{"id":376,"date":"2017-01-26T14:20:46","date_gmt":"2017-01-26T14:20:46","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/desperately-seeking-cybersecurity-skills\/"},"modified":"2019-05-29T12:29:31","modified_gmt":"2019-05-29T12:29:31","slug":"desperately-seeking-cybersecurity-skills","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/","title":{"rendered":"Desperately seeking cybersecurity skills"},"content":{"rendered":"<p class=\"wls-paragraph\">These are politically charged times in America, but the rampant cybercrime that is victimizing US companies and consumers these days should not be taken as a sign that the federal government has not been trying to do something about the problems of cybersecurity. Four years ago, president Obama launched the process that led to the creation of the NIST Cybersecurity Framework and a broad range of organizations now use this framework to guide their cybersecurity efforts.<\/p>\n<p class=\"wls-paragraph\">Unfortunately, many of these efforts are hindered by a shortage of qualified candidates for cybersecurity jobs. We have talked about this cybersecurity skills gap before on WeLiveSecurity; for example, <a href=\"http:\/\/www.welivesecurity.com\/2016\/12\/16\/cybersecurity-skills-gap-big-and-bad\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>,&nbsp;and more <a href=\"http:\/\/www.welivesecurity.com\/2017\/01\/19\/cybersecurity-skills-shortage-still-global-problem\/\" target=\"_blank\" rel=\"noopener noreferrer\">recently, here<\/a>. The gap is the result of several factors, including a rapid expansion in the use of digital technology, accompanied by an increase in its abuse for criminal purposes.<\/p>\n<p class=\"wls-paragraph\">At the same time, a lot of experienced security professionals are reaching retirement age, while many of today\u2019s students find the potential rewards of building tomorrow\u2019s technology more appealing than the task of securing yesterday\u2019s.<\/p>\n<p><span class=\"block_quote_right\">\u201cEvery year in the US there are 128,000 openings for Information Security Analysts, but only 88,000 workers currently employed in those positions.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">This is another area where the federal government has been proactive. Just a few months into his first term, Obama launched the National Initiative for Cybersecurity Education (NICE) to address the need to expand the cybersecurity workforce.<\/p>\n<p class=\"wls-paragraph\">A very visible example of these federal efforts is the website <a href=\"http:\/\/cyberseek.org\" target=\"_blank\" rel=\"noopener noreferrer\">CyberSeek.org<\/a>, which provides \u201cdetailed, actionable data about supply and demand in the cybersecurity job market\u201d.<\/p>\n<p class=\"wls-paragraph\">Unfortunately, the cybersecurity skills gap is proving to be a tough problem to solve. Consider these numbers from the CyberSeek site: \u201cEvery year in the US there are 128,000 openings for information security analysts, but only 88,000 workers currently employed in those positions \u2013 a talent shortfall of 40,000 workers for cybersecurity\u2019s largest job.\u201d<\/p>\n<p class=\"wls-paragraph\">But wait, there\u2019s more (or less, depending on how you look at it): \u201cThere are 220,000 additional openings requesting cybersecurity-related skills, and employers are struggling to find workers who possess them. Jobs requesting skills, for example, remain open 96 days on average.\u201d<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88596\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_405360073-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_405360073-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_405360073-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_405360073-1-65x42.jpg 65w\" alt=\"Cloud computing\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">CyberSeek offers two interesting tools to help deal with this problem: the Career Pathway and the Cybersecurity Supply\/Demand Heat Map. The latter is regularly updated and presents some eye-opening numbers. Consider the number of online job listings for cybersecurity-related positions from July 2015 through June 2016: roughly 350,000.<\/p>\n<p class=\"wls-paragraph\">To put that in context, consider the estimate for the total number of employed cybersecurity workers in 2016: about 780,000. You don\u2019t have to be an expert in labor economics to know that things are out of whack when one year\u2019s worth of job openings in an industry is 45% of the total workforce.<\/p>\n<p class=\"wls-paragraph\">Another indicator of things being \u201cout of whack\u201d \u2013 which is not the technical term, but definitely seems to describe the situation \u2013 is the number of job openings in the US that request the Certified Information System Security Professional qualification, relative to the number of people in the US who are CISSPs: 93,000 to 70,000.<\/p>\n<p class=\"wls-paragraph\">This particular gap, of 23,000 people, tells me two things. First, there are probably not enough CISSPs in America right now; and second, a significant number of those job openings could probably be filled by people who don\u2019t have their CISSP. Why would that be? Because too many companies don\u2019t understand what a CISSP means, and only ask for it because they see it listed in other security job ads. I wrote about <a href=\"http:\/\/www.welivesecurity.com\/2016\/05\/28\/cissp-certified-information-systems-security-professional\/\" target=\"_blank\" rel=\"noopener noreferrer\">this problem last year<\/a>, when I reached my 20-year anniversary as a CISSP, and clearly some of the issues that I identified persist.<\/p>\n<p><span class=\"block_quote_right\">\u201cToo many companies don\u2019t understand what a CISSP means, and only ask for it because they see it listed in other security job ads.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">One of the most frustrating issues is the continuing lack of clarity about cybersecurity roles and KSAs: the knowledge, skills, and abilities required to perform the different roles that comprise the information systems security mission.<\/p>\n<p class=\"wls-paragraph\">That\u2019s where the CyberSeek Career Pathway comes into play. This interactive tool embodies the National Cybersecurity Workforce Framework (the Workforce Framework), the initial goal of which was to establish a standard taxonomy for all cybersecurity work and the workers who perform it, regardless of employer or industry sector.<\/p>\n<p class=\"wls-paragraph\">To accomplish this, NICE resolved cybersecurity work into 31 specialty areas organized into seven categories: Securely Provision; Operate and Maintain; Protect and Defend; Investigate; Collect and Operate; Analyze; Oversight and Development. NICE went on to identify the KSAs required for each role and then mapped possible career paths for cybersecurity workers, as seen here on the CyberSeek website:<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88588\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/cyberseek-pathway-tool-qeu37.jpg\" sizes=\"auto, (max-width: 617px) 100vw, 617px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/cyberseek-pathway-tool-qeu37.jpg 711w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/cyberseek-pathway-tool-qeu37-300x256.jpg 300w\" alt=\"cyberseek-pathway-tool-qeu37\" width=\"617\" height=\"527\"><\/p>\n<p class=\"wls-paragraph\">The CyberSeek tool does more than you see there, allowing you to drill down to the education, skills, and qualifications requested for any given job description, with alternative titles used for that job, the number of openings, average salary, and pay range. If someone is interested in pursuing a job in cybersecurity then the <a href=\"https:\/\/niccs.us-cert.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Initiative for Cybersecurity Careers and Studies<\/a> (NICCS) provides an online resource for locating cybersecurity training. The NICCS site lists over 3,000 cybersecurity-related training courses offered in the US and you can search them by keyword, specialty, and location:<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88587\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/niccs-map-6f6ys.jpg\" sizes=\"auto, (max-width: 528px) 100vw, 528px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/niccs-map-6f6ys.jpg 493w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/niccs-map-6f6ys-300x197.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/niccs-map-6f6ys-65x42.jpg 65w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/niccs-map-6f6ys-114x76.jpg 114w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/niccs-map-6f6ys-97x65.jpg 97w\" alt=\"niccs-map-6f6ys\" width=\"528\" height=\"346\"><\/p>\n<p class=\"wls-paragraph\">These tools are free and I hope that they will help people to enter, and progress within, the cybersecurity field. Unfortunately, this field is in competition with many others. In other words, the cybersecurity skills gap is not the only gap the US has to worry about.<\/p>\n<p class=\"wls-paragraph\">You may have seen this <a href=\"http:\/\/www.reuters.com\/article\/us-usa-trump-infrastructure-idUSKBN148121\" target=\"_blank\" rel=\"noopener noreferrer\">headline last month<\/a>: \u201cTrump\u2019s infrastructure splurge would collide with US skilled labor crunch\u201d. And earlier this year there was this warning in the <a href=\"http:\/\/blogs.wsj.com\/economics\/2016\/04\/19\/the-u-s-occupations-at-greatest-risk-of-a-labor-shortage\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wall Street Journal<\/a>: \u201cThe US could run out of occupational therapists, railroad engineers and other workers, potentially leaving the economy in a long-term slump\u201d.<\/p>\n<p class=\"wls-paragraph\">The US Federal Reserve Board considers 4.8% to be \u201cthe natural rate of unemployment\u201d; in other words, anything below that constitutes full employment. That means most job openings have to be filled by people leaving existing jobs. The US unemployment rate last month was 4.7%, so it\u2019s not like the country has a lot of \u201cspare\u201d people from whom to recruit the cybersecurity workforce. I fear the skills gap may well persist for some time, despite our best efforts to reduce it.<\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"http:\/\/www.welivesecurity.com\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>These are politically charged times in America, but the rampant cybercrime that is victimizing US companies and consumers these days should not be taken as a sign that the federal government has not been trying to do something about the problems of cybersecurity. Four years ago, president Obama launched the process that led to the<\/p>\n","protected":false},"author":5,"featured_media":1745,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147],"tags":[],"class_list":["post-376","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Desperately seeking cybersecurity skills - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Desperately seeking cybersecurity skills\" \/>\n<meta property=\"og:description\" content=\"These are politically charged times in America, but the rampant cybercrime that is victimizing US companies and consumers these days should not be taken as a sign that the federal government has not been trying to do something about the problems of cybersecurity. Four years ago, president Obama launched the process that led to the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-26T14:20:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:29:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_547901104-1-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Desperately seeking cybersecurity skills\",\"datePublished\":\"2017-01-26T14:20:46+00:00\",\"dateModified\":\"2019-05-29T12:29:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/\"},\"wordCount\":1046,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_547901104-1-623x410.jpg\",\"articleSection\":[\"cybercrime\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/\",\"name\":\"Desperately seeking cybersecurity skills - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_547901104-1-623x410.jpg\",\"datePublished\":\"2017-01-26T14:20:46+00:00\",\"dateModified\":\"2019-05-29T12:29:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_547901104-1-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_547901104-1-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Desperately seeking cybersecurity skills\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/26\\\/desperately-seeking-cybersecurity-skills\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Desperately seeking cybersecurity skills - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/","og_locale":"en_US","og_type":"article","og_title":"Desperately seeking cybersecurity skills","og_description":"These are politically charged times in America, but the rampant cybercrime that is victimizing US companies and consumers these days should not be taken as a sign that the federal government has not been trying to do something about the problems of cybersecurity. Four years ago, president Obama launched the process that led to the","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-01-26T14:20:46+00:00","article_modified_time":"2019-05-29T12:29:31+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_547901104-1-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Desperately seeking cybersecurity skills","datePublished":"2017-01-26T14:20:46+00:00","dateModified":"2019-05-29T12:29:31+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/"},"wordCount":1046,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_547901104-1-623x410.jpg","articleSection":["cybercrime"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/","name":"Desperately seeking cybersecurity skills - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_547901104-1-623x410.jpg","datePublished":"2017-01-26T14:20:46+00:00","dateModified":"2019-05-29T12:29:31+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_547901104-1-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_547901104-1-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Desperately seeking cybersecurity skills"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=376"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/376\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1745"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}