Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

A Cybersecurity Institute Plans to Shrink the Skills Gap - for the C-Level Too

A common misconception regarding the glaring need for professionals with knowledge of cybersecurity is that the shortage is exclusive to technical personnel. 

Granted, most companies demand a larger and more skilled IT workforce that can keep up with all of today's security challenges, including the growing attack surface, advanced threats and product complexity - which is why more organizations are turning to a managed security services provider for help. But there is less-heralded segment of the employee ranks that needs to grow its security acumen as well: members of the executive team and board of directors. Cybersecurity has reached C-level status, and failure by the very top to apply oversight, infuse a culture of security and recognize the discipline's impact on a company's bottom line may result in greater exposure.

Of course, finding workers with the right technical chops to handle cybersecurity tasks is also critical. Indeed security is complex, so companies that are trying to hire competent professionals with actual hands-on experience are likely having a difficult time. But they may have potential talent closer than they think - computer professionals who can adapt to security roles with a little bit of life-like training.

Singapore Telecommunications Ltd., took a big step forward this week to enhance the cybersecurity skills and preparedness of stakeholders across businesses and governments in Asia-Pacific by launching the Singtel Cyber Security Institute (CSI). A hybrid between an advanced "cyber range" and an educational institute, the CSI is a first-of-its-kind in the region to test and train companies in dealing with sophisticated cyberthreats.

Housed in a permanent space of more than 10,000 square feet, the institute provides cyber skills development and education programs tailored to the varying needs of company boards, C-suite management, technology and operational staff. Boards and C-suite-level participants will be trained in the areas of cyberthreat awareness, risk management, business continuity planning and crisis communications preparation. The cyber operations team will be trained in defense and response capabilities to sharpen their skills.

The CSI can emulate the environments and operations of enterprises using state-of-the-art technologies. Like other cyber ranges, the facility can simulate cyberattacks to test a company's inherent vulnerabilities and defense and response capabilities. Unlike other ranges, however, the new facility can easily replicate any company's operating environment and use the latest range of cyberthreats, including an extensive library of viruses and malware, to simulate these attacks. 

For more information, visit here.

Dan Kaplan is manager of online content at Trustwave and a former IT security reporter and editor.

Latest Trustwave Blogs

Defending Healthcare Databases: Strategies to Safeguard Critical Information

The healthcare sector continues to be a primary target for threat actors, with 2023 seeing a record number of data breaches and compromised records. While successful attacks are inevitable, it’s...

Read More

Trustwave SpiderLabs: Ransomware Gangs Dominate 2024 Education Threat Landscape

The security teams manning the defenses at the higher education and primary school system levels often find themselves being tested by threat actors taking advantage of the sector's inherent cyber...

Read More

LockBit Takedown: Law Enforcement Disrupts Operations, but Ransomware Threats Likely to Persist

The news that US, UK, and other international law enforcement agencies disrupted LockBit is welcome, as stopping any threat group activity is always a positive. The unfortunate aspect is this blow...

Read More