"Minst 150 miljarder kronor. Så mycket bedömer Jan Kallberg och Erik Lakomaa att Sverige har förlorat på grund av ett översättningsfel. I en ny rapport presenterar de varför Sveriges implementering av EU:s direktiv om vidareutnyttjande av handlingar från den offentliga förvaltningen inte fungerat. De förklarar också svårigheten att förändra den svenska statsförvaltningen åt något annat håll än på den redan inslagna vägen."
If you were 15 years old when you were fascinated by your school's Commodore PET in 1979 and are still in IT, you have almost 40 years of experience. You have seen it all: IBM XT, Pentium 2, LOTUS 1-2-3, O/S2, cloud computing and mobile apps. Why do I say it like this? I have a simple reason: We look at IT professionals with the metrics of the 19th century. Naturally, you needed to be young, strong and quick to be one of the riders in the "Army on the Frontier" dashing across the Rockies, but things have changed.
Cyber is not your traditional war. In cyber we don't walk for days, endure thirst and intense sunshine. Instead we shout "Is there a slice over for me?" when the pizza is ripped apart by hungry nerds in an air-conditioned environment.
The fact that we have individuals who are in their early 50s with almost 40 years of IT experience is a national asset — and we have a lot of them. You can just visit any major tech conference where they flock around the next new cutting-edge technology like ants on a lump of sugar. There are thousands and thousands of mature tech nerds.
What if we could create Department of Defense reserve cyber units that are Network Engineering-Resilience and Defense (NERD) units? They might not meet the DoD’s height and weight ratio — and they are over normal recruiting age — but I believe they could help the 6,000 counties and 50 states that face the same cyber challenge as the federal sector.
The information security management profession continues to evolve. Universities and other educational institutions must understand the needs of the professional community to provide the market with graduates possessing the required skills and knowledge that enterprises need. The ISACA® Model Curriculum for Information Security Management, 2nd Edition provides academic institutions with a basic framework of the education required to develop the skills needed to make students employable in the profession.