Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Four steps to build and retain a solid cybersecurity team during a labor shortage

By Drew Sanford
hiring_recruiting-freepik1170.jpg

Image via Freepik

December 21, 2021

Nearly every industry is struggling through a historic labor shortage, especially cybersecurity. IT departments are facing unprecedented challenges when hiring, training and retaining cybersecurity talent at a time when cyberattacks continue to grow both in intensity and frequency. 


In the U.S. alone, according to a survey by (ISC)², an international nonprofit offering cybersecurity training and certification programs, more than 350,000 jobs were unfilled in 2020. Globally, that number stood at more than 3 million positions. 


The deficit of these professionals not only impacts the security of assets and information but is also taking a toll on your cybersecurity teams. 


According to the Information Systems Security Association (ISSA), 57% of cybersecurity professionals say the shortage of cybersecurity skills has impacted their organization. This means existing teams must pick up more work, leading to high staff burnout and a backlog of unfilled job requisitions. Guiding your team through this environment is complex. 


Competing for valuable talent requires a strategic focus on building and maintaining a workplace culture that attracts and retains cybersecurity professionals. 


Here are four steps to consider when building or improving your existing culture and recruiting practices.  


Believe in yourself 

Cybersecurity teams must believe in their purpose, strengths, and in the people they support. This means putting a face to the customers and internal clients they’re protecting from cybercrime. Help them see how their efforts are making a difference. The answers will drive and power each employee’s passion for improving what they do, staying diligent even through difficult times, and helping you attract and retain talent. Believe in what makes your team unique, and that pride and confidence will attract others. 


Define your culture

While candidates might consider your company for your products, location, or benefits, many will also evaluate your culture for a potential fit.  More so, it’s the culture that will ultimately make employees want to stay long after they’re hired. 


Does your culture make your employees feel valued? Does it help them grow in their careers? Does it help them feel like they’re a part of something important? It’s essential to build a work environment that affirms, grows, encourages your team, and entices them to stay. 


It does not matter if we are talking about on-site or remote work; culture is critical to both. Whether your team is remote or in the office, you have to make employees feel engaged and understand how their contributions add to the overall success of your department and company as a whole. A day filled with remote meetings makes building relationships difficult. How will you combat that? What tools or techniques could you use to build engagement and culture in a remote workforce?


Get involved with recruiting

Large corporations and small and mid-sized businesses (SMBs) are both struggling to hire workers during labor shortages. But each is addressing the challenge differently. 


Corporations have the benefit of dedicated HR and recruiting teams. However, they have become too dependent on them to do the work alone. This approach worked back when there was an abundance of candidates. But today’s environment requires a more personal, relationship-based approach to attract talent. Your existing teams might have to get online, identify people, and reach out and build relationships. And you might have to leverage your contacts for leads. In this competitive market, HR can’t do it alone. 


SMBs, on the other hand, don’t often have access to dedicated on-staff recruiters. They’re either leveraging outside recruiting firms or seeking out candidates while managing an already short staff. 

This doesn’t change what SMBs should be doing, but they must be more strategic about it. Their limited time to build relationships means that they need to make sure they focus their time in a way that produces results. 


If you’re an SMB, you must do your own research. Find groups with people who have your desired skills. Look for others who know these people and build relationships to get more warm introductions and learn how your recruits think. Between you and your team, figure out if your business is a good home for recruits. Make the changes you need to be attractive, and then start creating a conversation around your organization.


Always be hiring! 

Don’t wait until you need someone with a specific skillset; start building relationships now. Find groups to join and start asking around where you can find specific types of talent. 


As you look at the challenges of building belief, establishing an attractive culture, and putting a plan in place to recruit, remember that it will not happen immediately. You must start today. If you wait until you cannot live without the position, you are already too far behind. 


Determine your one, three and five-year plans, and then build these concepts around them. Figure out how you can start identifying your needs earlier, so you can understand candidates and recruit faster. 


And as you do all of this, never forget to invest in the people you have. They have already chosen to be a part of who you are, so work with them to build tomorrow. 

KEYWORDS: cyber security recruiting risk management security culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Drew Sanford is Vice President of Global Security Operations at ConnectWise.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • two people working on same laptop

    Tips to recruit and retain employees in cybersecurity talent shortage

    See More
  • cybersecurity manufacturing

    It's time for manufacturers to build a collaborative cybersecurity team

    See More
  • ransomware

    Four steps to deliver a deadly counterpunch to ransomware attacks

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing