Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireCybersecurity NewsGovernment: Federal, State and Local

DHS Acting Chief Calls For Urgency To Attack Cyber Job Shortage

By Ted Knutson
Elaine Duke Security Magazine October 2017
October 4, 2017

Department of Homeland Security Acting Secretary Elaine Duke told a U.S. Chamber of Commerce cybersecurity summit today there is a need to create a sense of urgency to ease the shortage of cyber professionals.

At the Sixth Annual Cyberscurity Summit held in Washington, D.C. today, Duke warned the number of unfilled cybersecurity jobs soared 250 percent last year and will grow to 3.5 million by 2021. Source: https://cybersecurityventures.com/jobs.

The Acting DHS head called for a three-pronged approach to attacking the shortage.

One, she said, is to transform and elevate the cybersecurity learning environment from elementary school to adults considering post-collegiate education to change careers.

A second strategy, Duke said, that should be implemented is to prepare people for lifelong careers in the field.

As a third imperative for diminishing the cyber employment cavity, Duke said guidelines should be established to determine the effectiveness of measures to beef up the cyber workforce.

Duke said estimates are cybercrime losses will total $6 trillion by 2021, according to research from https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/.

The DHS leader said that automated indicator sharing will play a key role in boosting the effectiveness of government and industry cooperation to lessen the impact of hacking by having computer to computer alerting of threats act more efficiently and effectively than human to human communication can. “We’re committed to information sharing with the private sector,” said Duke.

To make that sharing more palatable for businesses, she said DHS is offering limited liability to companies that share threat data.

During her speech, Duke also praised the nation’s electric companies for making substantial investments in cyber protection.

At the event, Cyber Threat Alliance President Michael Daniel cautioned for too long cybersecurity has been treated as technical problem rather than a long-term risk that needs to be managed

Daniel, who served as a cybersecurity advisor to President Barack Obama, said cyber threats are becoming more dangerous and disruptive as we become ever more digitally dependent. “The impact an actor can have is considerably greater,” he said.

He warned software updates notifications are being used more frequently by hackers to do damage.

IBM Security Threat Intelligence Vice President Caleb Barlow told the audience that responses to breaches often cause more damage than the hacks themselves.

He said that damage is coming from executives who are used to thinking slowly, deliberately and build consensus which often isn’t sufficiently fast and effective to respond to hacks. He added it is vital to declassify threat intelligence and get information out as quickly as possible. “Speed is all that matters in information sharing,” said the IBM cybersecurity executive.

DHS Chief Cybersecurity Official Jeanette Manfra said information sharing is vital as a better enabler for better prevention and better response and recovery.  “Information sharing works,” said Manfra. However, she admitted that a lot of people are being overwhelmed by the data. The official said DHS is increasingly examining what cyberthreat information it needs to share, what the agency is trying to prevent and what can be automated.

Manfra pointed out she is noticing more companies to need to automate the cyber threat information they are getting into their systems.

The FBI’s overseer of cyber investigations, Paul Abate, told the gathering that the agency is poised to quickly respond to cyber attacks globally. He noted that a lot of businesses aren’t coming to the FBI and other law enforcement operations when they are hacked.

Ted Knutson is a Washington, D.C.-based political, cybersecurity and regulatory reporter.

 

 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Acting Secretary of DHS Announces Additional Support to Firefighting Organizations

    See More
  • GAO Study Calls for Continued Attention to Secure Cyber Systems

    See More
  • Chad Wolf

    Chad Wolf Named Acting DHS Secretary

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing