Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Reskilling workers can help meet the cybersecurity staffing challenge

By Vishal Salvi
reskilling-freepik1170.jpg
May 23, 2022

Among the many changes unleashed by COVID-19, one has been a dramatic increase in the use of digital tools. The World Bank projects that total internet traffic this year will be 50% higher than it was just two years ago. The increased digitalization, needless to say, also amplifies the risks of cyber threats and attacks for us all. That underscores the importance for companies to strengthen their capabilities to develop, implement, and maintain robust cybersecurity protocols. 


But in a survey of global cyber leaders by the World Economic Forum, 59% said it would be challenging to respond to a cybersecurity breach, given the skills shortage on their teams. And more than half said talent recruitment and retention were the biggest challenges of all. How, then, to meet this ongoing need for cyber resilience?


One of the keys is for companies to operate as something akin to corporate universities — offering not just employment but also the promise of continued employability. 


This can be achieved through reskilling programs that train existing or new workers in cybersecurity and related disciplines. Doing so ensures the employers get the personnel they need while workers get the skills and knowledge that will help them get hired and stay employed. There is a clear alignment of interests: individuals benefit from having cybersecurity knowledge with greater employability, and companies need workers with that knowledge. 


At Infosys, like all businesses, we increasingly need more workers with digital skills — particularly in cybersecurity — related to new technologies. However, because the technology and the threats are constantly evolving, it can be challenging to find enough people in the labor market with these skills. 

 

We rely on reskilling to fill much of this gap. And we have applied the lessons of more than three decades of training new employees, from physical classrooms in India to our online digital reskilling programs worldwide.

 

These programs, which include training for cybersecurity, involve continuous, self-paced learning for employees; collaboration with academic institutions; specialized programs for local hiring; and digital reskilling for new and current employees.

 

In four phases, we developed a holistic reskilling program incrementally, evolving it alongside changes to our operating model. This program can be a model for other companies, with chief information security officers (CISOs) helping design programs that will help them meet their needs for talent in cybersecurity and other areas. 


Developing a reskilling program

Phase 1: Foundation. Each unit created a three-year business growth projection for the top five digital skills, called new service offerings (NSOs). The units also created talent plans to meet the anticipated business growth projections for each NSO. This resulted in 36 new offerings, with the top five skills needed for each.


Phase 2: Skills Forecasting. We planned for both long-term (five years out) and short-term (quarterly) skills needs. We used a variety of external and internal inputs for this forecasting model, including revenues, employee skill data, past allocations, and market trends.


Phase 3: Program Implementation. This enabled reskilling as an alternative talent pipeline. More than 90% of these reskilled employees have been deployed to projects using their new skills.


Phase 4: Scaling. We encouraged people to learn about cybersecurity and create awareness of the reskilling program. Employees are induced to participate by giving them concrete financial and career incentives. Career incentives include skill tags. These skill tags quantify what they have learned in a way that is recognized in the market. For instance, “Cybersecurity expert” is a tag employees can earn to indicate their skill set and work on new projects internally and with clients.


In the Scaling phase, we have also focused on communicating the many benefits of reskilling. This communication happens at several levels — with leaders, managers and employees. We also send out a series of weekly emails on reskilling to all employees, which increases awareness of reskilling opportunities.


Benefits of reskilling

Fundamentally, reskilling is a win-win: It benefits both organizations and workers. We have found that it is about half the cost of hiring from the market. Reskilling has also lowered the attrition rate in our cybersecurity teams.


Reskilling has wider benefits, too. It helps our talent to learn and shape their careers in ways that are most meaningful for them. For example, they can transition from software testing to certified cybersecurity professionals. 


Reskilling also inculcates a culture of lifelong learning into an organization. Businesses retain talent while employees continually evolve their skills to match the company’s needs. This is a strong value proposition for both the employee and the organization — it improves recruitment, retention, and internal rotation and deployment.


It can also be part of an inclusion strategy that benefits the company, provides opportunities to work in a digital role for those who might not otherwise have had them, and ultimately increases diversity. 


Recommendations

Reskilling should be one of the primary strategies companies use to build their cybersecurity workforce. At Infosys, four principles guide our approach to reskilling.

 

Make reskilling a core pillar of the operating model. Without the infrastructure and operational changes, employee reskilling programs are destined to fail. They need to be tied to strategy, direction, and other investments.

 

Assemble cross-functional teams. A successful reskilling program requires participation across the organization. Focused, weekly efforts on reskilling with the leadership of many units are essential to continuously plan and assess reskilling progress.

 

Make employees part of the process. Create enough incentives, necessary infrastructure, and support — especially during the transition phase.

 

Don’t go it alone. For the greatest impact, collaborate with academic institutions, nonprofits, and policymakers. At Infosys, for example, we formed a consortium with other trainers to use a learning platform to reskill pandemic-impacted job seekers and connect them with companies looking for workers — including cybersecurity experts.

 

Two years ago, Infosys opened a Technology and Innovation Center on the campus of Arizona State University to help meet staffing needs in cybersecurity and other areas. The 60,000 square foot site is helping to build a pool of talent, as are our partnerships with ASU, Maricopa Community Colleges, the Arizona Commerce Authority, and the Arizona Technology Council.

 

Investing in People

Investing in people is the best investment companies can make as they develop their cybersecurity workforce. But more needs to be done. An Infosys survey has shown that only 54% of U.S. hiring managers said their company offered training in basic computer skills, and only 34% offered more specialized training in cybersecurity. 

 

A greater investment in employee learning programs focused on cybersecurity and other disciplines can be cost-saving measures that help organizations learn, adapt, and evolve, while also helping meet employees’ basic human drive to learn. The programs also strengthen the employer-employee relationship because employees feel valued and cared for.

 

Finally, reskilling brings opportunities to people who might not otherwise have them. Our reskilling initiatives with community colleges, for instance, enable us to employ people at a lower cost — while at the same time giving a wider swath of people the opportunity for upward social mobility.

 

With cybersecurity threats growing and companies needing the personnel to help address those threats, companies — and CISOs in particular — should be prioritizing reskilling programs. They are investments that will deliver outsized dividends for years to come. 

KEYWORDS: Chief Information Security Officer (CISO) cyber security reskilling risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Vishal salvi (1) (2)

Vishal Salvi is Senior Vice President, Chief Information Security Officer and Head of the Cyber Security Practice at Infosys. He is responsible for the overall information and cyber security strategy and its implementation across Infosys Group. He is additionally responsible for the Cyber Security Business Delivery, driving security strategy, delivery, business and operations enabling enterprises security and improving their overall posture. With over 25+ years of industry experience in Cybersecurity and Information Technology across different industries, Vishal has extensive management and domain experience in driving transformation Cybersecurity programs, delivery and sales in all key areas. He is part of various Advisory Councils and Boards to provide leadership and direction on various Cybersecurity frameworks and standards to drive adoption of cyber security across industry. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-security-fp1170

    Cybersecurity founded on 3 pillars: Technology, process, and people

    See More
  • security-strategy-fp1170x658v5.jpg

    Security needs a new mindset

    See More
  • older

    How Your Cybersecurity Staffing Can Survive the Baby Boomer Exodus

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing