Desired cybersecurity skills and skills acquisition methods in the organizations
Aaltola, K., Ruoslahti, H., & Heinonen, J. (2022). Desired cybersecurity skills and skills acquisition methods in the organizations. In T. Eze, N. Khan, & C. Onwubiko (Eds.), ECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and Security (21, pp. 1-9). Academic Conferences International Ltd. Proceedings of the European conference on cyber warfare and security. https://doi.org/10.34190/eccws.21.1.293
DisciplineKoulutusteknologia ja kognitiotiedeKognitiotiedeLearning and Cognitive SciencesCognitive Science
© 2022 European Conference on Cyber Warfare and Security
Key personnel and their competences play important roles in continuity management and improving resilience of cybersecurity in organizations. Researchers have addressed many topics and studies in the cybersecurity domain. However, relevant cybersecurity skills and acquisition of them in expertise development, have only been partially touched. If designed systematically and properly, cybersecurity training can improve cybersecurity expertise to ensure better performance in complex cybersecurity situations. More through study on the acquisition of cybersecurity skills, and work-life needs are needed. The research three questions of this study are: How do work-life representatives see cybersecurity? How do work-life representatives see cybersecurity related skills? How do work-life representatives see methods for skills acquisition in the organizations? The work is multi-method, as it builds on both a literature review on skills acquisition in cybersecurity, and on empirical findings of a questionnaire study on cybersecurity skills desired by the work-life representatives. The findings show that cybersecurity is seen important in the organizations. The demanded skills from the employees focus especially on communication and situational awareness. There is a specific need for training with Cyber Ranges (CR) to ensure skills acquisition on cybersecurity. These results can be used to plan and design training and education for future professionals. This study aims to promote constructive discussion on skills and their acquisition in the cybersecurity domain. ...
PublisherAcademic Conferences International Ltd
Parent publication ISBN978-1-914587-41-2
ConferenceEuropean Conference on Cyber Warfare and Security
Is part of publicationECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and Security
Publication in research information system
MetadataShow full item record
Showing items with similar title or keywords.
Cybersecurity Attacks on Software Logic and Error Handling within AIS Implementations : A Systematic Testing of Resilience Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System ...
Salmenpää, Tomi (Springer, 2022)This chapter focuses mainly to proactive means in information security and more specifically governance of information security in civil aviation. The reason is that, to find sustainable, coherent and holistic way to ...
Cybersecurity attacks on software logic and error handling within ADS-B implementations : systematic testing of resilience and countermeasures Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in ...
Salminen, Hanna; von Bonsdorff, Mikaela; von Bonsdorff, Monika (Emerald Publishing Limited, 2019)
Kuusisto, Rauno; Kuusisto, Tuija (Peregrine Technical Solutions, LLC, 2013)The purpose of this paper is to form a preliminary hypothesis about how to identify characteristics that a leader needs to focus on when aiming at cyber-security leadership. The paper studies the key concepts and terms of ...