CHATSWORTH, Calif., Nov. 10, 2016 /PRNewswire/ -- In response to growing cybersecurity risks including the shortage of cybersecurity experts worldwide, Identity Management Institute has published a free eBook titled "Becoming a Cybersecurity Expert" to provide a career strategy and answer common questions for professionals and students who are contemplating a career in cybersecurity. Logo - http://photos.prnewswire.com/prnh/20161109/437405LOGO "Information security is a growing and challenging career field. In particular, cybersecurity has become a hot topic for many reasons. Everyone has a different view of what skills a cybersecurity expert should possess. Because the cybersecurity field is wide and deep, experts can choose to be generalists or specialists in their domain of interest," says Henry Bagdasarian, the author of the eBook and Founder of Identity Management Institute. Cybersecurity has mainly become a hot topic because of the increasing number of data driven devices which are connected to the Internet and each other, increased number of cyber attacks against companies and government systems, and, serious shortages of cybersecurity talents worldwide. According to Gartner, there are 6.4 billion connected devices today which are expected to grow to 21 billion by 2020 out of which over 13 billion will be household devices used by consumers. These connected and smart devices which are embedded in cars and household appliances will perform many tasks on our behalf, share information, and carry a ton of data thanks to the ever increasing data storage capacities and decreasing costs. Hacking incidents are also on the rise with 2015 logging 3,930 incidents which exposed over 736 million records. Data breach incidents and their impact are expected to increase as the number of connected devices carrying large amount of data rise. According to leading reports, over 90% of all cyber attacks are successfully executed with information stolen from employees who unwittingly give away their system ID and access credentials to hackers during phishing attacks. As such, data privacy and security risks will continue to be of utmost concerns. Especially, the definition of identity theft will be expanded to include device identity theft by another device making identity and access management the most critical aspect of cybersecurity.