Cybersecurity Has A Serious Talent Shortage

It’s a refrain we have been hearing for the past 18 months from clients all over the world: “We need more skilled people for our security team.”

A report from Frost & Sullivan found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020. But the security industry is a fast-growing market, with IDC pegging it as becoming a $101 billion opportunity by 2020. So what’s causing the talent shortage?

One of the big reasons is that security businesses tend to look for people with traditional technology credentials, college degrees in tech fields, for example.

But security is truly everyone’s problem; virtually every aspect of personal and professional data is at risk. So why are we limiting security positions to people with four-year degrees in computer science, when we desperately need varied skills across so many different industries?

Businesses should open themselves up to applicants whose nontraditional backgrounds mean they could bring new ideas to the position and the challenge of improving cybersecurity.

Other burgeoning industries have been in similar positions throughout history. In 1951 the US accounting industry was poised for growth but was predominantly male, with only 500 female certified public accountants in the country.

After recognising the problem, leaders across the accounting field teamed with industry associations and academic institutions to solve the issue through awareness campaigns and hiring initiatives.

Today there are over 800,000 female CPAs in the US Security businesses need to follow this example, taking a hard look at themselves to see what’s holding them back.

There are no signs that the bad guys are limiting their talent pool, and cyber-crime is now a $445 billion business. The average company handles a bombardment of 200,000 security events per day. Cyber-criminals are becoming increasingly more organised and aggressive, while the teams defending against these attacks are struggling to fill their ranks.

One way IBM is addressing the talent shortage is by creating “new collar” jobs, particularly in cyber-security. These roles prioritise skills, knowledge, and willingness to learn over degrees and the career fields that gave people their initial work experience.

Some characteristics of a successful cyber-security professional simply can’t be taught in a classroom: unbridled curiosity, passion for problem solving, strong ethics, and an understanding of risks. People with these traits can quickly pick up the technical skills through on-the-job training, industry certifications, community college courses, and modern vocational and skills education programs.

Organisations can use a similar approach by establishing apprenticeship opportunities, emphasising certification programs, exploring new education models, supporting programs at community colleges or polytechnic schools, and looking for talent in new places.

Some of our recent additions to the security team came from unexpected career fields such as retail, education, entertainment, and law. The two things they all had in common? They were curious about security and motivated to learn the skills.

Of course, cutting-edge technology is going to be at the center of these new collar jobs. Artificial intelligence, for example, is being used in the workplace in a wide range of ways, and in cyber-security it is already creating opportunities for new collar positions.

AI not only provides a way to help overcome the skills shortage, but is also an important step forward in the way employees will work and companies will defend themselves.

Companies that are interested in using a new collar approach to fill security positions should consider the following:

•    Re-examine your workforce strategy: Do you know what skills you need today and tomorrow to run a successful security program? Realise that skills and experience can come from a variety of places, and adjust your hiring efforts accordingly.

•    Improve your engagement and outreach: Don’t limit yourself to the same old career fairs and recruiting programs of yesteryear. Get involved in community colleges, P-TECH schools, and other educational programs to start building your recruiting base.

•    Build a local cyber-security ecosystem: Connect with government organisations, educational institutions, and other groups. Sponsor Capture the Flag security events, and work with local middle and high schools to generate interest in the field. These groups are always looking for willing experts and mentors.

•    Have a robust support program for new hires: Mentorships, rotational assignments, shadowing, and other opportunities help new cyber-security hires gain experience and learn. Remember, not everyone knows what they want to do right away. Keep new hires engaged by giving them the creative freedom to work on different projects and explore new technologies and services.

•    Focus on continuous learning and upskilling: To retain your new talent, keep employees current on the latest skill sets through classes, certifications, and conferences. Cyber-security is a highly dynamic field, requiring ongoing education and exploration. And be open to employees from other areas of your business who express interest in cybersecurity career paths.

Remember that AI provides employees with more intelligence and contextual recommendations at a speed and scale previously unimagined, so upskilling your workforce is a completely different ballgame these days.

Cyber-security is a complex career field with extraordinarily challenging problems, but with a diverse pool of experiences and ideas, we stand a much greater chance of successfully defending our assets.

Harvard Business Review:

You Migh Also Read:

How AI Will Solve The Skills Shortage:

Are Employees Your Weakest Link When It Comes To Security?:

Cyber Skills Gap Grows Along With Threats:

 

 

« EU Nations Expand Their Cyber Defences
The Difference Between Cyberspace & The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.