Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity Education & Training

Addressing the cybersecurity staff shortage

By Steve Soukup
cybersecurity staff.jpg

Image via Unsplash

April 20, 2023

As cyber threats continue to rapidly evolve, the need for skilled cybersecurity professionals becomes increasingly urgent. Organizations are realizing the gaps in internal cyber risk management teams are interfering with their ability to effectively address emerging cyber threats. 

According to The International Information System Security Certification Consortium (ISC), “The cybersecurity workforce gap has increased from 2.7 million in 2021 to 3.4 million in 2022.” Cyber Seek currently reports a whopping 755,743 across the U.S., and the shortage is predicted to be a growing problem well into 2025. With companies investing in technology more than ever to streamline services and enhance their daily business functions, vulnerabilities are exploited by cybercriminals and the demand for cybersecurity professionals will only become more critical.

Why is there a shortage of cybersecurity professionals?

Recruiting and retaining qualified professionals proves to be a significant challenge in cybersecurity. The complexity of technology and the unique skill set required to perform efficiently as a cybersecurity professional has created a demand for a wide range of skills and knowledge that many job seekers just don’t satisfy. Companies are falling short to hire for these positions because they claim that a bachelor’s degree alone doesn’t make the cut anymore. Organizations are seeking individuals with specialized degrees along with industry-specific experience, higher-level credentials, certifications and continuing education to keep up with the evolving threat landscape. So, while cybersecurity professionals are applying for these positions, they are not considered qualified candidates and these roles are left unfilled. 

As a result, internal cybersecurity teams are finding themselves unable to cope with surging industry demands, leading to decreased productivity and dejected morale. Cybersecurity professionals are burnt out by the increasing stress and overwhelming demands of the job, which compels many to leave the profession entirely. Those who remain often become complacent because the volume of work cannot be satisfied by so few employees and individuals are tasked with specific responsibilities where they are burdened with insurmountable, redundant work. Companies are justified in their panic to hire and retain qualified professionals because as cybersecurity teams are inundated and bored by tedious tasks, mistakes are more likely to occur, resulting in increased vulnerabilities. 

Different strategies for recruitment and retainment of talent

Companies should explore a range of strategies to not only build an effective cyber risk management team but to also nurture and retain employees; by doing so, a positive culture and mindset are promoted, which supports business continuity and reinforces cyber defenses.

  1. Consider potential candidates from diverse backgrounds. Instead of only entertaining potential candidates who hold a degree in cybersecurity, broaden your search to include individuals who possess other valuable skills that can be applied to cyber risk management. Consider prospects who demonstrate proficiency in aggregating, processing and analyzing data or capability in critical thinking, project management and problem-solving. Security leaders should ask themselves: Does the candidate understand the company’s visions and methods? Are they willing to grow and develop their skills within the cybersecurity sector? Investing in employees from varied backgrounds allows a company to fill roles with people who can bring a fresh perspective to the table and grow within the company.
  2. Hire outside support from a Security Operations Center as a Service (SOCaaS) to strengthen internal cybersecurity teams. The volume of cyber events to scrutinize far exceeds the capability of most internal teams, so utilizing automation along with monitoring support, bridges the gaps that can increase a company’s vulnerability to cyber attacks. Many businesses are looking to cyber risk management companies that provide a co-managed solution. As a result, internal teams maintain an active role in monitoring but are provided with supplemental support for threat detection, which aids in response, recovery and resilience.
  3. Implement automation to augment cybersecurity defenses and alleviate burnout. Artificial intelligence (AI) and machine learning (ML) for cybersecurity provide companies with a way to scale more effectively to find insights in data in a way that’s practically impossible for humans to manage alone. As businesses across various industries attempt to keep up with emerging threats, the need for continuous monitoring becomes too demanding for internal teams to execute effectively, especially when understaffed. The use of automation provides a more effective method of threat detection so teams can better manage the volume of data.
  4. Cycle employees through different roles and provide learning opportunities with new technology for analysts to prevent teams from becoming complacent or stagnant. Create partnerships between base analysts and incident responders, which ultimately provides advancement of skills. By providing employees with opportunities for professional development, not only will they thrive in their roles, but employers can reap the rewards of increased productivity and employee retention while closing the talent gap.

The need for more cybersecurity professionals is only going to grow in the coming years as companies become more and more reliant on technology. By recruiting people from a variety of backgrounds and providing pathways for career growth, companies can find qualified cybersecurity professionals and retain them. What steps is your business taking to ensure that it has the cybersecurity talent needed?

KEYWORDS: cybersecurity job cybersecurity skills gap cybersecurity talent gap cybersecurity workforce employee training hiring practices hiring security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve soukup

Steve Soukup is the Chief Executive Officer at DefenseStorm.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC-1222-News1-Feat-Slide1-1170x658.jpg

    Addressing the cybersecurity workforce staff shortage

    See More
  • cybersecurity900px

    Addressing the Cybersecurity Skills Shortage Through Upskilling and Retention

    See More
  • IT security cyber

    Mission-critical: Northern Virginia sets out to solve the cybersecurity workforce shortage

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing