Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Jeremy Leasher - Training the cybersecurity workforce

By Maria Henriquez
5 minutes with Leasher
April 8, 2021

Meet Jeremy Leasher, Security Solutions Architect at Axellio. Leasher believes the IT security industry is undergoing a serious skills crisis, threatening to undermine the security of commercial and government organizations. Here, we talk to Leasher about the best approach to solving this skills crisis.

 

Security: What is your background and current role?

Leasher: I have been in the security industry for 22+ years serving in various roles for the commercial industry as well as the Defense department. I served as an Enterprise Security Architect for two large technology companies and as the Threat Hunt Lead for a large government organization. Currently, I am a Chief Warrant Officer 3 (CW3) in the Alabama National Guard serving as a Senior Security Advisor and a Security Solutions Architect at Axellio.

 

Security: Why is the IT security industry undergoing a serious skills crisis?

Leasher: There has been a large gap in the talent needed vs the talent available for the last 5-10 years. This is especially true for senior level roles within the security industry.  Many of the seasoned security professionals are now retired or working in a role they will soon retire at and there has been very little knowledge transfer laterally among the junior professionals.

Companies such as SANS, EC-Council, CompTIA are doing their best to train the next generation of security professionals but they still lack fundamental education. There is a huge disconnect between training and education – on-the-job training is far more valuable than memorizing some questions to pass an industry certification.

Companies realized this years ago and decided to invest in technology as a safe alternative to the lack of human capital. Many security leaders in large companies also recognize that if they spend large amounts of money in training their people there is a good chance after 18 months and a few industry certificates under their belt, they will jump ship for other higher paying opportunities. Thus, this encourages the security leaders to invest in technology, as a server won’t up and leave.

There is a saying in the security industry that states “What if we train our people and they leave?” The response being “What if we don’t train them and they stay.” This is something the military has struggled with for years. They provide very good training for their personnel and then they leave the military because they can almost double their salary in the civilian sector. To address this, the military has been playing with the idea of paying their security people an incentive to stay in the military, which is very similar to how they incentivize the lawyers, doctors and other critical skills.

 

Security: How does this issue threaten to undermine the security of commercial and government organizations?

Leasher: Our military knows that some of our biggest adversaries (North Korea, China, Russia, etc.) recruit and train their younger generations to become hackers who want to target the U.S. Cybersecurity has become somewhat parallel to other blue-collar industries, i.e. electrician, plumber, or even a school teacher. There is no sense of urgency or pride of nation to protect the U.S interests against foreign/domestic enemies. We need to recruit our young people to learn and enjoy the security space instead of hoping for a Division 1 scholarship to play sports. Opportunities in the U.S are far more available than other countries which is counterproductive to our current security skills problem

 

Security: Are companies becoming way too reliant upon technology and not spending enough time training the cyber workforce?

Leasher: Absolutely. Companies now have many different avenues to transfer risk of not having a large security talent pool. Things like cybersecurity insurance policies are still relatively new and are not a mature fix for human capital. Security in the commercial industry has now become “someone else’s problem,” meaning that most companies opt to pay someone else to manage their security footprint.

Large Managed Security Providers (MSP) or Managed Security Service Providers (MSSP) have emerged over the last 10 years to help offset the cost of a company doing it internally and racking up large debt.

 

Security: What is the best approach to solving this issue?

Leasher: We have to reengage our young people at early ages to become interested in Cybersecurity. There are kids that now get enjoyment out of watching other people play videogames online and its BIG money. I think a lot of security professionals feel like they are on an island and there is no sense of community in many cases. The gamer community is huge and still attracting millions of users/viewers.

There also should be a huge push for education vs training. We are now seeing universities make cybersecurity degrees a part of the norm but it’s going to take another five-10 years to get well-rounded security folks through this pipeline and available to work in the industry.

 

 

KEYWORDS: cyber security information security IT security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Prout

    5 minutes with Jeremy Prout - How to protect the workforce against security risks in 2021

    See More
  • 5 mins with Borromeo

    5 minutes with Michael Borromeo – Cybersecurity best practices with a hybrid workforce

    See More
  • 5 minutes with Waskelis

    5 minutes with Todd Waskelis - Cybersecurity consulting during the pandemic

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 13, 2012

    Axis Communications' Academy 2-Day Fundamentals Training with FREE Encoder Training

    Network Video Fundamentals is the building block of the Axis Communications' Academy training program.
  • March 20, 2012

    Axis Communications' Academy 2-Day Fundamentals Training with FREE AXIS Camera Station Training

    Network Video Fundamentals is the building block of the Axis Communications' Academy training program.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing