peterzayda -

Would you trust a criminal with your cyber security?

Several industry sectors have set a good example by hiring ex-offenders, and the cyber security industry could benefit in similar ways by looking at members of the hacker community

The UK cyber security services market is one of the most mature in the world. It has benefited from the development of a higher education system that generates significant numbers of cyber security professionals, a mature training market that allows people to cross-train, and well-structured career pathways to promote professional practices, underpinned by codes of conduct and ethics that are both meaningful and enforceable.

This maturity in the market has put the emphasis on the recruitment of trained, educated individuals who understand career structures and ethics, rather than a “hire the hacker” approach.   

The practice of using ex-offenders is carried out with great care in other industries and the cyber security industry should learn from, and adopt, good practice in this area. We must ensure that we deal with these individuals in an open and inclusive manner and, as an industry, and that we take steps to ensure they are supported so that they do not reoffend. The codes of conduct and ethics are an important aspect in ensuring that this is carried out in a controlled manner.

There is also a significant number of individuals who have come to the attention of law enforcement, but have not been charged or prosecuted. The industry must be very careful how it deals with these individuals. It would be inappropriate to exclude them from recruitment activities, and again the meaningful and enforceable code of conduct and ethics are essential to manage these individuals. 

Some of the people who have come to the attention of law enforcement, but have not been formally cautioned or charged, are young. Again, the UK is leading the world in this area. Working with the National Crime Agency (NCA) and the Metropolitan Police, not-for-profit accreditation and certification body Crest is developing practices to provide intervention activities to reduce the risk of vulnerable young people being groomed into more serious cyber crime-based activities. 

This is a really important activity becauses it not only helps to identify talent and deflects individuals from a pathway into crime, but it is also one of the few things that starts to reduce the level of threat. The industry has a moral responsibility to help support these initiatives.    

The use of former cyber criminals often comes up when companies employ individuals to test out their cyber defences. The argument goes that if you are trying to simulate real-world attacks, then ex-criminal hackers are well placed to do this work.  

The risks of using someone who is operating outside the law and outside ethical bounds are obvious. An individual who has a spent crime must be treated in a fair way from an employment perspective. If we are going to be viewed as a professional industry, however, prosecution or potential prosecution should not be viewed as part of a career pathway or a badge of honour to enter the industry.

Bug bounties

Another confusing area is bug bounties or group-sourced vulnerability hunting. The industry is struggling with what to call participants in these programmes. Bug bounty organisations are acting legally because they have been “invited in” and they are mostly operating under codes of conduct, but these are very difficult to enforce and often bad conduct has no consequence. The “researchers” working on these programmes are, in the main, also operating legally and within the codes, but it is difficult to guarantee. 

The industry is looking to help put standards in place to protect the buyers of these services, as well as the bug bounty programme operators and, importantly, the researchers. Clarification is required to ensure that such programmes are started and operated correctly and, very importantly, that they can be turned off and there are protections in place to ensure non-participating third parties are not used as a vehicle for cyber criminals to go under the radar and mount malicious attacks.

We must not reinforce the view that in order to get into the cyber security penetration testing industry or have “credibility”, you should come to the attention of law enforcement. This is not a scalable model if we are going to grow the industry and recruit the best people. We must compete with other professions for the best people and mirror good practice in the employment of ex-criminals.

Read more on Hackers and cybercrime prevention

Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

If you need to hack into any database, delete record, improve credit score, spy on whatsapp, text, phone, emails, as long as it's hack contact CYBERGODS Email :: OR WhatssaPP +1(539)999-9742 he is great, you won't be disappointed, cheap and fast, he saved my relationship Tell him Jesica 

If you need to check on your partner's sincerity,employee's honesty,recover your email passwords,Social networks*Institutional servers-key logging -*University grades changing / Admin(staff) *Account hack -Access/Password *Facebook, Instagram, Bbm,Skype, Snapchat, twitter, Badoo, Word Press,Zoosk, *Various blogs, Icloud, apple accounts etc*Clearing of criminal records-*Email accounts hack ( Gmail,Yahoo mail,Hotmail )*Databases hack- Untraceable IP *Change your school grades,*Gain access to bank accounts.

Contact cyber wizard via Email ::

I've been reluctant in purchasing this blank ATM card i heard about online because everything seems too good to be true, but i was convinced & shocked when my friend at my place of work got the card from guarantee atm blank card & we both confirmed it really works, without delay i gave it a go. Ever since then I've been withdrawing $5000 daily from the card & the money has been in my own account. So glad i gave it a try at last & this card has really changed my life financially without getting caught, its real & truly works though its illegal but made me rich!! If you need this card from guarantee atm blank card then here is their EMAIL :

Do you need to hack into any,  databaseserver spy  on Facebook,Emails, Whatsapp, Viber, Snapchat, Instagram and many more.
I urge you to get in touch with the best people for the job, i have confirm the service when i need to spy on my spouse phone. They are good at Phone Cloning and Bitcoin/binary minning and any other hack job.

MY Joy is back to me

We have specially programmed ATM cards that can be used to hack any ATM machine, this ATM cards can be used to withdraw cash at the ATM or swipe, stores and outlets. We sell this cards to all our customers and interested buyers worldwide, the cards has a daily withdrawal limit of $1000 in ATM and up to $100,000 spending limit in it stores. We also have credit cards for online shopping, we give the credit cards details to our interested clients worldwide including the credit card cvv. if you are in need of any other cyber hacking services, we are here for you at any time any day.

order now: via or Call/WhatsApp:+2349069487280