Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Closing the cyber skills gap requires a culture of continuous learning

By Rob Rashotte
cyber 3 responsive default
December 30, 2020

The ongoing cyber skills gap affects organizations worldwide and ultimately affects the entire digital economy. And cybersecurity changes and evolves at break-neck speed, which makes it harder to keep up with training and learning. On top of this, as remote work increasingly becomes the norm, and infrastructures become more distributed, the need for IT pros with up-to-date security skills and knowledge will continue to grow.

At Fortinet, a survey we conducted prior to the pandemic found that 76% of respondents agreed that the skills shortage has created additional risks for their organization. There simply aren’t enough professionals to fill the open positions, so organizations can’t completely cover their threat landscape. This skills gap has existed for years, and clearly needs new solutions. Solving this requires the industry to come together to create more cybersecurity pathways and a diverse pipeline of security professionals, but it also demands a culture of continuous learning.

 

The perpetual cybersecurity skills gap

There’s no shortage of statistics and information about the skills gap in security – while they differ slightly, the point is the same: the gap continues to grow, and it’s having significant impact on organizations. A survey from ISC(2) in 2019 estimated that the number of additional trained staff needed to close the skills gap was more than 4 million professionals worldwide.  

Respondents to the aforementioned Fortinet survey reiterated a widely known truth about the cybersecurity skills gap: this issue affects organizations everywhere. 68% of respondents reported that their companies struggle to recruit, hire and retain cybersecurity talent. 

 

The need for continuous learning

Because cybersecurity technology and attacks continue to evolve, organizations don’t set up security measures once and then stop. As tools and techniques change, so must cybersecurity skills. The half-life of skills continues to drop – current estimates put the half-life of a professional skill at just five years, and it’s even shorter for technical skills.

New technologies and situations can introduce new attack vectors, while bad actors are enterprising and always looking for new and different ways to infiltrate the network. The shift to remote work and the rise of IoT devices are just two examples.

These examples illustrate why continuous cyber learning is essential. Without it, cybersecurity professionals fall behind and can be less effective in as little as three months. It’s a prerequisite of the industry to engage in ongoing education to stay proficient. Ongoing learning is also essential to career success.

With the cybersecurity field continually changing, certifications can be a valuable way to stay on top of the evolving threat landscape and enable those who lack a technical background to get the needed training to transition to a cybersecurity career.

 

What needs to happen next

Despite clear evidence of its need, continuous cybersecurity training is lacking. In a recent report from Enterprise Strategy Group and ISSA, more than half of respondents said their employer didn’t provide the cybersecurity team with the right level of training to keep up with business and IT risk. This likely means their organizations needs to offer more or significantly more training for the cybersecurity team.

The industry has to come together to solve this skills gap. The corporate sector can cooperate with nonprofits and academic institutions to create new opportunities by providing training, certifications and mentoring.  

A comprehensive training and education strategy needs to incorporate strategic partnerships within government, academia and non-government organizations (NGOs.) For cybersecurity vendors, this is an opportunity for their subject matter experts to share their knowledge and vision with other thought leaders through public and private sector collaborations and prepare the next generation of cybersecurity experts.

That includes expanding the talent pool beyond the traditional set of candidates to create an equitable, diverse and inclusive pipeline of security professionals. This is achievable as private companies partner with academic institutions and nonprofits. Companies can make their training and certification programs available to a wider swathe of individuals who might not otherwise have access to these learning opportunities. Because the cyber skills gap is happening worldwide, the solution should be, too.

 

Stopping the skills gap insanity

Staying ahead of threats requires continuous learning, but the onus cannot rest entirely on employees. Leaders must create and instill a culture of continuous learning, empowering employees to get the training they need and making learning core to the company culture. In addition, companies must extend their training and certifications to the wider world, casting a larger net to create a more diverse and inclusive cybersecurity workforce. Partnerships with academia and NGOs will help in this endeavor. Without such efforts, the cybersecurity field will always get what it’s always gotten: too few workers, too many threats to respond to and insufficient network security.

KEYWORDS: cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rob Rashotte is the vice president, global training & technical field enablement at Fortinet. He has 20 years of experience developing training and education strategies for startups as well as complex global organizations. He also has 15 years of experience working with some of the most innovative, fast-paced companies in the high-tech industry. Rob has an MBA from the University of Ottawa. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security employees

    Strategies for closing the cybersecurity skills & leadership gap

    See More
  • Notebook with plan written on front

    Closing the cybersecurity skills gap: 3 steps risk leaders must take

    See More
  • Half open laptop in blue

    Closing the cloud skills gap as adoption grows

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing