Mind The Skill Gap: How To Expand Talent In Cybersecurity

The modern cybersecurity industry has been the subject of much attention in recent years as threats to businesses large and small continue to mount. Even outside of the industry, business experts have correctly concluded that more measures are necessary to counteract aging infrastructure and an increase in possible attack surfaces. The interest exists, but what doesn’t exist is enough personnel to fill the myriad jobs in cybersecurity. And this problem is only expected to get worse as time goes on, with the number of new professionals eclipsed by how much their talents are needed.

The discrepancy in cybersecurity is often blamed on the failure of universities to provide the courses necessary to train the next generation of experts. While this is a noted problem, it is only one of many. The same cybersecurity professionals who scoff at formalized education in the field are often unwilling to invest the resources into training others within their organization, instead preferring to solicit existing talent from other businesses. Though there is significant work involved when it comes to building a reliable team, the reward of cultivating new talent is preferable to poaching the old and widening the skill gap further. It’s a sacrifice, but one that must be made if the industry is to be sustainable moving forward.

The other advantage of in-house training is the integration of cybersecurity practices throughout all of a business’s processes. Too often, organizations view these tools as afterthoughts to be stapled at the end of every project. The reality here is that new systems, products, and infrastructure should be created with cybersecurity in mind. Training and apprenticeship programs provide enough personnel to adequately address anything new coming through the pipeline. This carries the added benefit of allowing new entrants in the industry to receive a hands-on experience with a variety of systems.

And, if a company doesn’t have any place to start when it comes to building in-house cybersecurity firms, a third-party organization can help. These companies can provide support for companies that don’t have the resources to train new experts and build the start of a good security culture. However, even dedicated cybersecurity organizations should be mindful of their practices when it comes to recruiting vs. fostering talent.

It’s also important to consider the kind of training that is being given to aspiring cybersecurity experts. The best way to handle cybersecurity is to start with the broad strokes—the compliance laws that it is absolutely vital that any professional knows. In many cybersecurity courses, emphasis is placed on the products that businesses can use to combat threats. This leads to experts with very specialized knowledge of a specific solution, rather than knowing many brand-agnostic solutions or the compliance standards that underpin the whole industry. Consultants should be neutral when it comes to recommending solutions and find whatever suits an organization’s needs.

The future of cybersecurity will need to be collaborative. Between academic organizations selling their programs to business organizations offering opportunities for interested professionals to learn, a lot needs to change about how new talent is cultivated. In the future, expect to see a new generation of experts that know compliance law inside and out—and that are focused on spreading their best practices to others.

 

 

How Data Improves Patient Health

Good compliance and patient engagement are two objectives in the healthcare world that converge more than one would think. Recent health trends have created patients more invested in their own health and willing to work with care providers to meet their objectives. This is outstanding for medical professionals looking to create a solid foundation for their patients and keep them as healthy as possible. However, it is all too easy to get caught up in a fad and make poor decisions, so another burgeoning aspect of patient engagement centers around correcting common misconceptions and getting individuals back on the right track.

In contrast, compliance is a process that happens beyond the perception of patients. As I’ve discussed in the past, an increase in sharing data also increases the need to secure systems and ensure that information is not compromised. However, safely giving patients access to their own data can help empower healthcare providers and patients alike.

While the mass exchange of data, both internally and to patient portals and other healthcare institutions, creates more points where it can be stolen, it also leads to opportunities to educate patients and involve them in the process. The increase in IoT wearables for patients that can track biological metrics also contributes to patient engagement as well as research. Some of these wearables, despite being an ever-present aspect of the lives of some individuals, do not provide data to the people that use them. Freeing up access to this data increases the number of ways that a patient can help sustain their own health.

This is, in many ways, the central premise of patient engagement. There is no one way to instill a desire for self-improvement in patients. The only thing that healthcare providers can do is give them the freedom and the tools to monitor their own health. Patient portals, for instance, give individuals access to their own records, allowing them to do the legwork of tracking their progress over time. Other systems may remind patients to adhere to medication schedules, or help work them through things like physical therapy.

It then falls to providers to achieve good compliance in order to safely give patients leeway to create the foundation for good health. In a competitive industry, a healthcare organization can fall behind if they do not provide a positive experience for patients—to say nothing about what can happen if compliance is not met.

These care providers stand at a crossroads, and they must decide in what ways they will innovate to improve patient outcomes. Compliance should not be a process of checking off boxes for the sake of staying in business—it should be leveraged as a strategic tool to reevaluate aging systems and promote engagement among patients. There are a plethora of other benefits as well, and savvy organizations can use compliance as an opportunity to rethink the way they conduct IT, saving costs and setting up better agility in the long term.

In short, the technology exists to help patients take control of their lives—but it’s up to organizations to adopt it in a safe way that still remains compliant. It may sound strange to some medical professionals to fixate on technology in this way, but the ideal of good patient engagement can only be reached if the systems behind it function seamlessly.

The New Age of Data Compliance

The constant advance of tools necessary to generate and share data has created an environment in which developments are made by increments and security measures struggle to keep up with the latest variety of cyber attack. Indeed, many corporations have fallen victim to these new threats, and even a small breach can cost a company dearly in both money and reputation. Perhaps the most egregious example of this has been the recent Equifax breach, which compromised customer information and sparked a discussion about the efficacy of cybersecurity.

As they say, an ounce of prevention is worth a pound of cure, and that’s where information compliance comes in. It’s worth noting that compliance is not the same thing as cybersecurity. While security is IT-centric and often a futile effort due to the ever-changing nature of threats, compliance simply involves promoting best practices in corporate communities to prevent a potential breach. A staggering number of cyber attacks are made possible due to the negligence of employees, and it’s up to corporate leadership to ensure that all are informed of the ways they can prevent a click from turning into a catastrophe.

The benefits of compliance are manyfold. Again, the difficulty in implementing security solutions that account for a business’s needs, budget, and information distribution means that compliance is more important than ever. This is also due to in-house IT often being outmoded; there’s a good chance that, if your company does not work in technology, that better out-of-house options are available. Additionally, reducing the risk of a cyberattack is valuable from a legal standpoint. Compliance also helps provide thorough documentation that allows for a better response in the event of an attack.

So how does a business leader implement good compliance practices in an impactful way? It can often be difficult to steer an entire business in this direction, especially considering that one case of negligence can lead to disaster. Many make the mistake of believing that any such initiatives should be IT-led when in fact the department should just guide teams in the right direction rather than wasting time micromanaging the entire effort.

Education is an important step in the right direction. Even with thorough countermeasures in place, a simple email phishing scheme can spread quickly if not avoided. Recognizing fraudulent emails is a great topic of conversation, as is creating strong passwords. This may require giving employees access to certain files or documents on an as-needed basis. It may seem like an unnecessary hassle, but it cuts down on vulnerability and allows for the original threat to be isolated and tracked.

Of course, even if all of this information is imparted to employees, there’s still the matter of convincing all staff members to abide by it. I cannot stress enough the importance of a business being “all-in” when it comes to compliance. Therefore, change should start with leaders and work its way down. The tools necessary to ensure compliance should also improve the quality of an employee’s life; if they are forced to take extra steps, they are far less likely to adopt these new measures. Thoroughly research solutions to compliance and work to automate as much as possible. Check websites pertaining to your industry for more information about compliance guidelines and ways to safely share information. Governmental regulations should also be researched and observed.

Ensuring proper compliance can be a difficult task, but far worse is the prospect of lost or corrupted data. It is up to corporate leaders to choose to adopt a culture of compliance and enforce the standards that continue to become more and more necessary in the wake of devastating cyber attacks.

Three Ways to Maximize Business Value with IoT

Three Ways to Maximize Business Value with IoT by Scott Maurice

The MIT Sloan Management Review recently released an extremely comprehensive report on IoT drawn from conversations with 1,480 businesses, managers, executive and IT insiders. The report includes a treasure trove of data, opinions, and advice. One thing that jumped out to me while parsing through the report are several statistically backed ways that companies can leverage IoT to increase business value.

Analytics

With the far-reaching data-mining capabilities of IoT, companies can easily find themselves overwhelmed with data. For instance, GE is reported to have “50 million data variables from 10 million sensors”. That’s A LOT of data. With a seemingly infinite amounts of data at hand, the question turns from how much data you have to how well you can analyze it. According to the report, companies with a strong analytics foundation are three times more likely to get value from IoT than those without. That increased value comes in the improved efficacy of projects and in knowing which projects are worth investing in. A staggering 45% of respondents with “good or excellent” analytics can accurately estimate returns on investments, while 19% of companies without good or excellent analytics expertise could. The key takeaway: Sound analytics is key to maximizing value from IoT. With 49% of companies still lagging behind in analytics capabilities, there’s still a lot of room for improvement.

IoT Analytics by MIT Sloan Management Review

IoT Analytics by MIT Sloan Management Review

Talent

Given that IoT is cutting edge technology, it requires talent that is specifically trained in how to handle it. Many businesses realize this. According to the report, 49% of respondents indicated that they need to improve their IoT talent base in order to best leverage IoT technology. Making sure that your company hires IoT is the most straightforward way grow an IoT knowledge base, but it’s not the only one. More than a third of respondents make use of a consulting service and over 40% partner with other organizations that are using IoT. Along these lines, companies can benefit from building relationships with companies that are providing IoT devices. Just like it helps to learn from the mechanic when you bring your car in to get repaired, it helps to learn from your IoT designers.

IoT Talent by MIT Sloan Management Review

IoT Talent by MIT Sloan Management Review

Sharing Data

According to the older paradigm of business, the last thing a company should do is share its data with others. After all, direct competitors may use that data against them and what interest could customers possibly find from data? Now, not only are more and more companies sharing data with customers and suppliers and competitors (66% of respondents in the report), but companies are actually benefitting from increased exchange of information. When companies share data with others, others are more likely to share data with companies. According to the report, the longer a company uses IoT, the more likely it is to share data. What’s more, companies that share data with competitors are more likely to cultivate business value from IoT. The benefit of sharing data is clear.

Data Sharing by MIT Sloan Management Review

Data Sharing by MIT Sloan Management Review

 

Perhaps the greatest takeaway from the report is the emphasis on collaboration. With Analytics, Talent, and Data in general–IoT is pushing companies towards working with one another, making for a more harmonious, and ultimately more innovative market.