How to Attract, Hire and Retain Mid-Level Cybersecurity Roles

Subscribers:
64,099
Published on ● Video Link: https://www.youtube.com/watch?v=g2IVhIM4lUM



Category:
Guide
Duration: 47:07
460 views
22


Come learn the outcomes of the 2024 SANS | GIAC Cyber Workforce Research Report which is based on a first-of-its-kind survey that analyzed the cybersecurity workforce with the goal of identifying the key factors to successfully build high-performing cybersecurity teams.\n\nThe discussion will include top leaders from some of the largest companies and federal agencies on how they are building up their talent pipeline. Some of the items in the discussion include:\n\n- How to Build an Effective Cybersecurity Team\n- What Should You Look for In the Hiring Process\n- How Do you Retain Talent\n- How to Be Inclusive with Bringing in Non-Traditional Talent\n- What Resources, Management Support and Investment Do You Need to be Successful.\n\nJoin Ed Skoudis, SANS Fellow & President of the SANS Technology Institute, and these study participants:\n- Jay Bhalodia, Managing Director, Security Customer Success, Microsoft Federal\n- Brian Correia, Director of Business Development, GIAC\n- Austin Cusak, Technical Leadership Development Expert, Cybersecurity and Infrastructure Security Agency (CISA).\n- Lynsey Caldwell Cyber Workforce Planning Director, Leidos




Other Videos By SANS Institute


2024-09-12SANS Compliance Countdown 2024
2024-08-29Elevating Your Audit Strategy: Insights from the CRF Audit Framework
2024-08-26SANS Live Training: Security West 2024 Recap
2024-08-16Navigating the Path to Zero Trust in 2024
2024-08-06A Winning Partnership in Cybersecurity Talent Development
2024-08-02SANS | GIAC Workforce Report Outcomes Panel Conversation
2024-08-01Breaking Barriers: Christine Morency’s Inspirational Cybersecurity Journey
2024-08-01Breaking Barriers: Christine Morency's Inspirational Cybersecurity Journey
2024-07-29Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
2024-07-24Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
2024-07-23How to Attract, Hire and Retain Mid-Level Cybersecurity Roles
2024-07-20Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 8
2024-07-18Understanding the New NIS2 Directive: Compliance for EU Businesses
2024-07-10Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7
2024-07-09Understanding Ransomware Threats to ESXi: Essential Insights
2024-07-01Cyber Wars: The Legal Force Awakens
2024-06-30Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 6
2024-06-26Understanding the New NIS2 Directive: Compliance for EU Businesses
2024-06-25Understanding the New NIS2 Directive: Compliance for EU Businesses
2024-06-20Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 5
2024-06-11Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights