Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementLogical Security

Cyber Tactics

Stubborn workforce challenges call for new approaches in building security teams

Without robust, well-resourced cybersecurity teams, organizations are unable to protect their precious assets or prevent high-profile cyber incidents that erode user trust.

By Pam Nigro, Contributing Writer
cybersecurity teams

Lorado / [iStock / Getty Images Plus via Getty Images

Cyber Tactics - Pam Nigro
cybersecurity teams
Cyber Tactics - Pam Nigro
November 13, 2023

The increasing digitization of the business world has led to a surge in the demand for cybersecurity professionals at a time when the emerging technology and threat landscape is making the job more and more challenging. The good news is there are tangible steps organizations can take to position themselves to build the security teams they need to protect their organizations’ critical assets and brand reputations.

New global research from ISACA reinforces that stubborn workforce dynamics on the cybersecurity landscape remain problematic. That starts with still not having enough qualified people to do the work. The majority of cybersecurity leaders (59%) report that their teams are understaffed. The pursuit of talent could become even more of an uphill climb in the coming year, particularly for technical experts, as 78% of respondents expect demand for technical individual contributors to increase.

The difficulty of hiring sufficient security talent puts even more emphasis on holding onto the team members that are already onboard, but there, too, the data tells a concerning story. High turnover rates and burnout also contribute to enterprises’ personnel pain points. Although the Great Resignation trend cooled in 2023 with changing economic winds, the majority of organizations (56%) still indicate they are having difficulty retaining qualified cybersecurity professionals. Competition is intense for high-performing professionals, and it can be especially difficult for smaller companies with more budgetary constraints to hang onto security talent.

While it is important for organizations to be as competitive as they can from a pay standpoint, a commitment to providing the ongoing professional development today’s security professionals need can go a long way. This can include funding team members’ professional certifications, organizing team trainings, supporting attendance at industry conferences and encouraging team members to grow their leadership skills by championing cross-functional work throughout the organization. This organizational commitment to supporting ongoing learning is especially essential as the rapidly evolving threat landscape requires professionals to continually update their skills and knowledge to stay effective.

Inadequate workforce diversity also continues to hamper the industry. Until women are welcomed into the profession in greater numbers, it will be impossible to fully remedy the shortage of cybersecurity professionals. Currently, women in the cybersecurity profession tend to be over-mentored but under-sponsored by senior-level champions who believe in and are willing to advocate for women. There are some bright spots, however — groups such as the SheLeadsTech program, Women in Technology International (WITI) and Women4Cyber, to name a few, provide networks and resources for women in the field.

Beyond more support for women currently in the field, we need to encourage newcomers. Some of the solutions require a longer runway — such as the education system more vigorously and proactively encouraging girls to explore STEM coursework and university degree programs — but there are opportunities for quicker impact, such as bootcamps and training opportunities for women who do not yet have the ideal experience, as well as working with the Human Resources team to make sure job postings do not — intentionally or otherwise — include language that might deter women from applying. In addition to attracting more women to cybersecurity, former military members, neurodiverse professionals and underrepresented minority groups can not only help fill in-demand roles, but add diverse life experiences and problem-solving skills that allow teams to perform at a higher level.

Although many of the dynamics referenced above are not new, the explosive progression of artificial intelligence (AI) creates new context and heightened urgency around workforce challenges. AI can be a powerful tool both for cybercriminals and cybersecurity professionals, but to emerge victorious in this struggle, security leaders need to invest in the needed training and tools that will set up their security teams for success. The State of Cybersecurity report shows identity and access management, cloud computing, data protection, incident response and DevSecOps as the cybersecurity skills that are needed most, but a strong familiarity with how AI can be used by security professionals and adversaries alike must be increasingly top-of-mind for security teams to succeed as AI continued to complicate the threat landscape.

It is hardly breaking news that it is difficult for enterprises to find and retain the cybersecurity talent that they need. However, just because these workforce pain points have proven difficult to counteract does not mean enterprise leaders can give up hope that they can find the needed solutions. Without robust, well-resourced cybersecurity teams, organizations are unable to protect their precious assets or prevent high-profile cyber incidents that erode user trust. By prioritizing team members’ professional development, identifying the most important skills that are needed and investing accordingly, and intentionally pursuing a diverse set of prospective employees, organizations can nurture and sustain the security teams they need to be successful.

KEYWORDS: career development cybersecurity careers cybersecurity skills gap security career security career planning talent gap

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Woman in suit

Can the Industry Do More for Women in Security?

Cyber tech background

Security’s Top Cybersecurity Leaders 2026

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Ribbon of data

    Quantum Computing: A Call to Action for Security Professionals

    See More
  • Cyber and artificial intelligence

    Concerted push needed for AI training in security community

    See More
  • Digital Trust Ecosystem Framework

    Building digital trust with ISACA's framework

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • April 21, 2026

    The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

    Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing