Post Tribune (Sunday)

Key cybersecur­ity hires you need to make right now

- By Bret Fund | Inc. Dr. Bret Fund is the head of cybersecur­ity and VP of education at the Flatiron School.

Recent ransomware attacks have proved that the United States is more vulnerable than we think.

The Colonial Pipeline attack in May stemmed from hackers having access to an old virtual private network (VPN) that was not intended to be used.

This seemingly innocuous letdown paralyzed gasoline and fuel delivery through the East Coast for nearly a week, triggering a surge in fuel prices and creating a run on gasoline not seen since the Arab oil embargo of 1973.

When addressed, Colonial Pipeline’s CEO mentioned the ransomware attack was caused by an oversight, signaling that this event could have been prevented. There’s no room for error when the U.S. is facing a national security emergency against an enemy that hides in plain sight, yet is largely anonymous.

Attacks on JBS, the largest global meat producer, show that such hacks into a company’s weak infrastruc­ture can severely impact supply chains and affect millions of Americans and their ability to retrieve or utilize basic necessitie­s. Ransomware attacks will continue to get more sophistica­ted and organizati­ons, both public and private, need to be prepared to protect their data against hackers and remain one step ahead of them.

If your organizati­on has not defined its strategy for hiring cybersecur­ity talent just yet, now is the time to do so. Here are three important hires to consider when building out a cybersecur­ity team:

1. Security engineer

If we think of an organizati­on’s networks and systems as a car’s engine, security engineers are the technical experts that build, maintain and fix that engine.

Their top priority is troublesho­oting and testing security systems in an effort to prevent breaches and leaks associated with cybercrime. They will develop security protocols and policies that are aligned with emerging trends relevant to cybersecur­ity to ensure teams within the company are keeping their networks safe.

Security engineers play a critical role in ensuring all networks are optimized, running smoothly and, ultimately, your organizati­on is protected from serious cyberattac­ks and threats. This may include deploying new security measures, hardware and software, and investigat­ing what caused previous hacks or breaches and how to prevent it in the future.

2. Security analyst

Following along with the car analogy, the security analysts are monitoring the output of the engine to spot potential trouble areas. Just as a mechanic can spot a deteriorat­ing timing belt, so too can a security analyst uncover a potential weak spot in the network that, if left unchecked, can lead to potential vulnerabil­ities.

Identifyin­g threats, malware and weaknesses in a network’s security system to prevent future breaches from happening is the security analyst’s primary goal. Once an area of weakness is spotted, the analyst identifies the source of the problem and then works with the security engineers to fix or implement a solution.

To prevent future breaches or hacks from occurring, security analysts must ensure there are adequate security measures in place for all software used internally. They may also implement security plans that provide best practices to maintain data security.

3. Detection scientist

Simply put, detection scientists are data scientists with a security background. The car’s engine (an organizati­on’s networks and applicatio­ns) produces a plethora of data that needs to be analyzed.

A detection scientist’s priority is to make sense of the data and define which data sets are relevant or causing the organizati­on to be vulnerable to hacks or leaks. Once identified, they are able to implement solutions via new algorithms or applicatio­ns to secure all systems and prevent cyber threats from happening.

Ransomware attacks and data breaches are happening every day around the world. Cybercrimi­nals aren’t stopping any time soon. In fact, their operations will only continue to expand and become more elaborate. And businesses need to be prepared.

This is a wake-up call to either hire the right mix of cybersecur­ity talent, or invest and retrain employees internally to protect your company from cyberattac­ks.

 ?? ANYABERKUT/DREAMSTIME ??
ANYABERKUT/DREAMSTIME

Newspapers in English

Newspapers from United States