Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementSecurity Education & TrainingCybersecurity News

ISACA’s Cybersecurity Study: Struggles with Hiring and Retention Persist, More Diversity Progress Needed

cyber5-900px.jpg
February 25, 2020

Cybersecurity teams continue to struggle with hiring and retention, and very little improvement has been achieved in these areas since last year, according to new global research from ISACA that identifies current workforce challenges and trends in the cybersecurity field.

Part 1 of ISACA’s 2020 State of Cybersecurity report finds that enterprises are short-staffed, have difficulty identifying enough qualified talent for open positions and don’t believe their HR teams adequately understand their hiring needs. Additionally, while slight progress is reported in the effort to increase the number of women in cybersecurity roles and in established diversity programs, most cybersecurity teams still indicate they have significantly more men than women, and most report that progress is minimal.

“Cybersecurity jobs are in huge demand but, as many organizations are all too aware, it continues to be a real struggle to find the right candidates with the right skills and experience to meet the demands of these roles,” says retired Brigadier General Greg Touhill, ISACA board director, and President of the AppGate Federal Group. “Better understanding the nature of the skills gaps and issues with hiring and retention can help the industry more effectively drive innovative strategies and tactics to address and overcome these long-standing challenges.”

Some key findings include:

  1. 62 percent say their organization’s cybersecurity team is understaffed, and 57 percent say they currently have unfilled cybersecurity positions on their team.
  2. 70 percent say that fewer than half of their cybersecurity applicants are well qualified.
  3. 72 percent of cybersecurity professionals believe their HR departments do not regularly understand their needs.
  4. 58 percent of respondents anticipate an increase in cybersecurity budgets, an increase of three percentage points from last year, but less than the 64 percent reported two years ago, signaling that spending may be leveling out.

Finding staff with the right skill-sets continues to be difficult for cybersecurity teams. Survey respondents expressed that having a degree does not necessarily indicate that a candidate is ready for the job, with only 27 percent saying that recent graduates in cybersecurity are well-prepared. They also indicated that candidates are not measuring up in either technical or soft skills, citing as the top five skills gaps being soft skills (32 percent), IT knowledge and skills gaps (30 percent), insufficient business insight (16 percent), cybersecurity technical experience (13 percent) and insufficient hands-on training (10 percent). However, when asked about the factors they consider when determining if a cybersecurity candidate is qualified, they place emphasis on technical skills, ranking the top three qualifications as hands-on cybersecurity experience (95 percent), credentials (89 percent) and hands-on training (81 percent).

Once teams achieve the difficult task of finding the right professionals, they then struggle to retain them, with 66 percent saying it’s difficult to retain cybersecurity talent, a slight increase from last year. They cite the main reasons for staff leaving as recruitment by other companies (59 percent), limited promotion and development opportunities (50 percent), poor financial incentives (50 percent), high work stress levels (40 percent, a 10-percentage point increase from the year prior) and a lack of management support (39 percent).

As part of efforts to retain women in cybersecurity teams and increase representation in the field, organizations have been making slight progress in putting diversity programs in place, with 49 percent of respondents indicating that they have these programs—an increase of five percentage points from last year. Sixty-four percent indicate some progress toward increasing the number of women in cybersecurity roles, though only 13 percent say that progress is significant. Respondents indicated that 86 percent of cybersecurity teams still have significantly more men than women or consist of all men; though, on a more positive note, the number of teams reporting equal number of men and women increased by three percentage points this year.

“Diversity in this field is crucial—not only for enterprises to address hiring challenges to bring qualified, skilled talent onto their teams, but also to ensure that different viewpoints are reflected that strengthen their cybersecurity strategies and functions.  It will be imperative to have these different viewpoints to address the newest, toughest challenges in cybersecurity,” says Brennan P. Baybeck, ISACA board chair; vice president and CISO, customer services, Oracle. “It is encouraging to see even slight advances being made; however, it is clear that more significant progress is needed to increase diversity in cybersecurity, including representation of women in these roles.”

KEYWORDS: cyber security cybersecurity cybersecurity skills gap cybersecurity training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Changing the Hoodie Image for Cybersecurity

    Talent Acquisition, Retention Leading Diversity Initiatives in Cybersecurity Jobs

    See More
  • ISACA2021

    Cybersecurity workforce minimally impacted by pandemic, but still grappling with persistent hiring challenges

    See More
  • SEC1120-Cyber-Feat-slide1_900px

    Engaging in diversity, equity, and inclusion for stronger cybersecurity

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing