Cyber Skills Shortages Stands At Four Million

A shortage in the global cybersecurity workforce continues to be a problem for companies in all industries and of all sizes.  The technology industry has never seen anything quite like it.

Seasoned cyber pros typically earn $95,000 a year, often markedly more and yet job openings can linger almost indefinitely. 

The ever-leaner cybersecurity workforce makes many companies desperate for help. In an era of high-profile data breaches and devastating cyberattacks, cybersecurity impacts every individual and every organisation.  Global IT security skills shortages have now surpassed four million

According to the international certifcation organisation (ISC)2 the number of unfilled positions now stands at 4.07 million professionals, up from 2.93 million this time last year. This includes 561,000 in North America and a staggering 2.6 million short fall in APAC. The shortage of skilled workers in the industry in Europe has soared by more than 100% over the same period, from 142,000 to 291,000.

(ICS)2 have released their  latest Cybersecurity Workforce Study based upon interviews with over 3200 security professionals around the world. The report estimates the current global workforce at 2.93 million, including 289,000 in the UK and 805,000 in the US. Nearly two-thirds (65%) of responding organisations reported a shortage of cybersecurity staff, with a lack of skilled or experienced security personnel their number one workplace concern (36%).

Over half (51%) of cybersecurity professionals said their organisation is at moderate or extreme risk due to staff shortages.
four key strategies to help organisations tackle such shortages. These include in-house training and development and setting applicant qualification requirements at the right level to ensure as wide a net as possible is cast.

(ISC)2 also stressed the need to attract new workers from other professions, or recent graduates with tangential degrees, as well as seasoned professionals from consulting and contracting sectors. Organizations should look to strengthen from within by cross-training existing IT professionals where appropriate. In an era of high-pro le data breaches and devastating cyberattacks, cybersecurity impacts every individual and every organisation. 

Top Job Concerns Among Cybersecurity Professionals include: 

  • 36% Lack of skilled/experienced cybersecurity security personnel 
  • 28% Lack of standard terminology for effective communication 
  • 27% Lack of resources to do my job effectively 
  • 24% Lack of work-life balance 
  • 24% Inadequate budget for key security initiatives 

Cybersecurity professionals are more than twice as likely to be male, meaning there is an under-tapped demographic available for recruiting if companies can position the role in a way that overcomes common stereotypes. 30% of survey respondents were women. 

Among respondents with security-specific titles, 23% of study participants were women. The highest percentage of women cybersecurity professionals came from Latin America (39%) and North America (34%). 

The 2019 (ISC)2 Cybersecurity Workforce Study is based on online survey data collected in June and July 2019 from 3,237 individuals responsible for security/cybersecurity at work throughout North America, Europe, Latin America (LATAM) and Asia-Pacific (APAC).  The sample within each country was controlled to ensure a mix of company sizes and industries. 

InfoSecurity Magazine:          ISC2:

You Might Also Read:

Britain’s Cybersecurity Skills Gap:


 

 

« British Police At War Against Cyber Crime
Four Security Principles For For Small Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Cyber Security for Europe (CyberSec4Europe)

Cyber Security for Europe (CyberSec4Europe)

CyberSec4Europe is designing, testing and demonstrating potential governance structures for a European Cybersecurity Competence Network.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.