Endpoint

11/6/2017
01:10 PM
50%
50%

Virtual Reality Could Serve as a Cybersecurity Recruiting Tool

A recent study finds 74% of millennials and post-millennials agree VR use in cybersecurity tools may entice them into an IT security career.

Cybersecurity tools that employ immersive technologies such as virtual reality and augmented reality could attract millennials and post-millennials to IT security careers, a new study shows.

Across the globe, the IT security industry is expected to face a talent shortfall of 1.8 million workers by 2022. But the Immersive Technologies & The Future of Cybersecurity report - a survey of 524 US residents between 16-to 24-years old - shows that virtual reality tools could attract security talent: some 74% of the survey respondents say they are likely to pursue an IT security career if cybersecurity tools incorporate virtual reality and augmented reality technologies.

Additionally, 77% of survey respondents say they would enjoy using these tools if that were the case, according to the ESG study commissioned by ProtectWise.

The majority of survey respondents already have extensive exposure to virtual reality and augmented reality technologies through online and video games, the report notes. According to the survey:

  • 40% have been gamers for at least 10 years
  • 76% play online games on a weekly basis, averaging 9 hours of gaming each week
  • 58% have used or regularly use virtual reality technologies in games

"These kids are highly exposed to gaming principles and are aware of spatial familiarity," says Gene Stevens, co-founder and CTO of ProtectWise. "I was shocked by their positive response to pursuing a career in cybersecurity. I was expecting to see more resistance."

ProtectWise, which is beta-testing its so-called Immersive Grid SOC service that includes a 3D visual layer for monitoring security alerts, commissioned the report to determine what if any correlation exists between virtual reality and augmented cybersecurity tools and recruiting future infosec professionals. Immersive Grid uses both virtual reality andaugmented reality.

"We did the survey to see if it makes sense to draw millennials and post-millennials to the platform, IT and cybersecurity as a job," Stevens says.

Some 67% percent of survey respondents haven't taken a cybersecurity class in school, with 65% of that group saying the reason is that their educational institution didn't offer such courses. Nearly a quarter of survey respondents say they avoided cybersecurity courses due to a lack of interest, while 15% say they don't have enough technical knowledge to take these classes.

Takeaway for Employers

Although Stevens estimates few companies are offering virtual reality and augmented reality in their cybersecurity tools, he hopes the numbers will grow because of the potential to attract new hires to the IT security workforce.

Meantime, some 33% of respondents are interested in a video-game development career, while 9% want to pursue a cybersecurity career.

Stevens notes by infusing immersive technologies as seen in video games into cybersecurity tools the IT security industry stands a better chance of winning over more prospective job candidates.

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Researchers Offer a 'VirusTotal for ICS'
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.