Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Top reasons why cybersecurity professionals leave their jobs

By Maria Henriquez
retention-freepik1170.jpg
April 1, 2022

Organizations are struggling more than ever with hiring and retaining qualified cybersecurity professionals and managing skills gaps, according to ISACA’s new survey report, State of Cybersecurity 2022: Global Update on Workforce Efforts, Resources and Cyberoperations, 


The eighth annual survey features insights from more than 2,000 cybersecurity professionals around the globe and examines cybersecurity staffing and skills, resources, cyberthreats and cybersecurity maturity.


Hiring and retention challenges

As in past years, filling cybersecurity roles and retaining talent continues to be a challenge for many enterprises:

  • 63% of respondents indicate they have unfilled cybersecurity positions, up 8% from 2021.
  • 62% report that their cybersecurity teams are understaffed. 
  • One in five say it takes more than six months to find qualified cybersecurity candidates for open positions.
  • 60% of respondents report difficulties retaining qualified cybersecurity professionals, up 7% from 2021.

The top reasons that cybersecurity professionals are leaving their jobs include:


  1. Recruited by other companies (59%)
  2. Insufficient salary or bonus (48%)
  3. Limited advancement opportunities (47%)
  4. High-stress levels (45%)
  5. Poor management support (34%)


“The Great Resignation is compounding the long-standing hiring and retention challenges the cybersecurity community has been facing for years, and systemic changes are critical,” says Jonathan Brandt, ISACA Director, Professional Practices and Innovation. “Flexibility is key. From broadening searches to include candidates without degrees to providing support, training and flexible schedules that attract and retain qualified talent, organizations can move the needle in strengthening their teams and closing skills gaps.”


The report examined four other trends:


1. Skills gaps and mitigation:

  • Respondents note that the top skills gaps they see in today’s cybersecurity professionals are soft skills (54%), cloud computing (52%) and security controls (34%). Soft skills also top the list of skills gaps among recent graduates, at 66%.
  • To address these skills gaps, respondents note that cross-training of employees and increased use of contractors and consultants (up 5% from the year prior) are the main ways they mitigate technical skill gaps. Just over half (52%) say their enterprises require university degrees, a 6% decrease from 2021.


2. Budgets Leveling: 

  • 42% say their cybersecurity budgets are appropriately funded — the highest percentage in eight years, up 5% from 2021, and the most favorable report since ISACA began this survey. 
  • 55% of respondents expect their enterprises to have budget increases, while 38% expect no change, and multiyear data suggest budgets are leveling.


3. Threat Landscape:

  • This year, 43% of respondents indicate that their organization is experiencing more cyberattacks, an 8% increase from 2021.
  • Enterprise reputation (79%), data breach concerns (70%) and supply chain disruptions (54%) are the top concerns related to cyberattacks for respondents.
  • Despite the threats they face, 82% of respondents — an all-time high and a 5% increase from last year — indicate they are confident in their cybersecurity team’s ability to detect and respond to cyberthreats.
  • While ransomware attacks top the headlines, the survey found that ransomware attacks have remained virtually unchanged from last year, at 10%.

Other top types of cyberattacks experienced in the past year include:

  1. Social engineering (13%)
  2. Advanced persistent threat (12%)
  3. Security misconfiguration (10%)
  4. Ransomware (10%)
  5. Unpatched system (9%)
  6. Denial of service (9%)



4. Cyber maturity:

  • Regarding cyber risk assessments, 41% of survey respondents say their enterprises conduct them annually, up 2% from last year.
  • One-third of respondents say their enterprise conducts assessments more than annually.
KEYWORDS: cyber security hiring security ransomware retention risk management supply chain

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Jerry Brennan

    Why Security Leaders Lose Their Jobs

    See More
  • security-center

    The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

    See More
  • Empty desk with computer displaying code

    7 out of 10 IT employees may quit their jobs

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing