Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical SecuritySecurity & Business Resilience

Closing the cloud skills gap as adoption grows

By Karl Fosaaen
Half open laptop in blue

Image via Unsplash

June 21, 2024

Global spending on public clouds has increased by 20.4% in the last year alone. Despite this rapid adoption rate and spike in spending, one out of every four IT and security specialists have struggled to keep up with the expertise and training required to adequately implement cloud security. As cloud use continues to grow, training and scaling teams to protect a modern cloud environment will pay off exponentially in the form of better data security and a reduced risk of technical debt. 

With the average cost of a data breach hovering at $4.35M, equipping security professionals with the tools and skills needed to combat cloud-based threats is essential to keep information secure and stay out of the headlines for a data breach. Some of the most common cloud security threats include unmanaged attack surfaces, misconfiguration or identity-related data breaches — all of which can be mitigated through proper and proactive personnel training and awareness programs. While security used to only be a concern for the IT department, with 31% of global enterprise cloud leaders ranking cybersecurity as a top investment priority for their organization, it’s now critical. Everyone, regardless of their level, is responsible for identifying and managing novel threats. Here are three tips for any organization working toward closing its cybersecurity skills gap and completing a successful cloud migration.

Assess the current landscape before diving in

At the beginning of a cloud transition, teams should first take a pragmatic approach to their current security designs to assess flaws. Having well-trained teams who can properly assess potential vulnerabilities is key to the migration’s success and to properly ease security pressures around this transition. 

Once current security concerns are identified and addressed, security and IT teams should work in tandem with the cloud deployment process to help keep everyone agile. These proactive security steps, sometimes aided by automation, remain a critical component in mitigating upfront risks in the migration process. For teams that can perform these proactive tasks effectively, the shift to the cloud becomes more focused on subsequently protecting data and ensuring compliance than worrying about security breaches or duplicated data.

Equip teams with the skills necessary to succeed

To avoid common pitfalls of security skills gaps, a best practice for organizations is to implement training programs for current employees that provide the skills necessary to secure cloud workloads. Studies show that over 80% of all company data breaches are caused by people — meaning skills gaps lead to security gaps, and subsequently, breaches. To avert this issue, leaders can engage their employees in upskilling programs offered by the cloud platform vendors that the organization works with. By earning these upskilling certifications, teams are better equipped to handle new and complex threats and support fellow team members in the event of a breach.

Without this, teams put organizations at risk for an increased rate of cyberattacks as they struggle to keep up with evolving security concerns and regulatory requirements. Alternatively, teams with larger budgets can invest in hiring new talent to oversee the cloud migration. Either way, in the hustle of rapid cloud migration, training should be a primary focus for organizations to ensure their team is equipped with the skills needed to successfully shift their workloads to the cloud.

Stay vigilant even after the migration is complete

After migrating workloads to the cloud, security teams must learn to manage an entirely new swatch of vulnerabilities. One critical way to assess and remediate these vulnerabilities is to implement a cloud penetration testing program, which helps internal teams protect their organizations by consistently identifying and mitigating security risks. A well-versed security team, combined with robust pen testing and configuration reviews, allows teams to test security misconfigurations and identify factors like inadvertent public access or excessive identity and access management (IAM) permissions. By implementing a holistic testing program combining human and technology-aided support, teams can work to arm themselves against preventable data breaches with proper cloud security. Without it, teams are left vulnerable to potential gaps in their security designs, lending themselves to insecure data and increased potential for data breaches.

At the end of the day, teams who rush into rapid cloud migrations can unknowingly set themselves up for failure down the line. Technology alone isn’t effective in catching and remedying all security issues. It’s up to leaders to deploy highly skilled and supported cloud security experts to guide organizations through the cloud migration process. Without focusing efforts on upskilling or scaling support, organizations risk the security of their data in poorly managed cloud environments.

KEYWORDS: cloud cloud migration cloud-based security organizational resilience pen testing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Karl fosaaen headshot

Karl Fosaaen is a VP of Research at NetSPI. Image courtesy of Fosaaen 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security employees

    Strategies for closing the cybersecurity skills & leadership gap

    See More
  • Closing the cyber skills gap requires a culture of continuous learning

    See More
  • Notebook with plan written on front

    Closing the cybersecurity skills gap: 3 steps risk leaders must take

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing