Cyber-security expertise is one of the most in-demand skills in today’s IT landscape, and those with security proficiency have some of the most promising career options in all of tech . In the past year alone we ve seen major data breaches in the servers of Verizon, Deep Root Analytics, Kmart (US), DocuSign and the Intercontinental Hotel Group among many others . And most recently, we saw the biggest hack of them all the compromise of the US credit agency Equifax, which led to the theft of the financial information of up to 143 million people. The growth and increased sophistication of these attacks has led to an explosion of demand for cyber security professionals . In 2016, the global cyber security industry was estimated to be worth $106 billion . By 2023, that s expected to explode to around $639 billion according to research firm IT-Harvest. That explosive growth has led to a huge skills gap when it comes to cyber security . Research organisation Cybersecurity Ventures estimates that worldwide there will be 3.5 million unfilled cyber security jobs by 2021. Those estimates have been backed up by the number of job ads appearing for cyber security professionals in the last two years .
According to job site Indeed, there was an incredible 124% increase in the number of postings for cyber security professionals between 2015 and 2017 . Seek has reported similar numbers: between February 2016 and February 2017, the number of ads in the sector grew by 57% . And professional body ISACA s survey of businesses reported that in 2017, 65% of those surveyed had a chief information security officer a huge increase from the 50% just a year before. The high demand for cyber security experts has also driven wages in the sector considerably . According to a recent survey by recruiters Robert Half, security specialists starting salaries have grown at a rate of 6.2% in 2017 among the highest rate in any industry . In the survey, Robert Half found that its recruited cyber security specialist wages had a minimum of $118,000 and a maximum of $160,000. Job salary survey site PayScale reports somewhat similar figures . It lists the median salary of an IT security consultant and computer security specialist at $105,000 – $110,000, with more entry level roles at $88,000 . IT security architects can expect a median salary of $135,000+.
So how do you get a career in cyber security ? Right now there is no official accreditation (although the Australian Information Security Association has been in talks with the Professional Standards Council to create one), but there are plenty of courses one can take to prepare yourself for a career in cyber security. One example of a qualifying course is the Master of IT Management1 from Southern Cross University . It s a two-year part time course that will qualify you for many roles in IT security . It s comprised of 12 units, all of which can be completed using the University s structured online learning system, which requires no on-campus activity and allows the course to flex around your existing time commitments . You can jump in and out of the course as your life allows. Of special note is the Information Systems Security Management unit, which specialises in teaching students to identify and resolve security threats and vulnerabilities .
The unit covers much more than specific resolutions: it also looks at managing risk to the company and partners; legal and ethical considerations; the role of management; and the integration of security systems into existing business practices . The goal is to get you qualified and ready to deal with the growing number of threats facing Australian businesses online . If you can manage that, then your career prospects are good indeed.
What you ll learn in Southern Cross University s Information Systems Security Management
SCU’s Information Systems Security Management unit gives you a specific, up-to-date skillset aimed specifically at cyber security expertise, which includes:
- How to identify and describe the various threats to the security of digital information and information systems.
- How to analyse models and practices for managing security of digital information and information systems.
- How to investigate the human management aspects of security in an enterprise including roles, responsibilities and personalities, and the impact on trading partners.
- The ability to review and describe the major legal and ethical issues with respect to managing security of digital information and information systems.
- Analysing the need for managing security of digital information and information systems.
- How to undertake risk assessment regarding the security of digital information and information systems and develop strategies for controlling risk.
Microsoft says its Azure Blueprint for the UK Government s Cloud Security Principles will provide the highest level of security for cloud services. Azure Blueprint for the UK Government details how services built on Microsoft s cloud platform1 implement the 14 cloud security principles2 published by the UK s National Cyber Security Centre, which include practices around data governance, authentication and operational security.
The Azure Blueprint UK Government Customer Responsibilities Matrix outlines how Azure implements security controls designed to satisfy each security principle and assists customers in understanding how they may implement safeguards within their Azure solution3 to fulfill the requirements of each principle where they hold a responsibility, said Matt Rathbun, chief information security officer for Azure Government. Microsoft has also released a Blueprint compliance architecture ARM (Azure Resource Manager) template on GitHub, which provides a baseline from which customers can build secure environments in line with the cloud security principles4.
When users create a new group in Yammer it will automatically be part of the Office 365 Groups environment, providing a OneNote notebook, Planner for task management, a SharePoint Online site and a document library.
All shared resources can be access directly from Yammer by all group members, with group membership queries based on Azure Active Directory attributes such as role, location and manager.
This integration between Yammer and Office 3656 Groups affects customers who have enforced Office 365 identity in their networks, and have only one Yammer network associated with their Office 365 tenant, added Connie Woo, product marketing manager at Yammer.
You can also look forward to integration with Outlook Calendar as well as greater enhancements to Yammer integration with SharePoint Online and Planner.
Digital transformation is one of the key opportunities in today’s business for CIOs to increase leverage with their internal and external customers .
- ^ Microsoft s cloud platform (www.silicon.co.uk)
- ^ 14 cloud security principles (www.ncsc.gov.uk)
- ^ within their Azure solution (www.silicon.co.uk)
- ^ cloud security principles (www.silicon.co.uk)
- ^ business communication service Yammer (www.silicon.co.uk)
- ^ integration between Yammer and Office 365 (www.silicon.co.uk)
- ^ which will connect Office 365 Groups (www.silicon.co.uk)
- ^ The history, products and people of Microsoft (www.silicon.co.uk)
- ^ … (www.trustopen.net)
- ^ … (www.trustopen.net)
- ^ … (www.trustopen.net)
August 28th, 2015
We would like to draw your attention to a recent near miss at the nursery. You may have noticed our newly repainted side door and we hope you like it, however as a result of having this work carried out the door developed an intermittent fault which prevented it from closing fully.
Thankfully one of our parents noticed this and brought it to the attention of the nursery manger meaning we were able to take immediate action to secure the door. We were very grateful for this vigilance and quick thinking of the parent.
When the parent discovered the door they said they felt concerned as the children s safety was at risk We asked what advice they would give to other parents on dealing with this kind of situation and they urged people to speak to anyone at the nursery or contact the nursery manager if you have any concerns, the children s interests are our common priorities This parent also stated they were very happy and reassured by the response and actions
However this issue could have been resolved a lot sooner with your help and so we are asking all of our parents/carers to be extra vigilant when entering and existing the nursery setting.
The security of the nursery along with the children s safety is paramount so on that note we would like to ask for your help in taking extra care that all doors are closed behind you, this includes the internal doors to the rooms.