Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Closing the cybersecurity skills gap: 3 steps risk leaders must take

By Prasad Sabbineni
Notebook with plan written on front

Image via Unsplash

August 13, 2024

The workforce issues plaguing the cybersecurity sector are no longer a trend — they’re an urgent call to action that leaders need to take steps to answer.

Cyber teams are already overwhelmed by the challenges in the modern risk ecosystem. Cyberattacks are growing faster than positions. Employees are underequipped and under-skilled, trying to keep pace with a rapidly evolving digital ecosystem that hackers are keen to exploit. In some cases, companies have even laid off cybersecurity professionals. 

But according to data compiled by NIST, there were more than 600,000 job openings in cybersecurity last year amid growing demand for professionals, with 83% of corporate boards recommending an increase in IT security workers.

With more pressure than ever on boards to take accountability for risk, how can leaders bridge the skills gap and turn their cyber risk into an area of strength? It starts with a holistic approach to growing the risk team and equipping them with the training and tools to help them thrive.

Invest in new cyber talent

Over the past year, cybersecurity professionals have not been exempt from waves of tech layoffs as companies cut costs and restructure. But cutting risk experts at a time when they are needed most creates new risk gaps and opens companies up to threats. 

With risks on the rise, now is the time to grow risk teams and invest in new talent. Companies need to be hiring for their risk teams to keep pace with more sophisticated threats and changing regulations. 

Employing skilled recruiters to identify quality cybersecurity talent is essential to building the right team. In tandem, attractive compensation packages and clear opportunities for career growth are table stakes for hiring managers to offer candidates. 

Develop the existing team through upskilling

In addition to building out new talent, leaders must also focus on investing in their existing team’s skills.

Cybersecurity is an intense, demanding role in part because its practitioners have to match the rapid pace of digital change with their skills to stay one step ahead of potential risks. 

Leaders need to build a culture of continuous learning to ensure their teams are prepared and agile for the complex risk environment they face. 

Upskilling and reskilling programs are one way companies can fill the cybersecurity skills gap. There are many vendor-specific and vendor-neutral options that can build on the existing knowledge of teams, sharpen their skills, and apply existing skills to new areas of cybersecurity practice. AI and machine learning is another in-demand skill area for training and upskilling, as hackers are focusing on exploiting these technologies. 

Employees should also feel empowered to seek out training and certification opportunities on their own, with time flexibility and financial support from leadership.

Lean into AI and GRC tools that empower the risk team

Companies looking to close the cybersecurity skills gap need to equip their teams with future-ready tools and invest in technologies that take their skills to the next level. This includes both AI and governance, risk and compliance (GRC) solutions.

AI has been tested in the market long enough to show that, despite early fears, AI will not replace people. Instead of fearing AI’s capabilities, leaders need to consider how AI can empower their teams to perform better.

In the risk and cyber sector, AI will assist cyber professionals, helping them focus more on strategic analysis and less on low-value manual tasks. Automation and AI can reduce or even eliminate routine tasks that would normally absorb large amounts of time, such as sifting through large amounts of data to identify threats or specific control anomalies. AI and automation can perform these formerly manual tasks, enabling the cybersecurity leaders to focus on analysis, recommendations and decisions. 

GenAI is emerging to offer recommendations and action plans for risk teams, in addition to analysis. Anticipatory analytics, which predicts risks and threats, is another growing area of GRC that holds promise for optimizing risk and cybersecurity practice for more efficient teams. 

Tech, automation and AI do not necessarily replace people, but they augment their productivity and empower them to focus on high-value work. 

The next generation of cyber risk experts

The practice of cybersecurity has evolved incredibly fast over the past decade. Cybersecurity is now a board-level business risk. The CISO and their surrounding team members are expected to advise on a business level and collaborate across the enterprise — far beyond the role of a siloed technical expert.

The cybersecurity team must evolve and grow too, to keep pace with so much change. Investing in people, processes, and tools are the three areas on which leaders must focus on to stay ahead. 

Technology alone cannot stop every cyber threat — the differentiator will always be the human factor in managing business risk. Hiring the right team members and properly equipping them is a major step to filling the cybersecurity gap.

KEYWORDS: artificial intelligence (AI) cybersecurity trends security career training security industry talent gap

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Prasad sabbineni headshot

Prasad Sabbineni is the Co-CEO at MetricStream. Image courtesy of Sabbineni 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Women shaking hands

    How to bridge the cybersecurity skills gap — Take a risk

    See More
  • cyber security employees

    Strategies for closing the cybersecurity skills & leadership gap

    See More
  • Closing the cyber skills gap requires a culture of continuous learning

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products

Events

View AllSubmit An Event
  • May 14, 2012

    Effective Risk Communication: Theory, Tools, and Practical Skills for Communicating about Risk

    Stay ahead of the curve by attending this in-depth program, featuring the latest scientific findings on risk perception, case studies from around the world, a suite of practical tools, and hands-on skill training.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing