Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Training & Awareness

Cultivate a Talent Pipeline While Bridging the Cybersecurity Resource Gap

This is the time of year when students around the world head back to school. Many entering their final year of high school and those in college or at universities are thinking about courses of study that hold promising career opportunities, excitement, and challenge.

This is the time of year when students around the world head back to school. Many entering their final year of high school and those in college or at universities are thinking about courses of study that hold promising career opportunities, excitement, and challenge.

Most of us who read SecurityWeek hope that news of the global cybersecurity skills shortage has reached these students and will inspire them to pursue this ever-expanding field rife with job opportunities. But we must do more than hope; we need to actively participate in cultivating a talent pipeline while taking steps to bridge the resource gap in the interim. Otherwise the dearth of cybersecurity professionals, estimated at more than a million worldwide, will continue to grow.

A new labor market report by Burning Glass, Job Market Intelligence: Cybersecurity Jobs, 2015, finds that job postings for cybersecurity openings have grown three times as fast as openings for IT jobs overall and take longer to fill. The professional services, finance, and manufacturing/defense sectors have the greatest number of openings. Finding qualified candidates for positions that require a security clearance or a combination of IT security skills and industry knowledge, for example in finance or healthcare, takes even longer.  

Cybersecurity TalentThe number of colleges and universities that offer degrees in cybersecurity is on the rise while education and training providers are also jumping into the fray. The National Security Agency and the Department of Homeland Security are also getting involved, setting education standards and designating certain schools that have met these standards as centers of academic excellence in information assurance and cyber operations. But we need to do more to excite young people to the opportunity cybersecurity brings.

A long-term view

Employers and IT security vendors must also collaborate with colleges and universities to help close the talent gap. Providing scholarships, funding specific programs to support hybrid study, offering expertise in the classroom, and creating internships, are just a few ways to help accelerate the number of trained graduates who will enter the job market a few years from now. Not only that, given our insights and knowledge of the attack techniques being used, the latest technologies and strategies to deal with threats, and where the biggest competency gaps lie, we can help ensure that programs are relevant and designed to address real-world challenges. True, it’s a longer-term approach to dealing with the skills shortage, but it’s one that will pay dividends in the future. As investment guru Warren Buffet once said, “Someone’s sitting in the shade today because someone planted a tree a long time ago.”

But as any wise investor knows, you need to balance long-term strategic goals with immediate needs. So while you’re collaborating with various colleges and universities, how can you address the talent gap you face today? Attackers aren’t sitting idle and neither can you. 

Short-term action

The good news is that technologies are advancing through integration and automation to help address the skills gap. The irony is that while these technologies exist, the worsening shortage of security talent has hampered the ability of many organizations to monitor these developments and embrace them. As a result, most organizations continue to be mired in complexity and fragmentation with too many disparate security technologies that can’t – and don’t – interoperate. But it doesn’t have to be this way.

Advertisement. Scroll to continue reading.

With an integrated approach to threat defense, that uses telemetry to correlate and analyze data from these disparate systems, you can gain visibility into what “looks bad” in a single place. You can add context based on local and global data-driven threat intelligence. And you can apply controls using analysis and automation for systemic response to detected threats. Security services can supplement in-house security teams so that every business, regardless of their in-house resources, has the opportunity to further improve security outcomes. These services can help assess and manage the people, process, and technology components of information risk holistically and across technologies to improve security outcomes.

The global cybersecurity skills shortage isn’t going away any time soon. But by attacking it on multiple fronts we can proactively work to address it. Savvy students should consider this exploding and exciting field of study that embraces a wider and wider range of skill sets. Academia, government, and industry should continue to partner to ensure educational programs are relevant and available. And organizations should identify how to use integration, automation, and security services to compensate for a lack of resources today.

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Training & Awareness

Google has announced a new training program for cybersecurity analysts and those who graduate will get a professional certificate from Google.

Management & Strategy

750 cyber specialists have participated in Defence Cyber Marvel 2 (DCM2), the biggest military cyberwarfare exercise in Western Europe.

Phishing

Security awareness training isn’t working to the level it needs to. Social engineering, however, is getting better. Why doesn’t awareness training work, and how...

Management & Strategy

Addressing the people problem with effective approaches and tools for users and security practitioners will enable us to work smarter, and force attackers into...

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...

Management & Strategy

Tips for making a presentation that will help improve the state of security programs and reflect favorably on the presenters and their companies

Management & Strategy

UK-based cybersecurity training solutions provider Immersive Labs announced on Wednesday that it has raised $66 million in new capital.