7 Steps to Combat the Cybersecurity Skills Shortage

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next 7 Steps to Combat the Cybersecurity Skills Shortage-6 Next

Think Outside the Box

According to IT professionals association ISACA, over half (53 percent) of security pros say it takes three to six months to find a qualified candidate. This hiring timeline is far too long considering the wealth of qualified candidates hiding in college campuses and diverse demographics. Offering an internship for college students is a great way to cultivate fresh talent through longer-term training and full immersion technical practice.

With women comprising a mere 11 percent of the information security workforce, diversity in cybersecurity is still an enormous industry issue. Slight changes in hiring practices — such as removing gender-specific pronouns in job descriptions — can make a significant difference when it comes to unbiased hiring. Working with diversity initiatives like Ms. Tech can help establish your organization in different communities and validate your commitment to diverse hiring.

With countless cyber threats impacting today's enterprises (ransomware, malvertising and malware, oh my!), security professionals have never been more valuable to their organizations. Unfortunately, the cybersecurity industry is facing a major shortage of expertise, with industry estimates suggesting more than one million unfilled security jobs exist worldwide.

According to analyst firm ESG, 83 percent of enterprises find it "extremely difficult" or "somewhat difficult" to recruit and hire security professionals. In this slideshow, Trustwave CMO Steve Kelley outlines several tips to combat this ongoing industry issue.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.