ISE15/20-21

Subject: manpower, cyber security, cyber security talent


Cyber security manpower development in Hong Kong

Cyber security manpower development in the United Kingdom

Formal educational activities

  • Formal education provides the universal building blocks that equip young people in pursuing careers in cyber security. In the UK, the CyberFirst Schools initiative certifies those secondary schools which are committed to developing young people's cyber skills. Being certified as a CyberFirst School will be recognized and promoted by NCSC (Figure 1). There are also STEM Ambassadors who are doing outreach work into schools to encourage STEM studies, which can be an excellent starting point for those students aspiring to get into cyber security profession.
  • As mentioned above, studying for a university degree is a traditional route of entry into professional life. NCSC delivers the CyberFirst Bursary scheme and CyberFirst Degree Apprenticeship as part of the CyberFirst initiative to support undergraduates for a career in cyber security. In addition, the national centre has certified a number of degree programmes to signpost high quality degrees for those who are interested in pursuing a career in cyber security. NCSC has so far certificated 24 Master's degrees, three Integrated Master's degrees24Legend symbol denoting An Integrated Master's degree is a degree programme that combines undergraduate and postgraduate study into one. Students join the programme as undergraduates and study Bachelors level modules, before moving onto Masters level modules in the fourth or fifth year of the course. and five Bachelor's degrees in cyber security from 23 universities, as part of its programme to recognize high-quality courses.

Figure 1 - Formal educational activities to develop young talent

Figure 1 - Formal educational activities to develop young talent

Note: (1)Applicants are required to achieve two "B" grades and one "C" grade in A-Levels in any subject and a grade of "5" in Mathematics in General Certificate of Secondary Education.
Source: Various government websites.

Qualifications and certifications

Extra-curricular activities

  • NCSC has made use of extra-curricular activities to inspire young talent and develop their interests at a young age. It is particularly important for those who do not thrive in a formal education environment. As part of the National Cyber Security Strategy, CyberFirst features an array of extra-curricular activities aiming to help youths aged 11-18 explore the world of cyber security (Figure 2). It includes CyberFirst Girls' Competition, Cyber Discovery Programme and a series of short-term development courses.

Figure 2 - CyberFirst pathway for 11-18 years old

Figure 2 - CyberFirst pathway for 11-18 years old

Note: (1) All CyberFirst summer courses have been moved online in response to the coronavirus pandemic.
Source: CyberFirst (2020).


Retraining the current workforce

Concluding remarks

  • The shortage of talent is one of the most critical issues the global cyber security profession is facing right now. The UK has advocated an ambitious multi-pronged approach to address the shortage, which features not only formal educational and extra-curricular activities, but also a specific retraining fund and a forthcoming certification scheme. These initiatives aim to encourage the professional development of those who are aspiring to work in cyber security to enter the profession, as well as helping those already in it to have their skills and expertise recognized more easily and in a clear and consistent way.
  • The UK has achieved notable progress in developing the cyber security skills pipeline in recent years. These include (a) 12 000 girls taking part in the 2019 CyberFirst Girls' Competition; (b) over 55 000 young people having participated in Cyber Discovery and CyberFirst learning programmes as at June 2020; and (c) more than 900 students either on or recently graduated from the CyberFirst Bursary scheme during 2019-2020.


Prepared by Gary NG
Research Office
Information Services Division
Legislative Council Secretariat
22 January 2021


Endnotes:

1.Internet of Things ("IoT") is a technology which enables the provision of communications platforms and services for interconnected devices to generate, exchange and consume data with minimal human intervention. With the proliferation of IoT, consumers are bringing more and more Internet connected devices into their homes. These include smart televisions, smart security locks, and smart home hubs that control home lighting, heating and cooling.

2.In recent years, artificial intelligence ("AI") has developed not only as a field of research, but also as a technology that expands across a wide range of applications. Some of the most interesting AI applications are outside of computer science in sectors such as transport, healthcare, financial services and marketing.

3.Cloud computing is the delivery of computing resources (hardware and software) by a party (the service provider) over the Internet to a user (consumer). This delivery or provision is described as a "service" because the user merely uses the computing resources rather than actually acquiring them. See InfoCloud (2020).

4.Dealing with a mega breach (involving more than one million records) costs US$42 million (HK$326 million) on average in 2019. See Allianz Global Corporate & Specialty (2020).

5.The shift to work from home brings additional cyber security challenges as employees log on through their home networks or with personal devices that might not be as secure as office environments.

6.Cyber security incidents include computer virus attack, ransomware, denial of service attack, hacking, theft of information, online fraud, web defacement and leakage of information.

7.The 2019 survey identifies the top corporate risks for the next 12 months and beyond in 102 countries and territories. See Allianz Global Corporate & Specialty (2020).

8.Cyber security refers to the protection of Internet connected systems (including hardware, software and associated infrastructure), the data on them, and the services they provide, from unauthorized access, harm or misuse. This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures. See GOV.UK (2016).

9.See (ISC)2 (2020a).

10.As estimated by (ISC)2, there is a shortage of 27 408 cyber security professionals in the UK in 2020.

11.Most recently, Hong Kong entered into a new era of smart banking, with the Hong Kong Monetary Authority issuing eight virtual banking licences in 2019 to open the door for the financial technology companies to enter the banking industry.

12.See Hong Kong Computer Emergency Response Team Coordination Centre (2020).

13.See Census and Statistics Department (2020a).

14.See InfoSec (2020).

15.See Vocational Training Council (2018).

16.Some bachelor's degrees in cyber security offer concentration options in areas such as cyber security analysis, digital forensics, system security and cloud computing.

17.The Hong Kong Monetary Authority, the Hong Kong Institute of Bankers and the Hong Kong Applied Science and Technology Research Institute jointly developed a three-level certification scheme, namely the Certified Cyber Attack Simulation Professional ("CCASP") in 2016. CCASP provides a recognized career path from an entry-level into the industry as a practitioner (Practitioner Level) through to an information security tester (Registered Level), and then to information security specialist (Certified Level). Between December 2016 and November 2020, a total of 68 persons passed CCASP examination at various levels.

18.Hong Kong was not included in the 2018 Global Cybersecurity Index.

19.To qualify for the CISSP certification, one must pass the examination and has at least five years of cumulative, paid work experience in two or more of the eight domains of cyber security. The eight domains are: (a) Security and Risk Management; (b) Asset Security; (c) Security Architecture and Engineering; (d) Communication and Network Security; (e) Identity and Access Management; (f) Security Assessment and Testing; (g) Security Operations; and (h) Software Development Security.

20.In November 2011, the UK published the UK Cyber Security Strategy 2011-2016 aiming at, among other things, making the country one of the most secure places in the world to do business online and tackling cybercrime. This national strategy was reviewed and renewed with the publication of the National Cyber Security Strategy 2016-2021 in 2016. The five-year strategy seeks to provide a secure and resilient environment in the UK against cyber threats, as well as supporting the country to be prosperous and confident in the digital world by 2021.

21.For the other two main pillars, Defend is to protect the UK against evolving cyber threats, respond effectively to incidents, and ensure UK networks, data and systems are protected and resilient; and Deter is to detect and disrupt hostile action against the UK in cyberspace, followed by pursuing and prosecuting offenders.

22.The Department is responsible for delivering the government's policy covering arts and culture, communications and media, sport, tourism, building a shared society and digital connectivity.

23.As part of the National Cyber Security Strategy, the National Cyber Security Centre was created in 2016 under the Government Communications Headquarters. It is the UK's lead technical authority on cyber security, helping to make the UK the safest place to live and to do business online.

24.An Integrated Master's degree is a degree programme that combines undergraduate and postgraduate study into one. Students join the programme as undergraduates and study Bachelors level modules, before moving onto Masters level modules in the fourth or fifth year of the course.

25.The Council is reportedly set to commence operations in April 2021. See (ISC)2 (2020b)

26.This contrasts with Hong Kong's CCASP, which is a three-level certification scheme comprising the Practitioner, Registered and Certified Levels.

27.See Department for Digital, Culture, Media & Sport (2019).

28.The Fund was launched in May 2018 and expanded in October 2018. The third round of the Fund was launched in August 2019, whereby training providers can bid up to 50% of the total project costs, capped at £100,000 (HK$1.05 million), to jointly design programmes with employers for retraining people from diverse backgrounds.


References:

1.Allianz Global Corporate & Specialty. (2020) Allianz Risk Barometer 2020.

2.Census and Statistics Department. (2020a) Survey on Information Technology Usage and Penetration in the Business Sector for 2019.

3.Census and Statistics Department. (2020b) Thematic Household Survey Report - Report No. 69 - Personal computer and Internet penetration.

4.CyberFirst. (2020)

5.Department for Digital, Culture, Media & Sport. (2018) Government Consultation: National Cyber Security Strategy - Developing the Cyber Security Profession in the UK Government.

6.Department for Digital, Culture, Media & Sport. (2019) Initial National Cyber Security Skills Strategy: increasing the UK's cyber security capability - a call for views.

7.GOV.UK. (2016) National Cyber Security Strategy (2016-2021).

8.Hong Kong Computer Emergency Response Team Coordination Centre. (2020) Recent 10 Years of Security Incidents reported 2010-2020.

9.Hong Kong Examinations and Assessment Authority. (2020) 2019 HKDSE Entry Statistics.

10.House of Commons. (2020) Daily Report, 9 June.

11.InfoCloud. (2020) Basics of Cloud Computing.

12.Information and Innovation Bureau. (2020) Update on Information Security. LC Paper No. CB(1)306/19-20(05).

13.InfoSec. (2020) Computer Related Crime.

14.International Telecommunications Union. (2019) Global Cybersecurity Index 2018.

15.(ISC)2. (2020a) Cybersecurity Workforce Study 2020.

16.(ISC)2. (2020b) Help Shape the UK Cyber Security Council by becoming a Trustee.

17.National Cyber Security Centre. (2020) Annual Highlight Report.

18.National Cyber Security Centre. (various years) Annual Review.

19.Vocational Training Council. (2018) Manpower Survey Report - Innovation and Technology Sector.



Essentials are compiled for Members and Committees of the Legislative Council. They are not legal or other professional advice and shall not be relied on as such. Essentials are subject to copyright owned by The Legislative Council Commission (The Commission). The Commission permits accurate reproduction of Essentials for non-commercial use in a manner not adversely affecting the Legislative Council. Please refer to the Disclaimer and Copyright Notice on the Legislative Council website at www.legco.gov.hk for details. The paper number of this issue of Essentials is ISE15/20-21.