Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity Education & TrainingCybersecurity News

Combining Human Expertise and Automation to Close the Cyber Skills Gap

By Mike Armistead
cyber professional
September 23, 2019

The cybersecurity skills shortage has gained a lot of attention in recent years, and for good reason. Despite various education, upskilling and reskilling programs that have all attempted to close this gap, the results have been minimal. According to (ISC)2, there are currently 2.93 million unfilled cybersecurity positions globally. It’s time the industry admits the skills shortage is at crisis point.

One of the major contributors to the increasing skills gap is the speed at which the threat landscape is evolving. The number of threats being thrown at security analysts is increasing daily, as is the number of successful breaches against businesses worldwide. In 2017, IBM  estimated that organizations receive 200,000 security events each day – an impossible number for any human analyst to keep up with. Just imagine how much that figure has grown since then.

Staff Shortages, Team Burnout

So, how does this impact those on the front line?

With an impossible number of security events to analyze and the pressure of trying to stop all breaches, security teams suffer from mental fatigue as they spend countless hours monitoring vast numbers of alerts looking for that needle in a haystack. This has led to a generation of security analysts who are drained, stressed and frustrated. A research study by Enterprise Strategy Group and the Information Systems Security Association International revealed that as staffing shortages create a larger workload, security professionals spend more time fighting fires than performing more high-value and engaging work – a recipe for burnout.

However, it doesn’t have to be this way.

While education and training programs are extremely important in fostering critical IT knowledge and skills needed both today and tomorrow, the talent shortage is no longer something humans can fix. It’s time the industry realized that we can’t educate ourselves out of the skills gap crisis and instead look at feasible alternative solutions, in collaboration with machines.

It’s Time to Send in the Machines

To provide security teams with a fighting chance to proactively defend their organization, a security team’s cybersecurity strategy needs to find the right balance of human and machine by marrying analysts with automation.

By integrating automation into a company’s network, endpoint and intrusion monitoring workflow, analysts will be able to save a huge amount of time. The mundane, repetitive tasks like monitoring will be left to machines, decreasing the burdens placed on security teams and simplifying their tech stack. This will increase the effectiveness and efficiency of the entire security team, empowering analysts to thrive in their roles.

But to truly match the pace at which the threat landscape is growing, intelligent security solutions need to do more than automate tasks – they need to support decision making, too. That’s where Robotic Decision Automation (RDA) comes into play.

Unlike Robotic Process Automation (RPA)—which only automates very specific steps in a process—RDA leverages probability theory, provides advanced machine learning and uses the judgement and reasoning of a seasoned human analyst to make actionable decisions faster than ever before. RDA monitors, analyzes, decides and learns with the scale, speed and depth of consistent analysis found only in software. With RDA’s expert decision-making capabilities on board, the human members of security teams can proactively hunt threats, putting their skills and their time to good use.

What’s more, RDA simplifies the security tech stack and improves analyst job satisfaction by arming SecOps teams with the right software to work smarter, not harder.

Five Secrets for Security Success

Here are five secrets to managing a successful security program, even if you don’t have an enterprise-sized budget:

  1. Prioritize your security data sources: Rather than becoming overwhelmed by the avalanche of data types, focus on alerting technologies that provide better indications of compromise than others. The two primary technologies here are Network Intrusion Detection and Prevention and Endpoint Detection and Response.
  2. Know what matters in YOUR environment: High-value assets and accounts observed in alerts certainly makes the alerts worthier of analysis and can increase the likelihood of an actual attack. Similarly, vulnerability data and intelligence aids in understanding what could be an attack and what is likely not an attack.
  3. Use machine automation: This technology has changed the game by eliminating the need to perform many of the manual tasks performed over the last several decades. The right automation solution increases security capacity and capability while reducing operating costs.
  4. Choose applications rather than platforms: Steer away from complex platforms that require extensive configuration. Avoid software that requires consultants or project plans or that lack scalability.
  5. Use metrics to show your success: Use three operational metrics to provide you with optimum visibility into your security programs’ performance and a way to track improvements: coverage, Time to Detection and Time to Resolution.

Streamlining for Greater Security

Analysts today are already facing burnout, so tedious tasks should no longer be part of their job responsibility. With the right technology in place, businesses can properly address the cybersecurity skills gap by arming analysts with the resources they need, giving them the time to focus on more satisfying and high-value tasks.

KEYWORDS: cybersecurity cybersecurity skills gap data breaches robot

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike armistead

Mike Armistead is the co-founder and CEO at Respond Software. He is an industry veteran with three decades of leadership experience in the security, application development and consumer internet arenas. Mike co-founded Fortify Software in 2003 and acted as VP & general manager for both Fortify and ArcSight business groups after the companies were acquired by HP in 2011. Prior to Fortify, he held executive and key product positions at companies that include Pure Atria (IBM Rational) and Lycos. Over his career, Mike has led groups in all aspects of the organization, including marketing, development, operations and sales. His experience has spanned from managing large enterprises (+$350M revenues) to multiple start-ups in numerous industries.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 Minutes with Riccardo Ocleppo

    How to close the widening AI and cybersecurity skills gap

    See More
  • Woman holding laptop and wearing a hijab

    Why women should consider cybersecurity to help close the skills gap

    See More
  • automation_enews

    What We can Do to Bridge the Cyber Skills Gap

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!