I'm a cybersecurity manager. you forgot this fact: cybersecurity companies are UNWILLING to train new people. It's not that people are uninterested, companies want hard skills right away. If it was up to me, I'd hire people from breakfix/networking/physec and train to do blueteam, or teachers to do cybersecurity project management. But infosec pros are a proud bunch and we'd rather automate rather than train and automate. There is no one else to blame on this "skills shortage" but us. One more thing, lots of infosec pros want to get the "certs/credentials" first, so they don't get leaped frogged by people coming in.
@@jeffcrumewhat!? You mean you’re not left-handed and don’t wear your watch on you right wrist!? By the way, I’m looking for resources presenting on cybersecurity specifically tuned for OT/IACS (accounting for AIC prioritisation, rather than CIA), and particularly for energy and water utilities. Does IBM do anything on that topic, or can you give any recommendations?
I loved this. I recently got into tech but have been studying. Cyber security is where i want to go and it's so important. People's lives get literally destroyed by these hackers. It's so complex though
We need more cybersecurity specialist in the future, i agree. At this point i might suggest to putting the IBM cybersecurty course on coursera free for all, without limit time. This would increase the awareness of all people
Omg, people don't understand how important all of this information is! We live in a world where whoever has the passcodes, source codes, hacking abilities etc. is very very dangerous. They can shut down whatever they want. Trust me I've experienced this with Russians. I'm so happy IBM is trying to solve these issues.
@@yawoseitutu9487 it depends on where you want to go in your career. CISSP is generally more focused on the technology for practitioners with CISA for auditors
Great presentation..have been an IBMer for 14 years . 😊..now cissp cism iso ccsk qualys qradar oscp (a) and crisc (a) but i would like to return to ibm to work in that great company
Is "low code vs no code from security perspective" a good area of research in Cybersecurity at Masters level. If not, can you please suggest some good areas. Thank you for the very insightful video!
Hi @Jeff or IBM, is the any chance to work as a cyber security with no experience whatsoever in IT ,but only with some basic cert like security +, net+, ? Just wondering before I start digging in ? Thanks
Maybe there wouldn't be such a problem finding cybersecurity professionals if more companies invested in creating them. I find it annoying to keep hearing companies complain about all these openings yet these same companies are making the bar unreasonably high. You're telling me I have to have PhD level knowledge/experience to use splunk or wireshark? Give me a break.
The math is beyond me but the US NIST has selected 4 algorithms as finalists that seem to be holding up well to scrutiny (3 of the 4 are IBM contributions, BTW)
Hi there @IBM Technology - I would like to use this video for my online lesson - it would be published on our university website as an introduction to a lesson on cyber-security. I will not change any content and credit you as the maker of the video. Would this be alright? Do you give me permission to do this?
Yes & No, mainly depending of the use case of the machine. Sure it would be much more difficult for ransomware to appear on a air gapped system, however that may not suite the systems purpose. Generally speaking, large companies are seen as high value targets being attracting skilled individuals, meaning that it is a constant battle between cybersecurity experts & hackers. New vulnerabilities in systems are always being discovered, exploited, and patched.
id love to see mfa that doesnt gatekeep the internet to only people that can afford phones or an mfa device . when will a homeless person be able to go to an internet cafe and log in to google without needing to have a phone or other device that they need to log in ... this gatekeeping is verry dystopian
Seems like the cafe would need an in house MFA or public device to receive. Or the homeless can get a gvt phone and receive a txt call or use an app. There are ways...
The wisdom here is remarkably compelling. A book with akin insights promoted significant development in me. "AWS Unleashed: Mastering Amazon Web Services for Software Engineers" by Harrison Quill
Sorry, the core of data breaches ( 90% of them ) is user mistake or awareness and windows OSs, thats it. And because NONE of this will go away any time son or ever, they will continue to exist or even increase.
Hello friends Is anyone can tell me how to become a cyber security specialist without university degree I mean which certifications step by step thanks.
Inventory in software and manual rarely match and transportation can break long range planing or deployment unless strategic cooperation of local and remote access road and communication.. Rummors and misinformation and mean or production are critical. Like venezula situation when bread cost thousand of dollars or noodle cost hundred of dollars so production or lazy holding money from your troops will kill your workers then ourself and soon only worker win it all
Not necessarily. Linux has some great security features but if they aren't configured properly it can be just as insecure as any other platform. Any operational computer can be broken into and no OS is perfect
There's no skills gap. I have a cyber security BS and 3 years experience in the field and I haven't found a job in cybersecurity 2 of the last 5 years.
The wisdom here is remarkably compelling. A book with akin insights promoted significant development in me. "AWS Unleashed: Mastering Amazon Web Services for Software Engineers" by Harrison Quill