Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity Education & TrainingCybersecurity News

Combining Human Expertise and Automation to Close the Cyber Skills Gap

By Mike Armistead
cyber professional
September 23, 2019

The cybersecurity skills shortage has gained a lot of attention in recent years, and for good reason. Despite various education, upskilling and reskilling programs that have all attempted to close this gap, the results have been minimal. According to (ISC)2, there are currently 2.93 million unfilled cybersecurity positions globally. It’s time the industry admits the skills shortage is at crisis point.

One of the major contributors to the increasing skills gap is the speed at which the threat landscape is evolving. The number of threats being thrown at security analysts is increasing daily, as is the number of successful breaches against businesses worldwide. In 2017, IBM  estimated that organizations receive 200,000 security events each day – an impossible number for any human analyst to keep up with. Just imagine how much that figure has grown since then.

Staff Shortages, Team Burnout

So, how does this impact those on the front line?

With an impossible number of security events to analyze and the pressure of trying to stop all breaches, security teams suffer from mental fatigue as they spend countless hours monitoring vast numbers of alerts looking for that needle in a haystack. This has led to a generation of security analysts who are drained, stressed and frustrated. A research study by Enterprise Strategy Group and the Information Systems Security Association International revealed that as staffing shortages create a larger workload, security professionals spend more time fighting fires than performing more high-value and engaging work – a recipe for burnout.

However, it doesn’t have to be this way.

While education and training programs are extremely important in fostering critical IT knowledge and skills needed both today and tomorrow, the talent shortage is no longer something humans can fix. It’s time the industry realized that we can’t educate ourselves out of the skills gap crisis and instead look at feasible alternative solutions, in collaboration with machines.

It’s Time to Send in the Machines

To provide security teams with a fighting chance to proactively defend their organization, a security team’s cybersecurity strategy needs to find the right balance of human and machine by marrying analysts with automation.

By integrating automation into a company’s network, endpoint and intrusion monitoring workflow, analysts will be able to save a huge amount of time. The mundane, repetitive tasks like monitoring will be left to machines, decreasing the burdens placed on security teams and simplifying their tech stack. This will increase the effectiveness and efficiency of the entire security team, empowering analysts to thrive in their roles.

But to truly match the pace at which the threat landscape is growing, intelligent security solutions need to do more than automate tasks – they need to support decision making, too. That’s where Robotic Decision Automation (RDA) comes into play.

Unlike Robotic Process Automation (RPA)—which only automates very specific steps in a process—RDA leverages probability theory, provides advanced machine learning and uses the judgement and reasoning of a seasoned human analyst to make actionable decisions faster than ever before. RDA monitors, analyzes, decides and learns with the scale, speed and depth of consistent analysis found only in software. With RDA’s expert decision-making capabilities on board, the human members of security teams can proactively hunt threats, putting their skills and their time to good use.

What’s more, RDA simplifies the security tech stack and improves analyst job satisfaction by arming SecOps teams with the right software to work smarter, not harder.

Five Secrets for Security Success

Here are five secrets to managing a successful security program, even if you don’t have an enterprise-sized budget:

  1. Prioritize your security data sources: Rather than becoming overwhelmed by the avalanche of data types, focus on alerting technologies that provide better indications of compromise than others. The two primary technologies here are Network Intrusion Detection and Prevention and Endpoint Detection and Response.
  2. Know what matters in YOUR environment: High-value assets and accounts observed in alerts certainly makes the alerts worthier of analysis and can increase the likelihood of an actual attack. Similarly, vulnerability data and intelligence aids in understanding what could be an attack and what is likely not an attack.
  3. Use machine automation: This technology has changed the game by eliminating the need to perform many of the manual tasks performed over the last several decades. The right automation solution increases security capacity and capability while reducing operating costs.
  4. Choose applications rather than platforms: Steer away from complex platforms that require extensive configuration. Avoid software that requires consultants or project plans or that lack scalability.
  5. Use metrics to show your success: Use three operational metrics to provide you with optimum visibility into your security programs’ performance and a way to track improvements: coverage, Time to Detection and Time to Resolution.

Streamlining for Greater Security

Analysts today are already facing burnout, so tedious tasks should no longer be part of their job responsibility. With the right technology in place, businesses can properly address the cybersecurity skills gap by arming analysts with the resources they need, giving them the time to focus on more satisfying and high-value tasks.

KEYWORDS: cybersecurity cybersecurity skills gap data breaches robot

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike armistead

Mike Armistead is the co-founder and CEO at Respond Software. He is an industry veteran with three decades of leadership experience in the security, application development and consumer internet arenas. Mike co-founded Fortify Software in 2003 and acted as VP & general manager for both Fortify and ArcSight business groups after the companies were acquired by HP in 2011. Prior to Fortify, he held executive and key product positions at companies that include Pure Atria (IBM Rational) and Lycos. Over his career, Mike has led groups in all aspects of the organization, including marketing, development, operations and sales. His experience has spanned from managing large enterprises (+$350M revenues) to multiple start-ups in numerous industries.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 Minutes with Riccardo Ocleppo

    How to close the widening AI and cybersecurity skills gap

    See More
  • Woman holding laptop and wearing a hijab

    Why women should consider cybersecurity to help close the skills gap

    See More
  • automation_enews

    What We can Do to Bridge the Cyber Skills Gap

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing