Ibm kenexa predictive hiring for cyber security roles

3
Solution Brief IBM Software IBM Kenexa Predictive Hiring for Cyber Security Roles Identify and acquire candidates like your top performers using behavioural science, data and analytics. Highlights: Design a bespoke assessment that is predictive of future performance within Cyber Security roles for your organisation. Understand the relationship between human capital metrics and business perfor- mance for Cyber Security roles. Use for recruitment of internal and external talent and assess to identify and acquire candidates like your top performers in Cyber Security job roles Address the skills gap internally using the success profile and identify training and development interventions IBM understands that there is a critical business requirement, to identify individuals with skills necessary to investigate current breaches and prevent potential attacks/breaches from happening. Business executives in US and Europe consider cyber security as their highest priority within digital technology, as it is estimated that the cyber security workforce shortage is expected to reach 1.5 million unfilled positions by 2019. Therefore, the need to defend businesses and organisational systems from external threats has become imperative more than ever before. IBM Kenexa Predictive Hiring for Cyber Security Roles helps answer a critical question facing many businesses; “How can we identify, assess, develop and retain talent that have both the capacity and capability to defend businesses and organisational systems from external threats?” IBM Kenexa Predictive Hiring solution for Cyber Security roles can help to identify and define the critical aptitude, skills and competences that drive top Cyber Security performance in your organisation, as well as help you understand how to recruit more like your top performers to drive business success and reduce cyber risks. This bespoke solution is a combination of consultancy design to help identify the specific factors critical to organizational success, and bespoke content design to ensure the assessment is predictive of individual Cyber Security performance. In turn, the tool can be used for selection of high-potential candidates and employees most suited for success on the job.

Transcript of Ibm kenexa predictive hiring for cyber security roles

Solution BriefIBM Software

IBM Kenexa Predictive Hiring for Cyber Security RolesIdentify and acquire candidates like your top performers using behavioural science, data and analytics.

Highlights: • Design a bespoke assessment that is

predictive of future performance within Cyber Security roles for your organisation.

• Understand the relationship between human capital metrics and business perfor-mance for Cyber Security roles.

• Use for recruitment of internal and external talent and assess to identify and acquire candidates like your top performers in Cyber Security job roles

• Address the skills gap internally using the success profile and identify training and development interventions

IBM understands that there is a critical business requirement, to identify individuals with skills necessary to investigate current breaches and prevent potential attacks/breaches from happening. Business executives in US and Europe consider cyber security as their highest priority within digital technology, as it is estimated that the cyber security workforce shortage is expected to reach 1.5 million unfilled positions by 2019. Therefore, the need to defend businesses and organisational systems from external threats has become imperative more than ever before.

IBM Kenexa Predictive Hiring for Cyber Security Roles helps answer a critical question facing many businesses; “How can we identify, assess, develop and retain talent that have both the capacity and capability to defend businesses and organisational systems from external threats?”

IBM Kenexa Predictive Hiring solution for Cyber Security roles can help to identify and define the critical aptitude, skills and competences that drive top Cyber Security performance in your organisation, as well as help you understand how to recruit more like your top performers to drive business success and reduce cyber risks.

This bespoke solution is a combination of consultancy design to help identify the specific factors critical to organizational success, and bespoke content design to ensure the assessment is predictive of individual Cyber Security performance. In turn, the tool can be used for selection of high-potential candidates and employees most suited for success on the job.

Solution BriefIBM Software

2

Data-driven decisionsIBM Kenexa Predictive Hiring for Cyber Security Roles can help organizations illustrate the relationship among people and unit inputs, external factors and business outcomes, allowing insight into the impact of human capital metrics on business performance. Using this insight, the solution provides an improved ability to make data-driven decisions about the relative merits of human capital initiatives, and enables you to make improvements in your hiring practices.

Identifying top performers IBM Kenexa Predictive Hiring for Cyber Security solution helps you identify the critical performance characteristics of your best talent in Cyber Security roles and helps you acquire more like them, improving the quality of hire and acquiring the right talent for business success.

Did you know?The most serious cyber security breaches for big businesses now starts at £1.46 million - more than double 2014 figure of £600,000. For small and medium-sized enterprises, the cost of the most serious breaches can now reach as high as £310,800 - up from £115,000 in 2014, according to UK government’s Information Security Breaches Survey 2015

Figure 01: Research, identify and hire candidates matching top performer profiles.

PEOPLE, UNIT AND BUSINESS LINKAGE

RESEARCH:Key elements that differentiate that

performance

IDENTIFY IMPACT:The link between

human capital metrics and business

performance

LEARN FROM YOUR BEST:Identify traits

of top performers in a key job

DEVELOP AND DEPLOY

ASSESSMENT:Hire candidates who

match the profile of top performers

ENSURE SUCCESS: Review ROI, adverse impact, consulting follow up

Learning from MOD Cyber Security Roles IBM Smarter Workforce consultants in collaboration with the Ministry of Defence and their Defence Cyber Subject Matter Experts researched, designed and developed a unique suite of assessments that identify the best candidates with the right aptitude, skills and competences to succeed in Cyber jobs (https://www.gov.uk/government/news/defence-cyber-test-launched). The IBM Kenexa consultants will use their knowledge from the project to ensure the Predictive Hiring for Cyber Security solution will be bespoke to your organisation. The solution content will be a combination of existing IBM content or new content, ensuring the tool is robust, job relevant, reliable and valid in predicting future job performance in cyber security job roles in corporate settings.

LOS14022-USEN-04

Please Recycle

© Copyright IBM Corporation 2015

IBM Corporation Software Group Route 100 Somers, NY 10589

Produced in the United States of America September 2015

IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corporation in the United States, other countries or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or TM), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. Other product, company or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” at: ibm.com/legal/copytrade.shtml

The content in this document (including currency OR pricing references which exclude applicable taxes) is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates.

The performance data discussed herein is presented as derived under specific operating conditions. Actual results may vary. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NONINFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.