The growing concern of cybercrime is pushing more and more companies to staff their IT teams with professionals that are able to implement proper security measures as well as key controls and mechanisms that minimize threats and vulnerabilities. Choosing the right resources, however, might be not so clear-cut, and hiring teams often rely on certifications to screen applicants.
ISACA (previously known as the Information Systems Audit and Control Association, and that now goes by its acronym only) recently published a cybersecurity workforce research that highlights how “the worldwide cyber-security skills gap continues to present a significant challenge,” with 59 percent of the surveyed infosec professionals conveying there are unfilled security positions within their organization.
In addition to the problems of underrepresentation of women and minorities in cyber, IT and infosec careers, there is also a skills gap that continues to be present and that many organizations are finally trying to address through ad-hoc programs. In fact, the ISACA’s 2018 State of Cybersecurity research pointed out that a global shortage of two million cybersecurity professionals is expected by 2019.
That is where ISACA itself comes in. The organization is behind Cybersecurity Nexus (CSX), a new platform launched in 2014 to address the growing cybersecurity skills crisis and develop a skilled workforce. CSX is designed to provide IT security and cybersecurity professionals with the knowledge and technical skills to defend their organization from security breaches and cyberattacks. The program offers training and education to address all skill levels and specialties as well as a performance-based certification; in addition, it includes ample possibilities for networking with other like-minded professionals in the field.
The strength of the ISACA’s Cybersecurity Nexus™ (CSX) resides mainly in its strong practical, hands-on approach that focuses on real-world abilities. A key part of CSX, in fact, is its training (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Daniel Brecht. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/Xg6XestmiQc/