Far too often organizations and their hiring managers seeking to find, hire and retain the talent needed to fill their information security roles look outward and wonder why there aren't enough qualified people, forgetting that they have an active role to play in the process.

That's where the program discussed in today's podcast comes in. It is organized through a strong partnership between industry cybersecurity leaders and a research-driven university department -- which happens to NOT reside in the computer science department, mind you; but in the school of policy studies.

What makes this program powerful? It's the combination of policy studies + test-based research + the connection to the real-world through the eyes of the CISO. The icing on this thoughtfully-baked cake, if you will, is the focus on critical thinking and problem-solving that takes the student out of the textbooks and theoretical studies and into a world of solutions exploration and threat elimination that perhaps has yet to be discovered.

Here's an excerpt from the department website:

[An evidence-based cybersecurity approach provides an ideal framework for conceptualizing an interdisciplinary problem like cyber-dependent crime because it stresses moving beyond decision makers’ political, financial, social backgrounds, and personal experiences to a model in which policy decisions are made based on scientific research findings. Moreover, this approach draws on the assumption that solutions to human behaviors may be affected by the interconnected behavior of victims, offenders, and law enforcement agencies operating within the cyber realm, and that the effectiveness of the different interventions in achieving its goals should be assessed through rigorous scientific research methods.

The evidence-based cybersecurity approach encourages its followers to think of the situational environments that provide the structural resources and social opportunities for cyber-dependent crimes to emerge. As a result, advocates of this approach suggest that effective protection of computer environments should be the product of empirically proven “nudges” that push legitimate users of the environment to comply with organizational cybersecurity policies while driving illegitimate users of the system to behave in predictable ways on an attacked system.]

From students to hiring managers, this conversation will certainly get you thinking about things differently.

If you're ready to think critically, open your mind and press play.

Guests
Sally Wallace, Dean of the Andrew Young School of Policy Studies at Georgia State University

David Maimon, Director of Center for Evidence-Based Cybersecurity at Georgia State University

Flavio Villanustre, VP of Technology and CISO for LexisNexis Risk Solutions

Resources
Learn more about the program
https://ebcs.gsu.edu/evidence/

_____________________
This Episode Sponsors:

Bugcrowd: https://itspm.ag/itspbgcweb

Devo: https://itspm.ag/itspdvweb

For more podcast stories from The Academy: 
https://www.itspmagazine.com/the-academy

Are you interested in sponsoring an ITSPmagazine Channel?
www.itspmagazine.com/talk-show-sponsorships