers an invaluable resource for professionals developing cyber attack scenarios in cyber ranges, providing a structured and unified approach to these exercises.
The whitepaper was spearheaded by ECSO\'s Working Group 5 (WG5) on Skills & Human Factors, with key leadership from Nina Olesen and Arnaud de Vibraye. Special recognition goes to WG5 chairs Csaba Virág and Matteo Merialdo, who were instrumental in driving this initiative forward.
Cyber Ireland, along with the Cyber Skills project team, including Donna O\'Shea, George O\'Mahony, Dean Brennan, and Anila Mjeda, played a significant role in providing technical contributions to the whitepaper. Additionally, insights from Research Ireland\'s National Challenge Fund Cyber Shock project, co-led by Tom Newe, were instrumental in shaping the content of the publication.
You can download the Cyber Exercise Scenarios here New Whitepaper on Cyber Security Exercise Scenario Development
|
Technical
|
|
★★★
|
 |
2024-10-07 00:00:00 |
Appliquer maintenant: bourse de doctorat entièrement financée en cybersécurité et IA centrée sur l'homme Apply Now: Fully Funded PhD Scholarship in Cybersecurity and Human-Centred AI (lien direct) |
Nous invitons les applications à un projet de doctorat à 4 ans entièrement financé en tant que programme d'études à temps plein.Ce doctorat «XAI centré sur l'homme pour la cybersécurité pour une cyber-résidence améliorée (Cyber for Humans)» est financé par la MTU soutenue par le financement de TU Rise.
MTU désigné groupe de recherche Cyber Explore \'s Mission de «mélanger en toute sécurité le monde numérique avec le monde physique, protéger tout le monde et rendre les systèmes plus résilients aux cyberattaques en favorisant les compétences, la recherche et l'innovation», établit la vision et informe la directionde ce projet de recherche proposé.Alignement sur cette mission, la conception d'explications des modèles d'intelligence artificielle (IA) qui surveillent, analysent et répond aux cyber-menaces, anomalies et attaques en temps réel dans le but de rendre les systèmes plus résilients aux cyberattaques, est un domaine thématique majeur pour le cyber-cyberExplorer.Dans ce domaine thématique, l'un des principaux défis est la façon dont nous concevons des explications qui fournissent des informations techniques sur le fonctionnement des modèles d'IA mais sont également centrés sur l'homme, conduisant à une plus grande intelligence et à l'acceptation finale de l'utilisateur final et à la confiance.'Shea George O \' Mahony Dr Fred CreedonFunding: Le financement des bourses est libre d'impôt et comprend le paiement des frais de doctorat universitaire (UE ou non-UE) et une allocation étudiante à un rythme forfaitaire de & euro; 25 000 par an qui est tenable pour4 ans. Pour postuler: veuillez envoyer un seul fichier PDF composé de ce qui suit à info@cyberskills.ie avec \\ 'tU Rise PhD Application \' dans le sujet Sujet: 1.CV / Curriculum Vitae (CV), y compris: o Éducation Historyo Skills de compétence pertinents Projets / publications 2.Une lettre de motivation (2 pages max) comprenant une description des intérêts de recherche du demandeur, des raisons de postuler pour le poste.La lettre de motivation doit clairement indiquer comment le profil et les compétences du demandeur correspondent aux exigences de cette position de doctorat.Copies numérisées des transcriptions académiques pertinentes et des certificats de langue anglaise 4.Un minimum de deux lettres de recommandation et / ou coordonnées pour les arbitres.
We invite applications for a fully funded 4-year PhD project as a full-time programme of study. This PhD “Human Centred XAI for Cyber Security for Enhanced Cyber Resilience (Cyber for Humans)” is funded by MTU supported by TU RISE funding.
MTU designated research group Cyber Explore\'s mission to “securely blend the digital world with the physical world, protecting everyone and making systems more resilient to cyber-attacks by fostering skills, research and innovation”, sets the vision and informs the direction of this proposed research project. Aligned to this mission, designing explanations for Artificial Intelligence (AI) models that monitor, analyse and respond to cyber threats, anomalies and attacks in real time with the aim of making systems more resilient to cyber-attacks, is a major thematic area for Cyber Explore. Within this thematic area, one of the key challenges is how we design explanations that provide technical insights into the operation of the AI models but are also human centred, leading to greater intelligence and increasing end user acceptance and trust.Supervisors: Donna O\'Shea George O\'Mahony Dr Fred CreedonFunding: The scholarship funding is tax free and includes payment of University PhD fees (EU or non-EU) and a student stipend at a flat rate of €25,000 per annum which is tenable for 4 years.To Apply:Please send a single PDF file consisting of the following to info@cyberskills.ie with \'TU RISE PhD Application\' in the subject heading:1. Resume/Curriculum Vitae (CV), including:o Education Historyo Relevant skillso Research projects/publications2. |
Studies
Technical
|
|
★★
|
 |
2024-09-27 00:00:00 |
Dr Donna O \\ 'Shea nominé pour STEM Woman of the Year Award 2024 Dr. Donna O\\'Shea Nominated for STEM Woman of the Year Award 2024 (lien direct) |
Nous sommes ravis d'annoncer que le Dr Donna O \\ 'Shea, président de la cybersécurité à l'Université technologique de Munster (MTU) et le chef de projet à Cyber Skills, a été nominé pour le prix très estimé STEM Woman of the Year Award at the Women in STEMAwards 2024. Cette reconnaissance célèbre ses contributions exceptionnelles au paysage de la cybersécurité de l'Irlande et son dévouement à favoriser une plus grande diversité dans les champs STEM.
La cérémonie de remise des prix des femmes en STEM aura lieu le 24 octobre à 18h30, dans la salle des rondes de Mansion House, Dublin.Il est garanti d'être une nuit d'inspiration, célébrant les femmes qui façonnent l'avenir de la science, de la technologie, de l'ingénierie et des mathématiques (STEM) en Irlande.
En tant que l'un des moteurs du projet Cyber Explore à MTU, Donna dirige des initiatives qui jouent un rôle crucial dans l'amélioration de la sécurité numérique de l'Irlande et fortifier la résilience de son infrastructure critique.Cyber Explore se concentre sur les défis de la cybersécurité à toutes les étapes du développement technologique, garantissant que l'Irlande reste un leader dans le paysage mondial de la cybersécurité.
Déjà reconnu comme un leader d'opinion dans le secteur de la technologie, Donna a eu un impact durable non seulement grâce à son expertise technique, mais aussi par son engagement à accroître la représentation des femmes et des membres de la communauté LGBTQ + en STEM.
Les femmes des STEM Awards 2024 sont un événement qui met en évidence et honore les réalisations remarquables des femmes qui ont un impact profond dans les domaines STEM à travers l'Irlande.Les prix servent de plate-forme pour présenter les innovations et les percées, tout en inspirant la prochaine génération de femmes et d'innovateurs.En célébrant leurs réussites, l'événement vise à encourager les jeunes filles et les femmes à poursuivre leurs passions en STEM, en décomposant les barrières et les contributions makemendulaires aux champs souhaités.Les prix sont ouverts à un large éventail d'organisations, d'entreprises et d'établissements d'enseignement dans tous les secteurs, offrant une vaste étape pour divers talents et idées.
Nous vous invitons à faire partie de cette célébration spéciale.Rejoignez-nous alors que nous honorons Donna et toutes les femmes exceptionnelles qui façonnent l'avenir des STEM en Irlande.Vous pouvez vous inscrire à l'événement et montrer votre support en vous inscrivant ici.
Chez Cyber Skills, nous sommes incroyablement fiers des réalisations de Donna et de la possibilité d'amplifier sa voix au sein de l'industrie.Nous restons déterminés à construire un avenir plus inclusif et diversifié pour tous.
We are thrilled to announce that Dr. Donna O\'Shea, Chair of Cybersecurity at Munster Technological University (MTU) and Project Lead at Cyber Skills, has been nominated for the highly esteemed STEM Woman of the Year Award at the Women in STEM Awards 2024. This recognition celebrates her outstanding contributions to Ireland\'s cybersecurity landscape and her dedication to fostering greater diversity within the STEM fields.
The Women in STEM Awards ceremony will be held on October 24th at 6:30pm, in the Round Room at Mansion House, Dublin. It is guaranteed to be a night of inspiration, celebrating the women who are shaping the future of science, technology, engineering, and mathematics (STEM) in Ireland.
As one of the driving forces behind the Cyber Explore project at MTU, Donna leads initiatives that play a crucial role in enhancing Ireland\'s digital security and fortifying the resilience of its critical infrastructure. Cyber Explore focuses on tackling cybersecurity challenges across all stages of technological development, ensuring that Ireland remains a leader in the global cybersecurity landscape.
Already recognized as a thought leader in the tech sector, Donna has made a lasting impact not only through her tec |
Technical
|
|
★★
|
 |
2024-05-02 00:00:00 |
Cyber Skills nommés pour quatre prix européens de blogueur en cybersécurité. Cyber Skills Nominated for Four European Cyber Security Blogger Awards. (lien direct) |
Nous sommes ravis de partager que Cyber Skills a été nominé pour quatre catégories dans les European Cyber Security Blogger Awards!C'est un honneur d'être reconnu parmi ces professionnels et influenceurs de la cybersécurité estimés.Voici les catégories où nous avons été nominés:
Le prix visionnaire de la meilleure utilisation des médias alternatifs: cette catégorie reconnaît les utilisations innovantes et créatives des médias en cybersécurité.Consultez nos dernières nouvelles et mises à jour sur notre page d'actualités.
Le prix Techie du meilleur vlog / podcast / blog pour les professionnels de la sécurité technique: ce prix célèbre ceux qui fournissent des informations techniques précieuses.Explorez notre contenu sur la page des nouvelles.
Le Career Guide Award du meilleur blog / podcast / vlog pour naviguer dans une carrière dans la cybersécurité: nous sommes passionnés par le guidage de professionnels de la cybersécurité en herbe.Visitez notre page de blog pour voir comment nous aidons à façonner les carrières en cybersécurité.
Nous sommes également ravis que notre initiative Cyber Futures ait reçu une nomination dans la catégorie Guide de carrière.Cette initiative est conçue pour aider les élèves du secondaire à découvrir et à naviguer dans leur carrière dans la cybersécurité.Consultez notre page Nominée Cyber Futures pour en savoir plus sur ce projet passionnant.
Les European Cyber Security Blogger Awards, parrainés par Coro, KnowBe4, et Keeper Security, et alimentés par Eskenzi PR, sont un événement annuel qui honore le meilleur de la création de contenu de cybersécurité.Les gagnants seront annoncés lors d'une cérémonie de remise des prix spéciaux au restaurant Tapa Tapa lors de la deuxième soirée d'Europe Infoscurity, qui se déroule le 5 juin 2024 à partir de 17h30.
Maintenant que les nominations ont été recueillies, il est temps de voter pour vos favoris dans chaque catégorie.Le vote est ouvert jusqu'au 22 mai 2024. Après cela, les candidats se rendront tête à tête devant un panel de juges estimés, qui ajouteront leurs points en fonction de leurs favoris dans chaque catégorie.Les scores du public votes et juges seront ensuite combinés pour déterminer les gagnants.
Nous apprécierions vraiment votre soutien, veuillez voter en utilisant le lien suivant.Votre soutien signifie beaucoup pour nous et nous apprécions chaque vote.Félicitations à tous les autres candidats.Nous sommes ravis d'être dans une si grande entreprise et de souhaiter à tous la meilleure des chances.
We\'re excited to share that Cyber Skills has been nominated for four categories in the European Cyber Security Blogger Awards! It\'s an honour to be recognized among such esteemed cybersecurity professionals and influencers. Here are the categories where we\'ve been nominated:
The Visionary Award for Best Use of Alternative Media: This category recognizes innovative and creative uses of media in cybersecurity. Check out our latest news and updates on our news page.
The Techie Award for Best Vlog/Podcast/Blog For Technical Security Professionals: This award celebrates those who provide valuable technical insights. Explore our content on the news page.
The Career Guide Award for Best Blog/Podcast/Vlog for Navigating a Career in Cybersecurity: We\'re passionate about guiding aspiring cybersecurity professionals. Visit our blog page to see how we\'re helping to shape careers in cybersecurity.
We\'re also thrilled that our Cyber Futures initiative received a nomination in the Career Guide category. This initiative is designed to help secondary school students to discover and navigate their career paths in cybersecurity. Check out our Cyber Futures nominated page to learn more about this exciting project.
The European Cyber Security Blogger Awards, sponsored by Coro, KnowBe4, and Keeper Security, and powered by Eskenzi PR, is an annual event that honours the best in cybersecurity content creation. The winners wi |
Technical
|
|
★★
|
 |
2023-09-14 00:00:00 |
La petite idée avec un grand impact sur l'écart de talents de cybersécurité The Small Idea With a Big Impact on the Cybersecurity Talent Gap (lien direct) |
The cost of cybercrime is expected to reach $8 trillion globally this year, yet the scarcity of security talent is becoming more pronounced. With more than 750,000 cybersecurity positions unfilled in the U.S. and 3.5 million positions worldwide unfilled, the race is on to close the skills shortage that is estimated to contribute to 80% of all security breaches.
In 2022, cyberattacks increased by 38%. The global average cost of a data breach reached $4.35 million, while the average cost of a data breach in the U.S. reached $9.44 million, according to a report by IBM and the U.S.-based Ponemon Institute.
Bringing on more technical talent is central to companies in order to stop these threat actors. “Cybercrime can be very lucrative. And the reality is, talent is your best line of defense,” said Donna O\'Shea, chair of cybersecurity at Munster Technological University (MTU) in Cork, Ireland.
Easing the Talent Crunch With Bite-Sized Learning
As the digital economy evolves, more opportunities for malicious attacks are coming to the fore. Creative approaches aimed at increasing the pool of security professionals are emerging–and bringing down the barriers that once kept people from pursuing these lucrative roles.
“There has been a lot of progress made in terms of the way that we deliver cybersecurity education,” O\'Shea said.
Micro-credentials are small, accredited courses that allow candidates to pursue highly focused upskilling and reskilling that respond to niche labor market needs. Experts predict that lowering the time and costs involved in post-graduate studies will attract more learners and help address the cybersecurity talent scarcity.
In 2020, the Irish Universities Association (IUA) was awarded €12.3 million through the country\'s Department of Further and Higher Education to become the first European country to establish a national framework for nationally accredited micro-credentials.
“This is a real innovation in workforce development and lifelong learning,” says Aisling Soden, talent transformation & innovation manager for IDA Ireland. The cyberskills micro-credential programs are administered through academic institutes, co-designed by industry and, in time, will be transferrable across Europe. Because they are offered online, Soden also sees micro-credentials as a way to help companies upskill staff with specific cybersecurity skills to an international standard of education.
These highly specific cybersecurity short courses will also benefit companies looking to upskill internal staff or access new talent in 25+ critical areas such as network systems, security standards & risk, security architecture, malware, reverse engineering and more.
Soden envisions the micro-credential standards playing a bigger role on the global stage: “In the future, I can see these standards being recognized worldwide.”
Underrepresented Communities: An Untapped Resource
In 2022, Ireland was one of only a few countries to make headway in the quest to narrow cybersecurity talent shortages. Most regions around the world reported an increase in their cybersecurity workforce gap, according to a report by (ISC)², the world\'s leading cybersecurity professional organization. Last year, Ireland closed its cybersecurity skills gap by 19.5% while the global gap grew by 26.2%.
O\'Shea stressed the need to do a “much better job globally of reaching underrepresented populations to fill these open positions.” Especially now, she says, as micro-credentials bring down the cost, time commitments and previously required masters-level studies for training for cybersecurity jobs, opportunities must increase for women, military veterans, minority groups and people from financially disadvantaged communities. There\'s also an untapped market of individuals displaced from hospitality and other service sectors during the pandemic.
Society needs to do a better job of fostering cybersecurity talent across the entire hiring spectrum, said O\'Shea. This should start with thought-provoking conversa |
Data Breach
Malware
Threat
Studies
Prediction
Technical
|
|
★★
|
 |
2023-08-16 00:00:00 |
Réponses rapides aux questions rapides: Ivan Houlihan, SVP et chef de la côte ouest des États-Unis pour Ida Ireland Quick answers to Quick Questions: Ivan Houlihan, SVP & Head of West Coast U.S for IDA Ireland (lien direct) |
A slightly different conversation this week as we speak to Ivan Houlihan, Senior Vice President and Head of the West Coast of the United States for IDA Ireland–the Investment and Development Agency of the Irish Government, which promotes foreign direct investment into Ireland.
Based in California, Ivan leads the team that works closely with existing and potential clients in technology, financial services, life sciences and engineering throughout the Western US and Mexico.
We hope you enjoy this week\'s angle about on Cybersecurity, cyber skills and microcredentials.
M.R. Rangaswami: How Do Microcredentials Address the Cybersecurity Talent Scarcity Problem?
Ivan Houlihan: While nations pass resolutions and laws that try to prevent cybercrime, the most widespread answer is increasing the supply of expert security talent to stay ahead of the criminals.
Ivan Houlihan suggests an innovative approach, which involves the concept of microcredentials. These are small, accredited courses that allow candidates to pursue highly focused upskilling and reskilling that responds to specific market needs. Besides creating qualified new candidates to quickly come on board, this solution opens the door to workers that might otherwise not have pursued careers in cybersecurity.
As the head of the West Coast U.S. for IDA Ireland, Houlihan has seen an increasing number of American technology firms with operations in Ireland employ this strategy to address their cybersecurity talent crunch.
When it comes to microcredentials in cybersecurity, Houlihan believes that Ireland\'s innovative training programs can become a model for other nations seeking to address the serious issue of cybercrime, which is predicted to cost the world $10.5 trillion by 2025. In this quick Q&A, he explains the basics of setting up a microcredentials program in the cybersecurity space – although microcredentials can be earned in other technical areas, too.
M.R. Rangaswami: What are some of the current issues impacting cybersecurity staffing and why are microcredential programs a reasonable solution?
Ivan: Technology workers in general are often in short supply, but when it comes to qualified cybersecurity personnel, the problem is compounded by educational requirements along with needed specific skills that take time and money for those seeking to enter this field. Technical degrees, specialized training and often, often some graduate work, have discouraged many would-be candidates, particularly those put off by the prospect of student loans and related barriers. One of the biggest myths in the cybersecurity field is that it\'s just for people with high proficiency in math, men only or those with certain graduate degrees. People also assume they must go to renowned universities to study for the field in order to pursue such careers. All these factors have conspired to decrease the pool of qualified candidates.
Microcredential programs short-circuit the time and cost of pursuing a lucrative cybersecurity career, although the field does require some technical training as a starting point. Fortunately, being male, having graduate degrees and other assumptions don\'t apply, however. Microcredentials bring down the cost and time commitments while increasing cybersecurity job opportunities for women, military veterans, minority groups, people from financially disadvantaged backgrounds, workers from other departments and others previously not often found in the profession. And since microcredential programs are typically online, they are of short duration and can be “stacked” or combined to form bigger accreditations – this makes it easier to get the right kind of training for a promising new career. The most successful microcredential programs demonstrate a collaborative effort between universities, governments, research institutions and industry, with the latter providing curriculum input based on what the candidates need to know to hit the ground running.
M.R.: Describe the cybersecurity microcredential programs you\'re aware of, how t |
Studies
Technical
|
|
★★
|
 |
2023-03-24 00:00:00 |
Pourquoi les petites entreprises devraient apprendre les compétences nécessaires pour améliorer leur cybersécurité Why Small Businesses should Learn the Skills to Improve their Cybersecurity (lien direct) |
Comme présenté dans le Supplement Irish Independent Business Resilience
Toutes les entreprises courent un risque important de cyberattaque - y compris les PME.Cependant, ils peuvent se protéger avec la bonne formation et une approche de cybersécurité plus proactive.
La plupart des petites et moyennes entreprises (PME) ne sont que trop conscientes des risques de cyberattaque, note Donna O \\ 'Shea, présidente de la cybersécurité à Munster Technological University (MTU) et le chef de projet à Cyber Skills - un projet financé à l'échelle nationalequi vise à répondre à la pénurie de compétences en cybersécurité.
Les menaces de cybersécurité croissantes pour les PME
Selon le Cybersecurity Consortium Pmesec, 60% de toutes les cyberattaques en 2016 étaient destinées aux petites entreprises.Ce qui est de plus, 60% des PME qui ont été victimes d'attaques ne se sont pas rétablies et ont fermé dans les six mois.Malgré ces statistiques, les PME ne traitent pas toujours correctement les questions de cybersécurité - et pour diverses raisons.
«Certains propriétaires d'entreprise peuvent manquer de confiance et de capacités techniques pour répondre aux risques de cybersécurité», explique O \\ 'Shea.«D'autres minimisent le problème et demandent: \\ 'Qui essaierait de pirater mon entreprise de toute façon? \' Mais si leur base de données de clients \\ 'Informations personnelles subit une violation, c'est un problème majeur de conformité du RGPD.»
Il y a aussi beaucoup de dissonance cognitive entourant ce sujet, admet O \\ 'Shea.«Il y a une tendance à penser aux PME: \\ 'Oui, notre entreprise est en danger - mais nous allons l'oublier. \' Nous devons changer leur état d'esprit pour: \\ 'Oui, notre entreprise est en danger - mais nous pouvons y répondre correctement avec les bonnes compétences et la bonne formation. »
Retirer la mystique autour de la cybersécurité
Cyber Skills a développé la cybersécurité pour les entreprises - une série d'ateliers relatable livrée par des experts de l'industrie.Cela a été conçu pour fournir aux propriétaires d'entreprise les connaissances et les compétences clés pour se protéger contre les cyberattaques et supprimer une partie de la mystique entourant le sujet.
Être proactif sur la cybersécurité
Depuis trop longtemps, les entreprises ont adopté une approche \\ 'défensive et réactionnaire de la cybersécurité - avec des pare-feu, des systèmes de détection d'intrusion et des anti-virus faisant tout le gros du travail.Bien que ce soient toutes des mesures de sécurité importantes à avoir mis en place, au moment où un système réagit à une violation, les dommages ont déjà été causés.
«Au lieu de cela, nous exhortons les entreprises à adopter une approche prédictive et réactive de la cybersécurité», explique O \\ 'Shea.«Les ateliers les aident à identifier où se trouvent leurs plus grands risques d'attaque.Nous appliquons des modèles, des outils et des techniques bien connus et montrons aux PME comment créer un plan de réponse aux incidents et un plan de continuité des activités - adapté à leurs besoins - de sorte que, en cas d'attaque, ils peuvent se remettre en service aussi rapidement aussi rapidementcomme possible.En fin de compte, les entreprises doivent commencer à penser à la cybersécurité d'une manière plus structurée et proactive. »
Pour en savoir plus sur la façon de gérer votre cyber-risque, contactez-nous concernant votre intérêt pour la série des ateliers sur les petites entreprises.
As featured in the Irish Independent Business Resilience supplement
All businesses are at significant risk of cyberattack - including SMEs. However, they can protect themselves with the right training and a more proactive cybersecurity approach.
Most small and medium-sized enterprises (SMEs) are only too aware of the risks of cyberattack, notes Donna O\'Shea, Chair of Cybersecurity at Munster Technological University (MTU) and Project Lead at Cyber Skills - a n |
Hack
Tool
Technical
|
|
★★
|
 |
2023-03-02 00:00:00 |
La Cyber Security Academy est de retour pour 2023 - en ligne, gratuite et aucune connaissance préalable requise The Cyber Security Academy is Back for 2023 - Online, Free and No Prior Knowledge Required (lien direct) |
Thecyber Security Academy est de retour pour une autre année!Rejoignez-nous en ligne pour notre académie de cybersécurité gratuite de 5 jours.Ceci est ouvert aux étudiants de 16e et 5e et 5e année âgés de 16 ans ou plus.Convient aux étudiants débutants et avancés.
Quand: du lundi 12 au vendredi 16 juin 2023
Heure: 11h00 à 15h00
Où: en ligne
Sans coût
Enregistrez votre intérêt sur www.cyberfutures.ie/cyberacademy/
Les étudiants qui terminent le cours reçoivent un badge numérique.
Qui dispense le cours? La Cyber Security Academy andcyberfutures est des initiatives de Cyerskills Andcyber Ireland.Le cours sera dispensé par des professeurs du projet Cyberskills avec le soutien en laboratoire des étudiants de recherche ATCYBERSKILLS \\ 'Partner Institutes, Munster Technological University, University of Limerick et Technological University Dublin.
Pourquoi participer au cours? L'objectif global de l'Académie à encourager un intérêt et une sensibilisation à la sécurité de la sécurité par le biais de la formation technique.Vous n'avez pas besoin d'avoir un niveau de connaissances techniques, car les exercices sont conçus pour accueillir à la fois les débutants complets et les étudiants ayant des connaissances techniques existantes.La cybersécurité fait partie de la vie quotidienne et des affaires, et si vous poursuivez un choix universitaire menant à la cybersécurité ou non, nous espérons que vous apprécierez ce cours et qu'il vous servira bien dans le futur.
Opportunités en Irlande. Le secteur de la cybersécurité a employé 7 350 * personnes en Irlande en 2022. Ce nombre augmente tout le temps à mesure que les entreprises cherchent à se protéger et à répondre aux cyber-menaces en cours.Cela signifie également qu'il y a une pénurie de compétences.L'industrie de la cybersécurité travaille avec des établissements universitaires en Irlande pour faire face à cette pénurie de compétences et s'assurer qu'il y aura une nouvelle génération de professionnels formés capables d'empêcher et de répondre aux attaques contre les affaires et la société bien dans le futur.
Sujets abordés à l'académie
La cryptographycrycryptographie fait partie intégrante de notre monde en ligne.Les achats en ligne, la banque et la communication reposent tous sur la cryptographie pour travailler efficacement.Dans le cadre de ce cours, vous apprendrez comment fonctionne cette cryptographie et comment vous pouvez configurer le chiffrement pour protéger tous vos propres messages et communications.
Le piratage éthique du piratage est légalement pénétré par les ordinateurs et les appareils pour tester les défenses d'une organisation.Dans le cadre de ce cours, vous développerez l'état d'esprit des pirates éthiques en apprenant les principes fondamentaux de la programmation en ligne de commande, des cadres d'attaque, des tests de pénétration et plus encore.
Capture-the-FLAG EXERCICAPTURE-the-Flag est un environnement amusant et sûr pour apprendre ce que font les pirates et les outils qu'ils utilisent.C'est l'occasion de pratiquer les compétences que vous acquériez de l'Académie alors que vous faites face à une série de défis amusants, de plus en plus difficile, alors que vous essayez de gagner le plus de points.Plutôt qu'une course, ce style de gameplay encourage le temps à aborder les défis de manière nouvelle et intéressante.
Comment se joindre à nous qui prennent maintenant des expressions d'intérêt pour le cours.Pour vous inscrire, veuillez vous rendre sur www.cyberfutures.ie/cyberacademy/we sera ensuite en contact pour finaliser les places sur le parcours.
* État du secteur de la cybersécurité en Irlande 2022, Cyber Skills and Cyber Ireland
The Cyber Security Academy is back for another year! Join us online for our 5-day FREE Cyber Security Academy. This is open to all 4th and 5th year students aged 16 years or above. Suitable for beginner and advanced students.
When: Monday 12th to Friday 16th June 2023
Time: |
Tool
Technical
|
|
★★
|
 |
2022-12-19 00:00:00 |
Gagnant du prix Cyber Skills: Secure Systems Architecture, David O \\ 'Reilly, MasterCard Cyber Skills Award Winner: Secure Systems Architecture, David O\\'Reilly, Mastercard (lien direct) |
Les Munster Technological University Faculty of Engineering & Science Awards reconnaissent et célèbrent les étudiants qui ont fait preuve d'excellence académique tout au long de l'année.Pour la première fois cette année, Cyber Skills avait une catégorie, honorant trois étudiants qui ont excellé dans leur chemin choisi.
David partage son expérience de l'étude de l'architecture des systèmes sécurisés avec des cyber-compétences et de la valeur que la voie lui a fournie.
«J'ai commencé ma carrière dans un rôle de soutien opérationnel en garantissant que les applications sont restées accessibles et très disponibles.Lors du début de la voie des cyber-compétences, je travaillais dans un rôle d'architecte d'infrastructure / solution où j'ai travaillé sur la conception de solutions d'infrastructure / middleware pour de nombreux composants partagés et harnais chez MasterCard.
Récemment, j'ai participé à un nouveau rôle, directeur de l'architecture de la plate-forme système chez MasterCard, gérant une équipe mondiale de 10 architectes de conception d'infrastructure, tout en restant un directeur technique.
J'ai entendu parler des cyber-compétences grâce à une initiative au travail.Après avoir lu le prospectus, j'ai vraiment aimé le son des modules et du matériel couvert dans les différentes voies car ils seraient très pertinents pour mon rôle.La structure des voies et la nature en ligne des cours de cyber-compétences m'ont également appelé, ce qui permettrait une expérience d'éducation plus flexible.
La voie d'architecture du système sécurisé fournit une formation approfondie et des connaissances sur la façon de s'assurer que les solutions sont conçues / architectées avec des fondamentaux de sécurité au cœur.En tant que professionnel travaillant dans un rôle d'architecture d'infrastructure, cette voie a attiré mon attention, car cela me fournirait des connaissances et une expérience que je pourrais utiliser dans mon rôle quotidien.
Les connaissances et l'expérience que j'ai acquises en terminant le parcours des cyber-compétences offrira un impact positif sur ma carrière.Il m'a fourni les principes fondamentaux de l'architecture du système sécurisé et m'a donné une compréhension de la façon de garantir que la sécurité est au cœur de toutes les solutions que je suis impliqué dans la conception.Cela m'a également permis d'aider les membres de l'équipe à s'assurer que leurs conceptions respectent les normes de sécurité de l'industrie ».
The Munster Technological University Faculty of Engineering & Science Awards recognise and celebrate students who have shown academic excellence throughout the year. For the first time this year, Cyber Skills had a category, honouring three students who excelled in their chosen pathway.
David shares his experience of studying Secure Systems Architecture with Cyber Skills and the value the pathway has provided him.
“I started off my career in an operational support role ensuring applications remained accessible and highly available. On commencement of the Cyber Skills pathway, I was working in an Infrastructure/Solution Architect role where I worked designing infrastructure/middleware solutions for many of Shared & Harness components at Mastercard.
Recently I have moved into a new role, Manager of System Platform Architecture at Mastercard, managing a global team of 10 Infrastructure Design Architects, while remaining a technical manager.
I heard about Cyber Skills through an initiative at work. After reading through the prospectus, I really liked the sound of the modules and material covered in the different pathways as they would be very relevant to my role. The structure of the pathways and the online nature of the Cyber Skills courses also appealed to me, this would allow for a more flexible education experience.
The Secure System Architecture pathway provides in-depth training and knowledge on how to ensure solutions are designed / architected with security fundamentals at the core. A |
Technical
|
|
★
|
 |
2022-04-12 00:00:00 |
Quels sont les besoins futurs de la cybersécurité en Irlande? What are the future cybersecurity needs in Ireland? (lien direct) |
By Dr Lubna Luxmi Dhirani and Dr Tom Newe, featured in Silicon Republic
University of Limerick\'s Dr Lubna Luxmi Dhirani and Dr Tom Newe examine the security skills shortage in Ireland and how it can be addressed.
As the amount of interconnected smart buildings, smart grids and autonomous vehicles etc increases, we need to ask the question – what if the critical underlying infrastructure of this smart world is hacked, controlled or manipulated for a ransom?
In the modern times we live in, the impact and potentially damaging consequences of a cyberattack are much greater than in the past. Data is the new gold and cybercriminals are the gold rush prospectors of this era.
Recent attacks include the HSE cyberattack in 2020, which is estimated to have cost the Irish taxpayer more than €100m. The world\'s most valuable oil producer Saudi Aramco was breached in 2021, where hackers scraped 1TB of data and kept it on a leak site while seeking a ransom of $50m in cryptocurrency.
The hackers had access to data that contained the full information on 14,254 employees, their names, passport details, phone numbers, email, job title, residence permits, as well as business/company data such as project specifications, client lists etc. This information is of potential use and value to many different types of threat actors on the dark web. How this happened is still relatively unknown.
If the response is to pay these ransoms, then the cyber prospectors will keep on digging until the shortage of cyber professionals capable of combatting and preventing these threats is addressed.
Careers in cybersecurity are professionally and financially rewarding and the sector is growing at a rate of 10pc per annum in Ireland and worldwide. Results of a recent study commissioned by Cyber Ireland, due to be published in May 2022, show that there are more than 450 cybersecurity businesses in the Republic of Ireland that employ close to 7,000 people.
This growing cybersecurity sector will require an increasing number of graduates of all classifications over the coming years and, in particular, cyber-skilled workers are needed.
Cybersecurity skills and a good understanding of how these skills can impact our daily lives, wider society and community are important.
As per 2021 statistics, around 98pc of successful cyberattacks were of the social engineering variety – psychological manipulation to trick users into making security mistakes or giving away sensitive information – and were successful because of a lack of cyber awareness and understanding by the end user.
With the continuous growth of, and increased dependency on, smart devices and technology at work and at home, the threat of cyberattacks on business and individuals is an ever-increasing problem. Now is the time to consider a career in cybersecurity.
GDPR compliance and the EU directive NIS2 assist in increasing the level of cybersecurity in Europe, but every day new vulnerabilities and threat scenarios surface.
In these cyber-challenging times, people need to be trained in cyber defence, offence, threat intelligence, cyber standards and risk, data and network security, etc.
Careers in the cyber world are diverse and versatile. Many different skills are required and this enables different people with different abilities to have rewarding careers.
Cybersecurity solutions are not always technical – inculcating a good understanding of security issues, solutions and risks and being able to communicate the necessary solutions and strategies effectively will always be necessary.
The Cyber Ireland study highlights a significant shortfall in cybersecurity talent in Ireland against a backdrop of increased demand. This report states that one of the most significant factors leading to data breaches across digital structures globally is the lack of training of non-technical employees and the lack of highly skilled cybersecurity professionals.
For many seeking training in cybersecurity, a full-time course is not an option and they seek on-the-job training options instead. This |
Vulnerability
Threat
Studies
Technical
|
|
★★
|
 |
2021-07-29 00:00:00 |
Pourquoi les fraudeurs nous blitz-ils avec des appels téléphoniques sur l'escroquerie? Why are fraudsters blitzing us with scam phone calls? (lien direct) |
Chair of Cybersecurity at MTU, Dr. Donna O\'Shea, contributed to this article in the Irish Times
This week I have received a half dozen mobile calls from a number purporting to be very similar to my own. The caller ID shows an 087 number – like my own – and the subsequent four digits were also identical to mine, while the last three varied each time. In the jargon, this is known as “neighbour spoofing”, when a false caller ID is sent, seeming to come from the same area you live in, or a familiar looking number, to make it more likely that you will answer. When I did answer a not very convincing automated recording from “the department of social protection department” said fraud had been associated with my Personal Public Service Number (PPSN).
Many of you will have received similar calls, trying to get you to “press a key” and talk to someone who tries to get you to divulge your PPSN, name, and in some cases, bank details. A recent scam text pretending to be from an Irish bank tells users that access to their account has been restricted due to a hacking attempt and invites them to input details to unlock it. These are all part of the seemingly endless cycle of scams which seem to have exploded over the past couple of years – and got increasingly sophisticated.
But why is this happening? Let\'s look, as we would with any business, at the economics of the phone frauds.
1. Falling barriers to entry
One of the first things with any business is to look at the barriers to getting involved. Whether for a criminal or legal enterprise, the cost of establishment is vital and can have a key bearing on activity levels and competition.
Up to recent years, undertaking phone scams that involved hiding numbers and making thousands of calls required a significant level of technical knowledge. Now, according to Dr Donna O\'Shea, head of the computer science department of Cork Institute of Technology (CIT), the requisite “exploit” kits are downloadable, can leverage VOIP (voice over internet protocol) technology to call from PCs and display fake numbers on the user\'s phone. “You don\'t have to be a technical person to do it any more,” she said.
It is still hard to account for the massive volumes of calls now happening, according to O\'Shea, but there appears to be a sharp rise in call numbers as well as increased sophistication. Relatively easily spotted calls from far-away countries are now replaced by more sophisticated “spoofing” – using numbers displaying themselves as “ordinary” Irish numbers. Showing a number close to your one is just one variant of this.
It has also led to people “returning” calls to these numbers, which in some cases are valid numbers with real – and puzzled – owners. “You rang me”. . . “No I didn\'t . . .”
At the moment incoming calls cannot be easily verified as coming from valid numbers. As the industry deregulated, numbers became portable – an 087 number can operate as part of the 086 network and so on – making checking incoming numbers to see if they are valid difficult – though here and internationally this issue is being examined. Some US operators have introduced controls, but it is a constant battle to stay ahead of the scammers.
Not only it is relatively easy, but generating tens of thousands of phone calls is cheap, with operators taking on a tiny – or zero – cost per call. And so the “success” rate required to make money is tiny. Business Insider calculated in the US that some 2.5 million calls could be bought from a provider for just $875 by illegal telemarketers or scammers. Even if one in every 10,000 yielded revenue averaging $7 on average, the initial investment would be doubled.
And of course, phone calls are just one variant of the scammers\' art, which also includes text messages and emails, all in many ways increasingly sophisticated, particularly texts allegedly from financial institutions which click through to plausible fake sites inviting you to enter your details.
2. |
Tool
Mobile
Technical
|
|
★★★
|
|