Intelligent Connections. Recruiting Integrity.
Call Us: 415-510-2973

Archive for the Blog Category

Blackmere’s Erin Hanson to Speak at ISSA Webinar: How to Recruit and Retain Cybersecurity Professionals

How To Recruit and Retain Cybersecurity Professionals

 

2-Hour Live Event: Tuesday, October 25, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here to register.

Overview:

We have all heard the term “Cybersecurity talent shortage.” With information security rising as one of the quickest growing industries, there are more jobs than there are qualified candidates. This creates a difficult HR environment and tends to lead to a high level of turnover. How can businesses recruit, but just as importantly, retain, key cybersecurity personnel?

In this two hour ISSA International web event, industry professionals will share their experiences and provide real world feedback regarding one of the most challenging issues facing the information security field. Additionally, we will explore the results of a comprehensive employment study performed by ISSA and ESG earlier this year. What does the data collected in the survey tell us about the current and future security job markets, and how can you apply these findings to your business operations?

 

Speakers:

Erin Hanson, Director of Client Experience, InfoSec Connect

Erin has been involved in people analytics and professional recruiting for federal government contractors for over 20 years. Erin’s experience includes recruitment of highly specialized doctorate level skill sets in support of energy research positions including life sciences, physical sciences, IT/Cyber and specialized engineering fields. Additionally, Erin has experience in business analytics, proposal writing, program development/administration, and business development roles. Her experience offers demonstrated abilities in managing and developing solution oriented proposals and programs.

Erin is a graduate of University of Idaho with a Bachelors in General Studies with an emphasis in Industrial Technology. She is certified as a Global Professional in Human Resources. Erin’s degree emphasis in industrial technology and broad experience in technical recruiting provides her with a strong technical terminology and understanding of skill sets in multiple science, technology, engineering, and math fields.

 

Candy Alexander

Candy has nearly 30 years in the security industry working for companies such as Digital Equipment, Compaq Computer Corporation, and Symantec. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed Corporate Security Programs. She is now working as a Virtual CISO and Cyber Security consultant.

Candy is the chief architect for the Cyber Security Career Lifecycle for the ISSA (Information Systems Security Association), and until recently she served a Director for 14 years on the International Board. She is also the past President and current Board Member of the ISSA Education and Research Foundation. Candy has also served as Vice President of Education and Vice President of International Relations for the ISSA. She remains a loyal member at the local level with the New England Chapter and the ISSA – New Hampshire Chapter.

Candy has received numerous awards and recognition, including that of Distinguished Fellow of the ISSA, ranking her as one of the top 1% in the association, and she was inducted into the ISSA Hall of Fame in 2014. She also had the opportunity to be a featured speaker for the IT Security Symposium at the United Nations, and even received an invitation to the Offices of the White House to speak on the importance of security awareness to the President’s “Cyber-Czar” staff.

 

Kim Jones

Kim L. Jones is Director, Cybersecurity Education Consortium, Arizona State University and has been an intelligence, security, and risk professional for over 25 years. A sought-after speaker and industry thought leader, Jones has built, refined, and/or managed security programs in the financial services, healthcare, manufacturing, outsourcing and defense industries.

Jones has a bachelor’s degree in computer science from the U.S. Military Academy at West Point, a master’s degree in information assurance from Norwich University and holds the CISM, CISSP, and CRISC certifications. He is a member of the CISO Advisory Council for ISSA International.

 

ISSA International Web Conferences occur on a monthly basis and provide CPE credits for continuing education. For more information and to see the upcoming schedule, click here.

Recorded ISSA Webinar: Internships – Do They Really Work?

Information Systems Security Association (ISSA) recently hosted a webinar Internships: Do They Really Work?  InfoSec Connect’s Domini Clark and Erin Hansen were on hand as panelists to lend their perspectives about internships in the information security field.

Internships can be a great way to test drive a career in cybersecurity and get a sense of the typical day in the life of a practitioner. Learn from the experts about what it’s really like to intern in the cybersecurity field and what it’s like to apply lessons learned in a real world environment.

View a recording of the webinar on YouTube here.

U.S. Government Cyber Internships

Federal agencies have been consistently rated highly rated as “ideal employers” by Universum’s study of 81,707 computer science students.  For instance, the Federal Bureau of Investigation, National Institutes of Health, Peace Corps, Department of State, and NSA have been ranked highly in the study.  The enormous talent gap in information security is driving the need for government entities to up the ante as they compete against the private sector for top student talent.  Thankfully, this competition has resulted in a few little known benefits to cyber security students: Read more

The Top 100 Chief Information Security Officer 2017

 

Adam Williams CISO Sentry Insurance

Adam Williams,   CISO                     Sentry Insurance

 

Adrian Asher CISO LSE Group

Adrian Asher,        CISO
LSE Group

Al Tarasiuk CISO Deutsche Bank

Al Tarasiuk,           CISO
Deutsche Bank

Alden Sutherland CISO AmerisourceBergen

Alden Sutherland, CISO
AmerisourceBergen

Alejandro Ramos CISO Telefonica

Alejandro Ramos, CISO
Telefonica

Alex Stamos CSO Facebook

Alex Stamos
CSO
Facebook

Anoop Chopra CISO Maersk

Anoop Chopra
CISO
Maersk

Anthony Belfiore SVP, CISO Aon

Anthony Belfiore
SVP, CISO
Aon

Anuprita Daga CISO Reliance Capital

Anuprita Daga
CISO
Reliance Capital

Arlan McMillan CISO Kirkland & Ellis

Arlan McMillan
CISO
Kirkland & Ellis

Bernie Cowens CSO PG&E

Bernie Cowens
CSO
PG&E

Blake Pelletier CISO Redding Bank of Commerce

Blake Pelletier
CISO
Redding Bank of Commerce

Brad Maiorino CISO Target

Brad Maiorino
CISO
Target

Bret Arsenault CISO Microsoft

Bret Arsenault
CISO
Microsoft

Brian Brackenborough CISO Channel 4

Brian Brackenborough
CISO
Channel 4

Bryan Littlefair Global CISO Aviva

Bryan Littlefair
Global CISO
Aviva

Chandra McMahon CISO Verizon

Chandra McMahon
CISO
Verizon

Chris Bitner CISO Bloomin' Brands

Chris Bitner
CISO
Bloomin’ Brands

Chris Lugo CISO Danaher

Chris Lugo
CISO
Danaher

Christian Hamer CISO Harvard University

Christian Hamer
CISO
Harvard University

Christopher Porter CISO Fannie Mae

Christopher Porter
CISO
Fannie Mae

Clive Reeves CISO Telstra

Clive Reeves
CISO
Telstra

Colin Anderson CISO Levi Strauss

Colin Anderson
CISO
Levi Strauss

Craig Froelich CISO Bank of America

Craig Froelich
CISO
Bank of America

Dale Drew SVP & CSO Level3

Dale Drew
SVP & CSO
Level3

Damon Morris CISO EdF Energy

Damon Morris
CISO
EdF Energy

Dan Bowden CISO Sentara Healthcare

Dan Bowden
CISO
Sentara Healthcare

Dane Warren CISO Intertek

Dane Warren
CISO
Intertek

Darren Argyle Group CISO Qantas

Darren Argyle
Group CISO
Qantas

Dave Estlick CISO Starbucks

Dave Estlick
CISO
Starbucks

David Galas CISO VeriFone

David Galas
CISO
VeriFone

David Gracey CISO Rio Tinto

David Gracey
CISO
Rio Tinto

David Hahn CISO Hearst

David Hahn
CISO
Hearst

Deneen DeFiore Chief information Security & Technology Risk Officer GE

Deneen DeFiore
Chief information Security & Technology Risk Officer
GE

Derek Benz CISO Ford

Derek Benz
CISO
Ford

Ewa Pilat CTSO Vodafone

Ewa Pilat
CTSO
Vodafone

Forrest Smith CISO Nissan

Forrest Smith
CISO
Nissan

Gary Payne CISO BBC

Gary Payne
CISO
BBC

Gerhard Eschelbeck VP Security & Privacy Engineering Google

Gerhard Eschelbeck
VP Security & Privacy Engineering
Google

Greg Dakin CISO Interserve

Greg Dakin
CISO
Interserve

Henning Christiansen CISO Axel Springer SE

Henning Christiansen
CISO
Axel Springer SE

Ian Rathie
CISO
Goldman Sachs Bank

Irwan Tjan CISO Expedia

Irwan Tjan
CISO
Expedia

James Shira Global CISO PwC

James Shira
Global CISO
PwC

Jamil Farschchi CISO The Home Depot

Jamil Farschchi
CISO
The Home Depot

Cyber Internships: Where Should I Start?

You may be one of the few students out there that already has a clear picture of where your career will take you and what you want to do with your next four years.  If so, you probably already have your first, second, and third year cyber internships selected.  Most students, on the other hand, are still searching and a little unsure about what the next step will be.  This is EXACTLY why internships are important!  An internship will allow you to test drive a career and see what fits you best in the real world.  Now, where to start? Read more

Do Information Security Internships Really Work?

Without question, one of the best ways to get experience outside of school is to land an information security internship. Internships give you:

  1. Critical, on-the-job experience
  2. The ability to see first-hand if you and the work are a good match
  3. Valuable connections and references following a positive internship experience

Read more

Niche Job Boards: The Power of Precision

Why should you consider using niche job boards for your sourcing strategy? The truth is that there are a lot of tools out there to bring employers and candidates together. Many promise the newest and greatest, but the formula is really very simple. At the end of the day, you must communicate who you are and what you want to a receptive audience. You can scream from the rooftops about the greatest snow boots in town, but if you choose a rooftop in Miami you wont be taken seriously. Read more

2018: A Great Year for Cyber Security Jobs

A recent Cisco report indicates that there will be one million cybersecurity job openings worldwide in 2016.  In addition, the global cyber workforce is expected to rise to 6 million by 2019.  With more than 200K unfilled cybersecurity jobs in the U.S., we are facing a projected candidate shortage of  1.5 million in the next two years, according to Forbes article.

This is great news for anyone already in the field.  Read more

Stop Overanalyzing Resumes!

Do you work with a hiring manager who is guilty of overanalyzing resumes? If you’ve been in recruiting for more than a minute, you know the manager I’m talking about. This is the person who has never misspelled anything, never left a word out of a sentence and is remarkably able to pick out the slightest change in font or font size. What is imperceptible to the rest of the world is glaringly obvious to this person.

I get it, there is great value in knowing that the person you’re hiring to do code review is also proofing their own resume. It is important to pay close attention to detail, especially when you’re putting your resume out there for public scrutiny. I completely understand. Unfortunately, the world is not perfect and neither are our candidates. Top notch candidates are generally working at least 40 hours a week and, hopefully, have a few other things going on in their lives that demand their attention.

So, when a recruiter calls them up and says, “Hey, I noticed your profile and I’ve got this great opportunity for you with this amazing company”, don’t be surprised if they only give their resume a quick scan before sending it over. Once that resume is in the hands of the recruiter, he or she is so thrilled that they found this amazing person from this great company with 80% of the desired skills in a VERY tight market. I promise, that recruiter is only going to do a quick scan on the resume too.

It is not until the resume for this amazing candidate lands in Mr. or Ms. Perfect’s hands that the whole process comes to a screeching halt. As that manager picks through font size and the spelling error the joy dissipates from the room and they alienate the recruiter who has just worked hours to provide them with that one, albeit imperfect, resume.

The resume does not make the candidate. Experience and their ability to contribute to your organization makes the candidate. Take that imperfect resume, pick up the phone and talk to the person on the other end. Learn about their experience, the challenges they’re looking for, the problems they’re itching to solve and their ability to make a difference in your organization.

If the conversation goes well, I understand if you don’t hire this person as your in-house resume writer. Hire them as your information security systems analyst or your CISO and tell them that they need to be accountable for proofreading and pulling in a second pair of eyes on their next RFP or Executive Board presentation. Just please, please, please stop overanalyzing resumes. Gather what you can from a two page document covering a strong career and get to know the talent behind the paper. You just might be surprised if you do!

Getting your Head in the Game: Sourcing Information Security Candidates

Recruiting and Sourcing information security candidates is not for the faint of heart.  Recently, the Leviathan Security Group said, ” With more than one million cyber security positions unfilled worldwide, currently identified security needs couldn’t be met if every employee at GM, Costco, Home Depot, Delta and Procter & Gamble became security experts tomorrow.”  Wow.  Just wow.

What does this mean?  Read more