• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Consumer   »   Turning Hackers into InfoSec Pros

Turning Hackers into InfoSec Pros

  • Posted on:April 2, 2015
  • Posted in:Consumer, Security, Social Media
  • Posted by:
    Gavin Donovan
0

We recently attended the South by Southwest (SXSW) Conference in Austin, Texas and were pleased to discover cybersecurity and privacy were popular topics this year. One session in particular given by a panel including the Secret Service caught our attention, and focused on why hackers hack and what we, as a society, can do about it.

A key to this is understanding hackers themselves. The typical, criminal hacker is young, intelligent and extremely tech savvy. They are normally bored, and looking for challenges. With on overall feeling of powerlessness, the Internet provides an avenue for “expression.” The act of hacking is perceived as a game and outcomes, victimless. They are often driven by financial gain, and an attempt at global notoriety.

Interestingly, many hackers don’t act with malicious intent initially. They are exploring, experimenting with, and perfecting, their skills as a game or hobby. At this early stage (sometimes as early as middle school), the fact they’re breaking laws is overlooked and the consequences of actions aren’t fully grasped.

This initial phase is where opportunities lie for a positive influence. If we can reach these highly talented individuals at the beginning stages of experimentation, we can hone these skills for good. Eyes could potentially be opened to the other side of hacking—becoming a “white hat.”

Eventually, their technology acumen could be cultivated towards becoming an information security analyst, security engineer, penetration tester or security consultant, just to name a few options. We can educate them about the excellent salaries these positions offer and how there is a pressing, ongoing need. We can empower them with the knowledge that their skills can help save companies and customers money and resources by identifying and repairing vulnerabilities before they’re exploited maliciously.

This may require a few changes. For example, what if schools were to install a special education track for these students that recognizes their passion and talents, and works to encourage their development? What if more companies decided to accommodate these professionals’ typical preference for flexible working hours and dressing casually, and accepted this as a norm? What if more news stories focused on the victims and damage of hacking, as opposed to the genius of the hacker?

Historic battles have always been fought on land, sea and air. Today’s battles are fought in a fourth medium—cyberspace. It should be a priority to recruit the best and brightest to stand on the right side of history as soon as possible. With our society permeated in technology and connectivity, the future could depend on it!

Related posts:

  1. Hackers, Zombies, and Bots, Oh My!
  2. This Week in Security News: Hackers and Ransoms
  3. IT pros concerned about smart grid security
  4. Healthcare InfoSec: Checking for a Pulse

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.