Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and Management

How to Close Cybersecurity's Widening Workforce Gap

How are public-private partnerships helping solve the cybersecurity skills gap?

By Aidan McCauley
SEC1219-cybergap-Feat-slide1_900px
December 6, 2019

Cyberattacks have realized unparalleled heights. In 2019 alone, cyber criminals have compromised the data of hundreds of millions of users. They have penetrated Apple’s iOS, Microsoft’s Visual Studio and other systems that were once seen as impenetrable. Tens of millions of Capital One credit card applicants had their banking information stolen in one of the largest-ever hacks of a financial institution. Ransomware is infecting local governments across the U.S. and disrupting private industry around the globe.

Unfortunately, while the frequency and intensity of these malicious breaches grows at an alarming pace, so, too, does the gaping hole of talent needed to beat these sophisticated hackers at their own game. This year, the U.S. has a shortage of 314,000 trained cybersecurity professionals. That’s a 50-percent increase since 2015.

Finding the talent to perform these essential tasks is a top business concern for U.S. CEOs.

Solving a Systemic Lack of Cyber Skills

To remedy this deficit on the domestic front, American companies are looking overseas. They are turning to Europe and other regions whose new strategies are churning out the software professionals needed to plug the cyber skills gap. Many of these firms are establishing overseas operations in places that offer multiple benefits, where the talent pool is abundant and the overall cost of doing business is lower. They are also embracing Europe’s “cluster” concept, a highly successful economic development model that engages regional, market-specific teams of government, research and academia to meet organizations’ hiring goals and bolster growth.

For more than 20 years, Europe’s “cluster” concept has helped U.S. companies prosper. More immediately, these novel initiatives are addressing the worrisome talent deficiency in the security sector.

As global security spending is expected to exceed $124 billion in 2019, and $170.4 billion in 2022 and demand for artificial intelligence, cloud services, data analytics and other technologies rapidly accelerates, U.S. security companies are casting wider nets to protect their assets and fill the talent void. For example, Microsoft is investing $1 billion in cybersecurity in each of the coming years and tapping Israel – with its strong military and defense focus – to fill some of its cyber needs.

An Ecosystem that Keeps on Giving

In such countries as Norway, Sweden, Denmark, Finland and Ireland, extensive efforts are underway to train and graduate large numbers of professionals for careers in such critical areas as enterprise and network security, cloud security, application security, busines continuity management, penetration testing and malware.

Ireland is a major player in this arena, as is Stockholm, Sweden and many other major European tech hubs. With more than 200,000 tech workers in Stockholm alone, Sweden is opening new schools to produce more STEM-focused (science, technology, engineering, mathematics) technologists, with a strong focus on cybersecurity positions.

In Ireland, where more than 6,000 security professionals work for more than 40 multinational companies – the majority with U.S. headquarters – a robust cyber training movement is being led by the nation’s Cybersecurity Skills Initiative (CSI). CSI is a product of Cyber Ireland and IDA Ireland, and facilitated by Cork Institute of Technology (CIT) as a mechanism for creating jobs and accelerating Ireland’s growing cybersecurity ecosystem.

This collaboration of government and academia also includes U.S. companies IBM, Deloitte and others with Irish operations, among its major business supporters. CSI is training 5,000 new cybersecurity professionals in the next three years to fill the country’s demand for security analysts, security engineers, architects, auditors, testers and a host of other sector jobs. The majority of these graduates are expected to find jobs with multinational corporations, and the initiative is moving toward its goal of bringing 4,000 firms into the fold.

Educating a New Generation of Tech Talent

Microsoft, Google, Facebook, SAP, Dell, Cisco and many other American tech firms with high stakes in digital security provided input before the program was set in motion. Putting aside their competitive business approaches for the greater good of the tech community, these giants collaborated to identify needs, risks and specific vulnerabilities so that Irish universities and tech institutes could develop programs for a wide range of occupations. The varied programs extend from two-day courses for non-technical employees to 12-week courses to graduate programs.

Dr. Eoin Byrne, cluster manager of Cyber Ireland, says CSI was developed to train a high-quality workforce that not only meets employment needs in cybersecurity, but also those in the broader tech sector. These new skills will build on the existing base of talent that already supports the country’s growing tech hub, he says.

“As far back as 2017, U.S. businesses, the Irish government and academia have been working together to, first, understand key challenges and then create solutions for the cybersecurity and technology sector. We plan to address industry employment issues beyond just security,” Byrne says.

Even as we ready a current generation of cybersecurity professionals, we must prepare the next one. Cybersecurity is becoming enormously complex. The war for cybersecurity talent requires innovative solutions that are realized when public and private enterprises work together for this unified goal. To develop this critical pool of talent, both the cybersecurity industry and national governments must be deliberate in their efforts.

KEYWORDS: cyber security cybersecurity data breach public private partnerships ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sm sec0519 shortage slide2 900px

Aidan McCauley is a contributing writer and Vice President of Enterprise Technology and Cyber Security investments for IDA Ireland, based out of its Mountain View, California office. He supports Bay Area companies looking to assess the best location to establish and grow their European operations.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 Minutes with Riccardo Ocleppo

    How to close the widening AI and cybersecurity skills gap

    See More
  • SEC0519-Shortage-Feat-slide1_900px

    How to Meet the Growing Demand for Cybersecurity Professionals

    See More
  • cyber5-900px.jpg

    Cybersecurity Workforce Needs to Grow 145% to Close Skills Gap

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!