Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementCybersecurity News

More than one-third of tech professionals report AI skills shortage

By Jordyn Alger, Managing Editor
Two people working at laptops with documents

Image via Unsplash

October 11, 2024

Research from O’Reilly reveals a disconnect between the evolving threat landscape and the preparedness of security teams to meet said threats. A notable finding in the research is the skills gap for AI security. According to 33.9% of technology professionals, the industry is experiencing a shortage of AI-related security skills, particularly in relation to prompt injection vulnerabilities. Another concern highlighted was the lack of cloud skills expertise. 38.9% of respondents reported cloud skills were the top skills shortage. 

Key findings from the report include: 

  • Phishing is a the top threat: 55.4% cite phishing as their top concern, succeeded by network intrusion (39.9%) and ransomware (35.1%). 
  • Multifactor authentication (MFA) is common: Among tech professionals, 88.1% have implemented MFA, 60.1% have adopted endpoint security, and 49.2% have subscribed to a zero trust mindset.
  • Certification trends: 40.8% of security team workers are not certificated, yet 51.3% of organizations require certification in the hiring process. 
  • Continuous training: 80.7% of organizations require continuing education for security team professionals. 

Security leaders weigh in

Amit Zimerman, Co-Founder and Chief Product Officer at Oasis Security:

“To address the shortage of AI security skills, organizations need to invest in upskilling their teams through dedicated AI security training programs. These programs should focus on both foundational AI security knowledge and emerging threats like prompt injection. Partnering with universities and industry certification bodies to develop standardized curricula can help bridge the gap. Moreover, encouraging cross-functional collaboration between AI specialists, security professionals and software engineers can help teams stay ahead of evolving threats. Implementing AI security tools that provide real-time threat detection and learning capabilities can also alleviate the skills gap by automating the identification of vulnerabilities like prompt injection.

“Cloud security is a multifaceted challenge that requires both strategic planning and operational excellence. Organizations should focus on leveraging modern tools that offer comprehensive analytics, capable of processing large volumes of data to identify and prioritize vulnerabilities. The use of policy-based automation and security orchestration tools allows teams to respond to threats proactively and at scale. Additionally, building a culture of continuous learning is crucial — offering specialized cloud security training and certifications can help fill this expertise gap. Investing in hands-on, scenario-based training can ensure teams are equipped to handle real-world security incidents efficiently.

“Regular employee training remains essential in combating phishing threats, but training must evolve beyond static lessons. Incorporating phishing simulators to mimic real-world attacks enables employees to apply their training in dynamic environments, testing their ability to recognize and respond to threats effectively. However, education alone isn’t sufficient. IT security teams must implement strong identity and access management (IAM) frameworks with compensating controls like multi-factor authentication (MFA) to mitigate phishing attempts. While traditionally phishing has been the main entry point for attackers, as an industry we have done a lot to improve our defense and made it much harder for attackers. What we are seeing is that attackers are now increasingly looking at weaker parts of the perimeter, such as non-human identities (NHIs), which control machine-to-machine access and are increasingly critical in cloud environments. NHIs now outnumber human identities in most organizations, and securing these non-human accounts is vital, especially in AI-heavy architectures like Retrieval-Augmented Generation (RAG) systems.

“To successfully integrate AI-enabled security tools and automation, organizations should start by evaluating the effectiveness of these tools in their specific contexts. Rather than being swayed by marketing claims, teams should test tools against real-world data to ensure they provide actionable insights and surface previously unseen threats. Existing security frameworks may need to be updated, as older frameworks were designed for non-AI environments. A flexible approach that allows for the continuous evolution of security policies is critical.” 

Nicole Carignan, Vice President of Strategic Cyber AI at Darktrace:

“Historically, security was an afterthought in the development of AI models, leading to a skills gap between security practitioners and AI developers. As we continue to embark on the AI revolution, innovation research and information sharing across the industry is essential for both AI developers and security practitioners to expand their knowledge. Practitioners should leverage industry resources from NIST, CISA, MIT, and other reputable podcasts, news sources, online courses and more to upskill themselves and help bridge the growing skills gap in AI security. Promoting continued education through industry collaboration and knowledge sharing upfront will allow us to move even faster to realize the positive opportunities and benefits of AI. Cross-functional teams that work together with expertise across different domains (DevSecOps, data engineering, data Science, ML engineering, security, cloud, risk, etc.) can facilitate faster, safer innovation as well as provide individuals the ability to cross-skill in other areas. 

“Faced with limited resources, organizations need to ensure their technology is helping to augment the expertise and skills that they do have. Organizations should seek integrated solutions purpose built for cloud data rather than trying to retrofit on-prem tools. With the right implementation, AI can significantly enhance visibility and threat detection across multi-cloud, hybrid, and on-premise environments. AI-powered agentless cloud solutions can reduce the complexity and costs associated with installing and maintaining agents on cloud resources. They reduce the performance impact on cloud workloads, and can streamline security deployment across large, dynamic environments. With tools that provide constant visibility, autonomous investigation and real-time response, security teams can focus their limited time and resources where they are needed most.

“Implementing AI safely and securely in security operation centers (SOC) can help augment the current cyber workforce, expanding situational awareness, and accelerating mean time to action to allow them to be more efficient, reduce fatigue and prioritize cyber investigation workloads. AI can act as a force multiplier, augmenting human teams by performing autonomous investigations to lower triage time and accelerate detection of an incident.

“It is critical that organizations focus on implementing AI techniques that drive accuracies of detection and data analysis to help uplift teams, enabling security teams to prioritize higher-level strategic efforts, like improving cyber resilience. If models are not rooted in transparency, explainability, privacy and control; hallucinations or inaccurate outputs may cause erroneous information to be fed into workflows, exacerbating issues of alert fatigue and potential burnout.” 

Stephen Kowski, Field CTO at SlashNext Email Security+:

“Organizations can address AI security skills shortages by investing in specialized training programs and partnering with AI security experts. Encouraging cross-functional collaboration between AI and security teams can foster knowledge sharing and skill development. Leveraging advanced AI-powered security solutions can also help bridge the gap by automating complex threat detection and response tasks.

“To close the cloud security skills gap, organizations should prioritize cloud-specific security training and certifications for their IT staff. Implementing cloud-native security tools that provide comprehensive visibility and protection across multi-cloud environments can help mitigate risks. Engaging managed security service providers with cloud expertise can also supplement in-house capabilities and provide valuable guidance.

“To prepare for AI-enabled security tools and automation, organizations should first assess their current security posture and identify areas where AI can add the most value. Investing in solutions that seamlessly integrate with existing security infrastructure and provide actionable insights is crucial. Upskilling security teams on AI concepts and fostering a culture of continuous learning will ensure successful adoption and maximize the benefits of these advanced technologies.” 

Jason Soroko, Senior Fellow at Sectigo:

“Organizations can address the AI security skills shortage by investing in specialized training for emerging vulnerabilities like prompt injection, giving time to achieve certifications, and partnering with educational institutions to develop relevant curricula. Employees need time and experience with new toolsets. The mind shift won’t happen without an investment in putting aside dedicated time.

“To close the cloud security skills gap, organizations should offer targeted training programs, support certification efforts and consider hiring experts to mentor existing teams. To combat phishing, IT security teams should implement regular phishing simulations, provide interactive training sessions and promote a security-conscious culture that encourages reporting suspicious activities. 

“Preparing for AI-enabled security tools and automation involves assessing current security frameworks, identifying integration points for new technologies, investing in appropriate tools and training staff to effectively manage and utilize these innovations. Technical staff often have the problem of thinking that automation will put their jobs at risk, but they should be encouraged to utilize automation tools to enhance their effectiveness.” 

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security cloud security talent gap

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Person using ATM

    Breach exposed information of more than 500,000 credit union members

    See More
  • 5 Minutes with Riccardo Ocleppo

    How to close the widening AI and cybersecurity skills gap

    See More
  • Generic Image for Cyber Security

    More Than One-Third of Companies Can Use Help with Access Control

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • December 12, 2024

    AI-Powered Security: Empowering Teams and Protecting Your Future

    ON DEMAND: Discover how artificial intelligence is revolutionizing modern security practices in this webinar “AI-Powered Security: Empowering Your Team, Protecting Your Future.”
  • November 14, 2024

    Best Practices for Integrating AI Responsibly

    ON DEMAND: Discover how artificial intelligence is reshaping the business landscape. AI holds immense potential to revolutionize industries, but with it comes complex questions about its risks and rewards.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing