Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Cybersecurity Help Wanted

By Kevin Coleman
August 4, 2016

Another report was just released that points out a critical challenge for CSOs and CISOs. Most concerning is that this challenge has been shown to contribute to cybersecurity incidents.

I ran across a new report that is well worth reading and sharing with others in your organization. This report is not about a new vulnerability, scam, malware or hacking campaign. It is about issues that are far more difficult to solve.

This report highlights today’s shortage of cyber security resources. This twenty-four-page report was produced by Intel (McAfee) and the Center for Strategic and International Studies (CSIS). The report focuses on the current state of cyber security resources in eight countries and includes a fair amount of supporting data.

Countries participating in the modeling.
• Australia
• France
• Germany
• Israel
• Japan
• Mexico
• United Kingdom
• United States

There are two key points in the report that should be highlighted. First, figure 5 of the report indicates the 35 percent of respondents said that “We can’t maintain an adequate staff of cybersecurity professionals.” This is not a new issue by any stretch. Two years ago the Rand Corporation published a study on the shortage of cybersecurity professionals and stated that it poses a risk to national security (Link http://www.rand.org/news/press/2014/06/18.html). The talent shortage has been known for several years and the problem has still not been solved. Even more concerning is that the demand for cybersecurity practitioners has and will continue to increase as we add billions of IoT (Internet of Things) devices, connected cars, wearable computing and smart cities.

Now add to that issue that it will take years to complete the current training. Once the initial training is completed let’s not forget the workforce will need continuous refreshing of their knowledge and skills in order to maintain their proficiency. Given the continuous change that is taking place in the cyber environment, this will be no small challenge. If that does not look like a big enough challenge take a look at figure 10 of the report. It indicates less than 1/4 of respondents believe education programs (universities or vocational) are fully preparing cybersecurity professionals.

The cybersecurity industry, and governments for that matter, have known about this problem for years and yet the problem still exists. In fact, the issue is getting worse from my vantage point. So just how do you plan to protect the growing information assets of your organization from the growing number of cyber threats until additional resources become available? This is a national security issue and that is not an overstatement. A well thought-out strategy is needed ASAP. That must be followed by flawless execution of that strategy if any relief will be seen in the next two to four years.

Here are a few recommendations. First, get with your local colleges, universities and trade-schools and work with them on a program that meets what is needed currently to be a cyber security practitioner. Second, speak to potential students – help recruit cyber security students for the schools. Third, work with schools to continuously infuse information about new cyber threats into their course loads. 

A 2015 survey of more than 3,400 ISACA members in 129 countries determined that 86% of respondents see a global cybersecurity skills gap (http://www.isaca.org/pages/cybersecurity-global-status-report.aspx). That gap just increases the exposure every organization faces and even puts you the CSO and CISO at risk. Fourth, work with your human resource department to offer an apprenticeship or internship to further prepare the students to enter this extremely challenging field.

Finally, recognizing that you are competing for these resources. Cisco examined this problem and puts the global number of cybersecurity job openings at one million. Michael Brown, CEO at Symantec, stated that the projected shortfall of 1.5 million in 2019. This is one of those challenges that should be raised as a concern to executive management. They need to be aware of this critical issue and work with you to make sure your resource needs are met.


 

KEYWORDS: cyber security cybersecurity skills gap

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing