People with Asperger Syndrome have distinct advantages when it comes to combating cyber crime. Credit: Pete Linforth Frédéric Vezon has Aspergers. He’s president at ASPertise, an application development, big data and cybersecurity services company that has offices in Paris and Montreal.The ASP in ASPertise stands for “Asperger Syndrome” — which the company explains as being manifested by significant difficulties in social interaction, associated with restricted interests and repetitive behavior.A unique value proposition from ASPertise is their team of cybersecurity experts — with Aspergers.Vezon’s firm expands on the syndrome, stating that Asperger people have difficulty interpreting and adapting to other’s nonverbal behaviors (eye contact, facial expressions, body postures, etc.), love repetition and routines, and lack social and emotional reciprocity. These difficulties are often accompanied by other features, such as hypersensitivity to noise or specific kinds of foods, monotonic speech delivery, and resistance to change. ASPertise says the syndrome is often called the “invisible disability” because people with Aspergers are frequently of normal or above average intelligence and exhibit great intellectual curiosity. The syndrome is then only manifested during social and professional interactions with behaviors that may seem surprising, unexpected or inappropriate that offend the “common sense” and social conventions.Asperger people — as Vezon calls them — bring distinct advantages when it comes to combating cyber crime. In an email interview, he explained why. His reasons are below. 10 reasons why Asperger people are better at cybersecurityMost hackers are atypical. A research document from Scotland Yard last year indicates the majority of hackers in England are Aspergers. Some of them are identified; others don’t disclose it.Aspergers are extremely detailed oriented, which leads to a “no stone unturned” approach to cybersecurity.Aspergers are cognitively different, so they are naturally “out of the box” and find innovative solutions to problems without the usual cognitive “Blind spot” of non-autistic people.Aspergers are extremely focused and can have a high level of concentration. They are capable of hyperfocusing and never let go when they are looking for something.They have a high capacity for analysis. You can find brilliant Asperger people working as Security Operations Center (SOC) analysts, for example.They have a demonstrated superior capacity to identify patterns. The Israeli army has created an elite squad (“unit 9900”) composed solely of Autistics to deduct with pattern recognition troop movements on satellite images.It’s been scientifically proven that Aspergers are methodological and make more rational decisions (less cognitive biases).Many Aspergers are “optimal problem solvers” — they focus on finding the best solutions, not one of the best.Autistics have what is called Specific Interests: They will read and memorize huge amounts of information in an obsessive way and, therefore, excel in their field of expertise.People on the spectrum search for intellectual stimulation, complex challenges, and many have the “investigator profile,” which is highly valuable for forensics and pen testing.Cybersecurity recruiting initiativesCybersecurity Ventures predicts there will be 3.5 million unfilled cybersecurity jobs by 2021, up from 1 million openings in 2014.The tech industry is searching for new solutions to crack the code on the growing labor shortage of cyber fighters.IBM is sponsoring alternative education models, such as Hacker Highschool and Pathways in Technology Early College High School (P-TECH), while defining new workforce approaches to reach a broader pipeline of employees based on skills, experience and aptitudes, as opposed to traditional hiring models that focus on degrees alone.Palo Alto Networks and Girl Scouts of the USA recently announced a collaboration with the introduction of 18 new cybersecurity badges. Girls Scouts of all ages will be able to explore opportunities in STEM while developing problem-solving and leadership skills.ASPertise may be on to the next and biggest wave of cybersecurity recruits — Asperger people. Vezon’s team currently works on physical and wireless network and security assessments, cyber social engineering, domain password audits, architecture development, vulnerability assessments and penetration testing, policy assessments, and firewall rule review.While artificial intelligence is often hyped as the biggest cybersecurity innovation to curb the workforce shortage, Asperger people may be the real intelligence that organizations need to fill their open positions. Aspergers, anyone? There’s a lot of cybersecurity jobs waiting for you.Visit SteveOnCyber.com to read all of my blogs and articles covering cybersecurity.Follow me on Twitter @CybersecuritySF, or connect with me on LinkedIn. Send story tips, feedback and suggestions to me here. Related content feature Cyber NYC boosts the Big Apple's cybersecurity industry New York City Economic Development Corp. launches Cyber NYC to foster public-private partnerships focused on building a vibrant cybersecurity community and talent pool in the largest U.S. city. By Steve Morgan Feb 06, 2018 6 mins Internet Security IT Skills Careers opinion Young girls are society's future cyber crime fighters There are lots of opportunities for girls in cybersecurity. The problem is they don't know what those opportunities are. Parents and guidance counselors can help. By Steve Morgan Feb 05, 2018 5 mins Internet Security IT Skills Careers analysis Why healthcare cybersecurity spending will exceed $65B over the next 5 years Hospitals and healthcare providers remain under cyber attack, causing organizations to spend more to protect their systems and patient data. By Steve Morgan Feb 02, 2018 15 mins Data Breach Cyberattacks Hacking news Cybersecurity M&A deal flow: List of 200 transactions in 2017 Rising tide of mergers and acquisitions in the trillion-dollar cybersecurity market. By Steve Morgan Jan 26, 2018 35 mins Data and Information Security Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe