Feeds

Minister calls for more cyber security experts

'Holistic national response' needed

Top 5 reasons to deploy VMware with Tegile

The minister for security has said the government has to do something about a shortage of emerging cyber security professionals.

Baroness Neville-Jones said the problem Britain faces is that it has "a talented, but small pool of highly skilled public and private sector cyber security individuals".

Speaking at the Cyber Security Challenge UK launch on 26 July 2010, she told an audience of online security professionals that there needs to be a "holistic national response" to the lack of online security experts in the UK. She also said that she wants to see government "take a lead" in improving the situation.

"They are extraordinarily valuable to us, but as I say we don't have enough. I think the task, and I think this is the task that those who have organised these competitions have spotted, is that future online security professionals have to be encouraged and nurtured," said Neville-Jones.

The Cyber Security Challenge consists of three competitions, which aim to find talented individuals who are capable of defending organisations against cyber attacks. The public and private funded programme has the support of the government, the Open University and industry suppliers like EADS.

The winners of the three competitions will be announced next year and prizes include bursaries for electronics and security related university courses and memberships to professional online security bodies.

Neville-Jones said she hopes the competitions will dispel the "techie image" of cyber security jobs.

"As I say, in future security does have to be a part of the IT industry and that has implications, does it not, for the educational curriculum. We do need to see more ICT training in schools and we do need to see more purpose filled courses at university and higher education," she added.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Home Depot ignored staff warnings of security fail laundry list
'Just use cash', former security staffer warns friends
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.