The Cyber Security Workforce Must Grow 145%

Although cyber security training has been increasing there is still an acute skills shortage and the cyber workforce equiped with the right expertise needs to get a lot bigger.  To fill the current talent gap for cybersecurity experts, the cybersecurity workforce would need to grow 145%, according to (ISC)², a membership association for cybersecurity professionals.

Right now,  there are almost 3 million professionals work in cyber development and security in different parts of the world and  there is a current requirement for an additional 4 million cyber employees to reduce the skills gap and properly defend organisations, according to the 2019 ISC2 Cyber Security Workforce Study.

  • Cybersecurity firms are having trouble attracting and keeping skilled workers to help protect networks. 
  • The global non-profit is the largest association of certified cybersecurity professionals.
  • The data reveals that in the US alone, nearly a half million workers would be needed to fill the shortage.
  • The labor market is a challenge, and mentality among workers has shifted, with many candidates wanting to work as contractors instead of full-time staff.

The Report 

‘A shortage in the global cybersecurity workforce continues to be a problem for companies in all industries and of all sizes. In fact, this shortage remains the number one job concern for those working in the field. That’s not surprising given that 2018 was “the year of the mega-breach.”

Municipalities are getting hit hard by ransomware, and mobile malware attacks have doubled.

In an era of high-pro le data breaches and devastating cyberattacks, cybersecurity impacts every individual and every organization. But (ISC)2 research also shows that those in the field are optimistic that those challenges can be overcome, if organisations take the right approach to growing the workforce and building strong cybersecurity teams.

For the first time, the main goal of the (ISC)2 Cybersecurity Workforce Study was not only to assess the current global cybersecurity workforce gap, but also to estimate the total current number of cybersecurity professionals in the US and in 10 other major global economies.
 
Performing this workforce calculation gives organisations worldwide a better understanding of what’s required for success in the cybersecurity age.

By combining the workforce estimates with gap data, for example, we know that the global cybersecurity workforce needs to grow by 145% to meet the demand for skilled cybersecurity talent. In the US specifically, it needs to grow 62%.’

The Report also estimates the global cyber workforce per country and this is some of the information presented:
The estimated cyber security worker in Australia are 107k, Brazil 486k, Canada 84k, France 121k, Germany 133k, Japan 193k, Mexico 341k, Singapore 43k, South Korea 210k, UK 289k and US 805k.  

The Cybersecurity Workforce Study shows that these cybersecurity and IT professionals are generally satis ed in their careers and optimistic about their futures. But the size of the current workforce still leaves a significant gap between the number of cybersecurity professionals working in the field and the number needed to keep organisations safe.

The cybersecurity workforce gap has increased since last year, primarily due to a global surge in hiring demand. In the US, the cybersecurity workforce gap is nearly 500,000.

By combining the US cybersecurity workforce estimates and this gap data, they can calculate that the cybersecurity workforce needs to grow by 62% in order to meet the demands of US businesses today.

Using the workforce estimate of 2.8 million based on the 11 economies for a workforce estimate and the global gap estimate of 4.07 million, therefore the global workforce needs to grow by 145%.

The most direct near-term solution for building a strong team is to recruit and hire new professionals. That’s the approach half of the represented organisations plan to take over the next year.

New graduates and people looking to change careers are two primary sources, but organisations also respect the knowledge that comes from experience and they aree looking for relevant and extensive work experience, advanced knowledge of concepts, and cybersecurity certification.

IS2C:             CNBC:           HRDive

You Might Also Read: 

Britain's Workforce Has Too Few High Level Cyber Skills:

 

 


 

« Cyber Security Warnings For US 2020 Election
Hamas Hackers Use New Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.