SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Solution Brief
IBM Software
IBM Kenexa Predictive
Hiring for Cyber Security
Roles
Identify and acquire candidates like your top performers
using behavioural science, data and analytics.
Highlights:
•	 Design a bespoke assessment that is
predictive of future performance within
Cyber Security roles for your organisation.
•	 Understand the relationship between
human capital metrics and business perfor-
mance for Cyber Security roles.
•	 Use for recruitment of internal and external
talent and assess to identify and acquire
candidates like your top performers in
Cyber Security job roles
•	 Address the skills gap internally using the
success profile and identify training and
development interventions
IBM understands that there is a critical business requirement, to identify
individuals with skills necessary to investigate current breaches and prevent
potential attacks/breaches from happening. Business executives in US and
Europe consider cyber security as their highest priority within digital
technology, as it is estimated that the cyber security workforce shortage is
expected to reach 1.5 million unfilled positions by 2019. Therefore, the
need to defend businesses and organisational systems from external threats
has become imperative more than ever before.
IBM Kenexa Predictive Hiring for Cyber Security Roles helps answer a
critical question facing many businesses; “How can we identify, assess,
develop and retain talent that have both the capacity and capability to
defend businesses and organisational systems from external threats?”
IBM Kenexa Predictive Hiring solution for Cyber Security roles can help
to identify and define the critical aptitude, skills and competences that
drive top Cyber Security performance in your organisation, as well as help
you understand how to recruit more like your top performers to drive
business success and reduce cyber risks.
This bespoke solution is a combination of consultancy design to help
identify the specific factors critical to organizational success, and bespoke
content design to ensure the assessment is predictive of individual Cyber
Security performance. In turn, the tool can be used for selection of
high-potential candidates and employees most suited for success on the
job.
Solution Brief
IBM Software
2
Data-driven decisions
IBM Kenexa Predictive Hiring for Cyber Security Roles can
help organizations illustrate the relationship among people and
unit inputs, external factors and business outcomes, allowing
insight into the impact of human capital metrics on business
performance. Using this insight, the solution provides an
improved ability to make data-driven decisions about the
relative merits of human capital initiatives, and enables you to
make improvements in your hiring practices.
Identifying top performers
IBM Kenexa Predictive Hiring for Cyber Security solution
helps you identify the critical performance characteristics of
your best talent in Cyber Security roles and helps you acquire
more like them, improving the quality of hire and acquiring the
right talent for business success.
Did you know?
The most serious cyber security breaches for big businesses now starts at £1.46 million - more than double 2014 figure of £600,000. For small and medium-sized
enterprises, the cost of the most serious breaches can now reach as high as £310,800 - up from £115,000 in 2014, according to UK government’s Information Security
Breaches Survey 2015
Figure 01: Research, identify and hire candidates matching top performer profiles.
PEOPLE, UNIT AND
BUSINESS LINKAGE
RESEARCH:
Key elements that
differentiate that
performance
IDENTIFY IMPACT:
The link between
human capital
metrics and business
performance
LEARN FROM
YOUR BEST:
Identify traits
of top performers
in a key job
DEVELOP AND
DEPLOY
ASSESSMENT:
Hire candidates who
match the profile
of top performers
ENSURE SUCCESS: Review ROI, adverse impact, consulting follow up
Learning from MOD Cyber Security Roles
IBM Smarter Workforce consultants in collaboration with the
Ministry of Defence and their Defence Cyber Subject Matter
Experts researched, designed and developed a unique suite of
assessments that identify the best candidates with the right
aptitude, skills and competences to succeed in Cyber jobs
(https://www.gov.uk/government/news/defence-cyber-test-
launched).
The IBM Kenexa consultants will use their knowledge from the
project to ensure the Predictive Hiring for Cyber Security
solution will be bespoke to your organisation. The solution
content will be a combination of existing IBM content or new
content, ensuring the tool is robust, job relevant, reliable and
valid in predicting future job performance in cyber security job
roles in corporate settings.
LOS14022-USEN-04
Please Recycle
© Copyright IBM Corporation 2015
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States of America
September 2015
IBM, the IBM logo and ibm.com are trademarks of International Business Machines
Corporation in the United States, other countries or both. If these and other IBM
trademarked terms are marked on their first occurrence in this information with a
trademark symbol (® or TM), these symbols indicate U.S. registered or common law
trademarks owned by IBM at the time this information was published. Such
trademarks may also be registered or common law trademarks in other countries.
Other product, company or service names may be trademarks or service marks of
others. A current list of IBM trademarks is available at “Copyright and trademark
information” at: ibm.com/legal/copytrade.shtml
The content in this document (including currency OR pricing references which
exclude applicable taxes) is current as of the initial date of publication and may be
changed by IBM at any time. Not all offerings are available in every country in which
IBM operates.
The performance data discussed herein is presented as derived under specific
operating conditions. Actual results may vary. THE INFORMATION IN THIS
DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY,
EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY
WARRANTY OR CONDITION OF NONINFRINGEMENT. IBM products are
warranted according to the terms and conditions of the agreements under which they
are provided.

Contenu connexe

Similaire à Ibm kenexa predictive hiring for cyber security roles

Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security frameworkYann Lecourt
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksVincent Bellamy
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYForgeRock
 
IBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Insight
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptxSonaliG6
 
AI: A risk and way to manage risk
AI: A risk and way to manage riskAI: A risk and way to manage risk
AI: A risk and way to manage riskKaran Sachdeva
 
AD 1656 - Transforming social data into business insight
AD 1656 - Transforming social data into business insightAD 1656 - Transforming social data into business insight
AD 1656 - Transforming social data into business insightVincent Burckhardt
 
Business Analisis: As tendências de mercado
Business Analisis: As tendências de mercadoBusiness Analisis: As tendências de mercado
Business Analisis: As tendências de mercadoIIBA Portugal Chapter
 
Big Data & Analytics Architecture
Big Data & Analytics ArchitectureBig Data & Analytics Architecture
Big Data & Analytics ArchitectureArvind Sathi
 
Desvendando o desenvolvimento seguro de software
Desvendando o desenvolvimento seguro de softwareDesvendando o desenvolvimento seguro de software
Desvendando o desenvolvimento seguro de softwareAllyson Chiarini
 
CyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MD
CyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MDCyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MD
CyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MDClearedJobs.Net
 
ArrowMiner
ArrowMinerArrowMiner
ArrowMinerdtsiolis
 
The 20 Best IT Jobs for 2013 and Beyond
The 20 Best IT Jobs for 2013 and BeyondThe 20 Best IT Jobs for 2013 and Beyond
The 20 Best IT Jobs for 2013 and BeyondMark Paszkowiak ☁
 

Similaire à Ibm kenexa predictive hiring for cyber security roles (20)

Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security framework
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
 
IBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Intelligence Software
IBM Business Intelligence Software
 
LOP14380USEN
LOP14380USENLOP14380USEN
LOP14380USEN
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 
IBM Watson Tradeoff Analytics AlChemy
IBM Watson Tradeoff Analytics AlChemyIBM Watson Tradeoff Analytics AlChemy
IBM Watson Tradeoff Analytics AlChemy
 
AI: A risk and way to manage risk
AI: A risk and way to manage riskAI: A risk and way to manage risk
AI: A risk and way to manage risk
 
AD 1656 - Transforming social data into business insight
AD 1656 - Transforming social data into business insightAD 1656 - Transforming social data into business insight
AD 1656 - Transforming social data into business insight
 
Business Analisis: As tendências de mercado
Business Analisis: As tendências de mercadoBusiness Analisis: As tendências de mercado
Business Analisis: As tendências de mercado
 
Big Data & Analytics Architecture
Big Data & Analytics ArchitectureBig Data & Analytics Architecture
Big Data & Analytics Architecture
 
Desvendando o desenvolvimento seguro de software
Desvendando o desenvolvimento seguro de softwareDesvendando o desenvolvimento seguro de software
Desvendando o desenvolvimento seguro de software
 
CyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MD
CyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MDCyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MD
CyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MD
 
DSP Internship Brief
DSP Internship BriefDSP Internship Brief
DSP Internship Brief
 
ArrowMiner
ArrowMinerArrowMiner
ArrowMiner
 
The 20 Best IT Jobs for 2013 and Beyond
The 20 Best IT Jobs for 2013 and BeyondThe 20 Best IT Jobs for 2013 and Beyond
The 20 Best IT Jobs for 2013 and Beyond
 

Plus de Pauline Mura

Innovating banking: Lessons from the world’s leading innovators
Innovating banking: Lessons from the world’s leading innovators Innovating banking: Lessons from the world’s leading innovators
Innovating banking: Lessons from the world’s leading innovators Pauline Mura
 
Banking redefined: disruption, transformation and the next generation bank
Banking redefined: disruption, transformation and the next generation bankBanking redefined: disruption, transformation and the next generation bank
Banking redefined: disruption, transformation and the next generation bankPauline Mura
 
Leading the pack in Blockchain banking
Leading the pack in Blockchain bankingLeading the pack in Blockchain banking
Leading the pack in Blockchain bankingPauline Mura
 
Etude ibm transformation digitale 2016: au delà des projets pilotes
Etude ibm transformation digitale 2016: au delà des projets pilotesEtude ibm transformation digitale 2016: au delà des projets pilotes
Etude ibm transformation digitale 2016: au delà des projets pilotesPauline Mura
 
Ibm employee voice
Ibm employee voice  Ibm employee voice
Ibm employee voice Pauline Mura
 
Ibm smarter workforce Unlock the people equation using workforce analytics to...
Ibm smarter workforce Unlock the people equation using workforce analytics to...Ibm smarter workforce Unlock the people equation using workforce analytics to...
Ibm smarter workforce Unlock the people equation using workforce analytics to...Pauline Mura
 
Redefining talent - the CHRO perspective
Redefining talent - the CHRO perspectiveRedefining talent - the CHRO perspective
Redefining talent - the CHRO perspectivePauline Mura
 
Faciliter les actions commerciales et participations publicitaires
Faciliter les actions commerciales et participations publicitairesFaciliter les actions commerciales et participations publicitaires
Faciliter les actions commerciales et participations publicitairesPauline Mura
 
Amplifying employee voice exec report
Amplifying employee voice exec reportAmplifying employee voice exec report
Amplifying employee voice exec reportPauline Mura
 
Amplifying employee voice exec report
Amplifying employee voice exec reportAmplifying employee voice exec report
Amplifying employee voice exec reportPauline Mura
 

Plus de Pauline Mura (10)

Innovating banking: Lessons from the world’s leading innovators
Innovating banking: Lessons from the world’s leading innovators Innovating banking: Lessons from the world’s leading innovators
Innovating banking: Lessons from the world’s leading innovators
 
Banking redefined: disruption, transformation and the next generation bank
Banking redefined: disruption, transformation and the next generation bankBanking redefined: disruption, transformation and the next generation bank
Banking redefined: disruption, transformation and the next generation bank
 
Leading the pack in Blockchain banking
Leading the pack in Blockchain bankingLeading the pack in Blockchain banking
Leading the pack in Blockchain banking
 
Etude ibm transformation digitale 2016: au delà des projets pilotes
Etude ibm transformation digitale 2016: au delà des projets pilotesEtude ibm transformation digitale 2016: au delà des projets pilotes
Etude ibm transformation digitale 2016: au delà des projets pilotes
 
Ibm employee voice
Ibm employee voice  Ibm employee voice
Ibm employee voice
 
Ibm smarter workforce Unlock the people equation using workforce analytics to...
Ibm smarter workforce Unlock the people equation using workforce analytics to...Ibm smarter workforce Unlock the people equation using workforce analytics to...
Ibm smarter workforce Unlock the people equation using workforce analytics to...
 
Redefining talent - the CHRO perspective
Redefining talent - the CHRO perspectiveRedefining talent - the CHRO perspective
Redefining talent - the CHRO perspective
 
Faciliter les actions commerciales et participations publicitaires
Faciliter les actions commerciales et participations publicitairesFaciliter les actions commerciales et participations publicitaires
Faciliter les actions commerciales et participations publicitaires
 
Amplifying employee voice exec report
Amplifying employee voice exec reportAmplifying employee voice exec report
Amplifying employee voice exec report
 
Amplifying employee voice exec report
Amplifying employee voice exec reportAmplifying employee voice exec report
Amplifying employee voice exec report
 

Dernier

The Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureThe Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureAggregage
 
Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...Sabuj Ahmed
 
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)twfkn8xj
 
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?hxwwranl
 
7 non-negotiable roles of Human Resource Management
7 non-negotiable roles of Human Resource Management7 non-negotiable roles of Human Resource Management
7 non-negotiable roles of Human Resource ManagementHireQuotient
 
Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.ShrayasiRoy
 
Recruitment & Selection Theory Models that Work for the Modern Workplace
Recruitment & Selection Theory Models that Work for the Modern WorkplaceRecruitment & Selection Theory Models that Work for the Modern Workplace
Recruitment & Selection Theory Models that Work for the Modern WorkplaceHireQuotient
 
Webinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary DataWebinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary DataPayScale, Inc.
 
Creative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for RecruitersCreative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for RecruitersHireQuotient
 
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdfThe Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdfJasper Colin
 
Top HR Intern Interview Questions to Ask and Their Ideal Answers
Top HR Intern Interview Questions to Ask and Their Ideal AnswersTop HR Intern Interview Questions to Ask and Their Ideal Answers
Top HR Intern Interview Questions to Ask and Their Ideal AnswersHireQuotient
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
Public Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & CompanyPublic Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & CompanyPhiferCompany
 
A Proven #1 Prospecting Hack You're Missing Out On
A Proven #1 Prospecting Hack You're Missing Out OnA Proven #1 Prospecting Hack You're Missing Out On
A Proven #1 Prospecting Hack You're Missing Out Onfross37
 
Intern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfIntern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfmarketing659039
 
Top 10 scenario-based questions for hiring a Team Leader
Top 10 scenario-based questions for hiring a Team LeaderTop 10 scenario-based questions for hiring a Team Leader
Top 10 scenario-based questions for hiring a Team LeaderHireQuotient
 
15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdf15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdfAlex Vate
 

Dernier (20)

The Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureThe Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance Culture
 
Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...
 
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
 
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
 
7 non-negotiable roles of Human Resource Management
7 non-negotiable roles of Human Resource Management7 non-negotiable roles of Human Resource Management
7 non-negotiable roles of Human Resource Management
 
Hot Sexy call girls in Preet Vihar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Preet Vihar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Preet Vihar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Preet Vihar🔝 9953056974 🔝 Delhi escort Service
 
Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.
 
Recruitment & Selection Theory Models that Work for the Modern Workplace
Recruitment & Selection Theory Models that Work for the Modern WorkplaceRecruitment & Selection Theory Models that Work for the Modern Workplace
Recruitment & Selection Theory Models that Work for the Modern Workplace
 
Webinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary DataWebinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary Data
 
Call Girls in Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in  Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in  Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
Creative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for RecruitersCreative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for Recruiters
 
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdfThe Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
 
Top HR Intern Interview Questions to Ask and Their Ideal Answers
Top HR Intern Interview Questions to Ask and Their Ideal AnswersTop HR Intern Interview Questions to Ask and Their Ideal Answers
Top HR Intern Interview Questions to Ask and Their Ideal Answers
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
Public Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & CompanyPublic Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & Company
 
9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR
9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR
9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR
 
A Proven #1 Prospecting Hack You're Missing Out On
A Proven #1 Prospecting Hack You're Missing Out OnA Proven #1 Prospecting Hack You're Missing Out On
A Proven #1 Prospecting Hack You're Missing Out On
 
Intern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfIntern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdf
 
Top 10 scenario-based questions for hiring a Team Leader
Top 10 scenario-based questions for hiring a Team LeaderTop 10 scenario-based questions for hiring a Team Leader
Top 10 scenario-based questions for hiring a Team Leader
 
15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdf15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdf
 

Ibm kenexa predictive hiring for cyber security roles

  • 1. Solution Brief IBM Software IBM Kenexa Predictive Hiring for Cyber Security Roles Identify and acquire candidates like your top performers using behavioural science, data and analytics. Highlights: • Design a bespoke assessment that is predictive of future performance within Cyber Security roles for your organisation. • Understand the relationship between human capital metrics and business perfor- mance for Cyber Security roles. • Use for recruitment of internal and external talent and assess to identify and acquire candidates like your top performers in Cyber Security job roles • Address the skills gap internally using the success profile and identify training and development interventions IBM understands that there is a critical business requirement, to identify individuals with skills necessary to investigate current breaches and prevent potential attacks/breaches from happening. Business executives in US and Europe consider cyber security as their highest priority within digital technology, as it is estimated that the cyber security workforce shortage is expected to reach 1.5 million unfilled positions by 2019. Therefore, the need to defend businesses and organisational systems from external threats has become imperative more than ever before. IBM Kenexa Predictive Hiring for Cyber Security Roles helps answer a critical question facing many businesses; “How can we identify, assess, develop and retain talent that have both the capacity and capability to defend businesses and organisational systems from external threats?” IBM Kenexa Predictive Hiring solution for Cyber Security roles can help to identify and define the critical aptitude, skills and competences that drive top Cyber Security performance in your organisation, as well as help you understand how to recruit more like your top performers to drive business success and reduce cyber risks. This bespoke solution is a combination of consultancy design to help identify the specific factors critical to organizational success, and bespoke content design to ensure the assessment is predictive of individual Cyber Security performance. In turn, the tool can be used for selection of high-potential candidates and employees most suited for success on the job.
  • 2. Solution Brief IBM Software 2 Data-driven decisions IBM Kenexa Predictive Hiring for Cyber Security Roles can help organizations illustrate the relationship among people and unit inputs, external factors and business outcomes, allowing insight into the impact of human capital metrics on business performance. Using this insight, the solution provides an improved ability to make data-driven decisions about the relative merits of human capital initiatives, and enables you to make improvements in your hiring practices. Identifying top performers IBM Kenexa Predictive Hiring for Cyber Security solution helps you identify the critical performance characteristics of your best talent in Cyber Security roles and helps you acquire more like them, improving the quality of hire and acquiring the right talent for business success. Did you know? The most serious cyber security breaches for big businesses now starts at £1.46 million - more than double 2014 figure of £600,000. For small and medium-sized enterprises, the cost of the most serious breaches can now reach as high as £310,800 - up from £115,000 in 2014, according to UK government’s Information Security Breaches Survey 2015 Figure 01: Research, identify and hire candidates matching top performer profiles. PEOPLE, UNIT AND BUSINESS LINKAGE RESEARCH: Key elements that differentiate that performance IDENTIFY IMPACT: The link between human capital metrics and business performance LEARN FROM YOUR BEST: Identify traits of top performers in a key job DEVELOP AND DEPLOY ASSESSMENT: Hire candidates who match the profile of top performers ENSURE SUCCESS: Review ROI, adverse impact, consulting follow up Learning from MOD Cyber Security Roles IBM Smarter Workforce consultants in collaboration with the Ministry of Defence and their Defence Cyber Subject Matter Experts researched, designed and developed a unique suite of assessments that identify the best candidates with the right aptitude, skills and competences to succeed in Cyber jobs (https://www.gov.uk/government/news/defence-cyber-test- launched). The IBM Kenexa consultants will use their knowledge from the project to ensure the Predictive Hiring for Cyber Security solution will be bespoke to your organisation. The solution content will be a combination of existing IBM content or new content, ensuring the tool is robust, job relevant, reliable and valid in predicting future job performance in cyber security job roles in corporate settings.
  • 3. LOS14022-USEN-04 Please Recycle © Copyright IBM Corporation 2015 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America September 2015 IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corporation in the United States, other countries or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or TM), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. Other product, company or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” at: ibm.com/legal/copytrade.shtml The content in this document (including currency OR pricing references which exclude applicable taxes) is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data discussed herein is presented as derived under specific operating conditions. Actual results may vary. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NONINFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.