Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Bridging the widening cybersecurity skills gap

By Joe Oleksak
Lightbulb with gradient colorful background

Image via Unsplash

April 25, 2024

In today’s cyber landscape, the challenges loom large. Evolving threats and technologies have reshaped the battleground, making traditional on-premises infrastructure defenses obsolete. Despite advancements in security tools, a pressing issue remains: a significant shortage of skilled professionals.

In addition to the compromise of mission-critical systems and networks, enterprises grapple with reputational damage, financial losses, compliance hurdles and legal ramifications from a cyberattack. Organizations must not only address current risks but also anticipate future threats, safeguard sensitive data, comply with regulations, meet industry expectations and prioritize customer satisfaction. These imperatives underscore the critical need for businesses to bridge the cybersecurity skills gap, ensuring the continuity of digital transformation that drives competitiveness and resilience in the face of these evolving threats.

Where the industry is at with the issue

In its annual Cybersecurity Workforce Study released last October, ISC2 found that the gap between the number of cybersecurity professionals available and needed increased by 12.6% over the previous year even though the cybersecurity workforce as a whole grew by 8.7%. ISC2’s findings show that a large percentage of respondents believe they do not have enough cybersecurity professionals in their organization to prevent and troubleshoot cybersecurity issues. Across industries, 67% of cybersecurity professionals reported that their team is understaffed.

Technical expertise is essential, but other skills are equally vital

As our understanding of security has matured, the demands associated with cybersecurity positions have grown. Although technical proficiency remains crucially important, it is no longer sufficient on its own. Yes, some employees may understandably gravitate to a particular aspect of security such as threat analysis or incident response. And supporting a niche role is entirely possible and valued in many organizations. However, to be effective in a general practitioner or leadership role requires today’s cybersecurity professionals to possess a multi-faceted skill set. Beyond technical skills, professionals in these roles must also grasp intricate industry regulations, risk management, organizational processes, security prioritization and customer expectations as well as adapt to continuous learning and thrive in high-stress environments. 

Bridging the gap — how do organizations develop, attract and retain such professionals?

Fortunately, there are many proven strategies enterprises can embrace, and steps they can take, to address the cybersecurity skills gap — a gap that will only widen as organizations realize that the demand for professionals who possess such competencies will continue to outpace their availability for years to come.

Executive, IT and cybersecurity leaders can and must take action to address this reality. Fundamental, required actions include:

  • Revisit the organization’s environment and culture: It is crucial for both leaders and the entire enterprise to acknowledge that cybersecurity, though closely tied to IT, is a complex discipline. This field demands not just dedicated resources but also a unique reward system and organizational structure. These elements should be in alignment with the crucial role cybersecurity plays in protecting an organization’s assets, reputation and its ability to conduct business. Just as importantly, this necessitates not only the recruitment of individuals who possess the aforementioned multifaceted skill set, but also the proactive development of such talent.
  • Prioritize the work-life balance and job satisfaction of employees in cybersecurity roles: Unfortunately, in many companies, cybersecurity roles are only valued when a breach occurs. Leaders must take steps to support the mental and physical health of cybersecurity professionals who often feel they are “on call” at all times. This includes recognizing the demanding nature of their roles and the importance of maintaining resilience and job satisfaction. 
  • Invest in comprehensive professional development: Continuous training is critical to maintaining relevance in the field of cybersecurity. Organizations should provide opportunities for their cybersecurity employees to enhance their skills and stay abreast of emerging threats and technologies. This includes employer funded technical training and additional opportunities for development in areas such as compliance, risk management and leadership — not to mention evolving areas like AI. It is also critical to support participation in industry conferences and professional associations. These perks demonstrate a commitment to ongoing learning and help retain top talent.
  • Create partnerships with local educational institutions: Local community colleges and universities that offer cybersecurity programs serve as excellent sources for new talent. Additionally, these institutions provide opportunities to enhance the skill sets of current employees. Cybersecurity apprenticeships, cyber range simulation training, blue-teaming competitions and various other proactive educational initiatives can help uplevel the workforce. 
  • Foster relationships with cybersecurity consultants to bridge the skills gap: Retention is challenging, so establishing collaborative relationships with reputable cybersecurity firms provides organizations with access to specialized expertise and resources, helping to address the shortage of cybersecurity professionals. And if designed appropriately, these relationships offer the benefit of independent perspectives and impartial assessments, allowing executives to make informed decisions and navigate complex cybersecurity challenges with confidence. This also alleviates pressure on security teams, allowing them to focus on core responsibilities with greater confidence.
  • Invest in new technologies: New innovations make cybersecurity professionals’ lives easier and enable them to focus more on high-value activities like the cybersecurity training of business users. For example, investments in AI-powered solutions can automate the monitoring of security logs. They can also generate alerts when devices connected to the network behave suspiciously. Such technologies augment any organization’s security stance and free cybersecurity employees from tasks that, while important, can be tedious.

The greatest vulnerability in many organizations today is the inability of leaders to communicate and collaborate on their cybersecurity needs and investments. In years to come, those who develop strong personal relationships in the cybersecurity community will possess an asset that will only grow more valuable with time — an experienced, proven, satisfied and dedicated cybersecurity team — teams of professionals that will increasingly be required not only to secure cybersecurity insurance, but to successfully complete the digital transformations required for business success.

KEYWORDS: cybersecurity education & training cybersecurity leadership cybersecurity partnerships security professionals talent gap workplace culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Oleksak joe headshot

Joe Oleksak, CISSP, CRISP is a partner in Plante Moran’s cybersecurity practice. Image courtesy of Olesak

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 Minutes with Riccardo Ocleppo

    How to close the widening AI and cybersecurity skills gap

    See More
  • Business women

    Bridging the gender gap in cybersecurity

    See More
  • SEC1219-cybergap-Feat-slide1_900px

    How to Close Cybersecurity's Widening Workforce Gap

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!