Cybersecurity Has A Serious Talent Shortage

It’s a refrain we have been hearing for the past 18 months from clients all over the world: “We need more skilled people for our security team.”

A report from Frost & Sullivan found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020. But the security industry is a fast-growing market, with IDC pegging it as becoming a $101 billion opportunity by 2020. So what’s causing the talent shortage?

One of the big reasons is that security businesses tend to look for people with traditional technology credentials, college degrees in tech fields, for example.

But security is truly everyone’s problem; virtually every aspect of personal and professional data is at risk. So why are we limiting security positions to people with four-year degrees in computer science, when we desperately need varied skills across so many different industries?

Businesses should open themselves up to applicants whose nontraditional backgrounds mean they could bring new ideas to the position and the challenge of improving cybersecurity.

Other burgeoning industries have been in similar positions throughout history. In 1951 the US accounting industry was poised for growth but was predominantly male, with only 500 female certified public accountants in the country.

After recognising the problem, leaders across the accounting field teamed with industry associations and academic institutions to solve the issue through awareness campaigns and hiring initiatives.

Today there are over 800,000 female CPAs in the US Security businesses need to follow this example, taking a hard look at themselves to see what’s holding them back.

There are no signs that the bad guys are limiting their talent pool, and cyber-crime is now a $445 billion business. The average company handles a bombardment of 200,000 security events per day. Cyber-criminals are becoming increasingly more organised and aggressive, while the teams defending against these attacks are struggling to fill their ranks.

One way IBM is addressing the talent shortage is by creating “new collar” jobs, particularly in cyber-security. These roles prioritise skills, knowledge, and willingness to learn over degrees and the career fields that gave people their initial work experience.

Some characteristics of a successful cyber-security professional simply can’t be taught in a classroom: unbridled curiosity, passion for problem solving, strong ethics, and an understanding of risks. People with these traits can quickly pick up the technical skills through on-the-job training, industry certifications, community college courses, and modern vocational and skills education programs.

Organisations can use a similar approach by establishing apprenticeship opportunities, emphasising certification programs, exploring new education models, supporting programs at community colleges or polytechnic schools, and looking for talent in new places.

Some of our recent additions to the security team came from unexpected career fields such as retail, education, entertainment, and law. The two things they all had in common? They were curious about security and motivated to learn the skills.

Of course, cutting-edge technology is going to be at the center of these new collar jobs. Artificial intelligence, for example, is being used in the workplace in a wide range of ways, and in cyber-security it is already creating opportunities for new collar positions.

AI not only provides a way to help overcome the skills shortage, but is also an important step forward in the way employees will work and companies will defend themselves.

Companies that are interested in using a new collar approach to fill security positions should consider the following:

•    Re-examine your workforce strategy: Do you know what skills you need today and tomorrow to run a successful security program? Realise that skills and experience can come from a variety of places, and adjust your hiring efforts accordingly.

•    Improve your engagement and outreach: Don’t limit yourself to the same old career fairs and recruiting programs of yesteryear. Get involved in community colleges, P-TECH schools, and other educational programs to start building your recruiting base.

•    Build a local cyber-security ecosystem: Connect with government organisations, educational institutions, and other groups. Sponsor Capture the Flag security events, and work with local middle and high schools to generate interest in the field. These groups are always looking for willing experts and mentors.

•    Have a robust support program for new hires: Mentorships, rotational assignments, shadowing, and other opportunities help new cyber-security hires gain experience and learn. Remember, not everyone knows what they want to do right away. Keep new hires engaged by giving them the creative freedom to work on different projects and explore new technologies and services.

•    Focus on continuous learning and upskilling: To retain your new talent, keep employees current on the latest skill sets through classes, certifications, and conferences. Cyber-security is a highly dynamic field, requiring ongoing education and exploration. And be open to employees from other areas of your business who express interest in cybersecurity career paths.

Remember that AI provides employees with more intelligence and contextual recommendations at a speed and scale previously unimagined, so upskilling your workforce is a completely different ballgame these days.

Cyber-security is a complex career field with extraordinarily challenging problems, but with a diverse pool of experiences and ideas, we stand a much greater chance of successfully defending our assets.

Harvard Business Review:

You Migh Also Read:

How AI Will Solve The Skills Shortage:

Are Employees Your Weakest Link When It Comes To Security?:

Cyber Skills Gap Grows Along With Threats:

 

 

« EU Nations Expand Their Cyber Defences
The Difference Between Cyberspace & The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TUV Sud

TUV Sud

TÜV SÜD is a leading technical service organisation. We specialize in testing, certification, auditing, training, and advisory services for different industries.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber Defence Systems)

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing threat landscape.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.