Cyber Skills Shortages Stands At Four Million

A shortage in the global cybersecurity workforce continues to be a problem for companies in all industries and of all sizes.  The technology industry has never seen anything quite like it.

Seasoned cyber pros typically earn $95,000 a year, often markedly more and yet job openings can linger almost indefinitely. 

The ever-leaner cybersecurity workforce makes many companies desperate for help. In an era of high-profile data breaches and devastating cyberattacks, cybersecurity impacts every individual and every organisation.  Global IT security skills shortages have now surpassed four million

According to the international certifcation organisation (ISC)2 the number of unfilled positions now stands at 4.07 million professionals, up from 2.93 million this time last year. This includes 561,000 in North America and a staggering 2.6 million short fall in APAC. The shortage of skilled workers in the industry in Europe has soared by more than 100% over the same period, from 142,000 to 291,000.

(ICS)2 have released their  latest Cybersecurity Workforce Study based upon interviews with over 3200 security professionals around the world. The report estimates the current global workforce at 2.93 million, including 289,000 in the UK and 805,000 in the US. Nearly two-thirds (65%) of responding organisations reported a shortage of cybersecurity staff, with a lack of skilled or experienced security personnel their number one workplace concern (36%).

Over half (51%) of cybersecurity professionals said their organisation is at moderate or extreme risk due to staff shortages.
four key strategies to help organisations tackle such shortages. These include in-house training and development and setting applicant qualification requirements at the right level to ensure as wide a net as possible is cast.

(ISC)2 also stressed the need to attract new workers from other professions, or recent graduates with tangential degrees, as well as seasoned professionals from consulting and contracting sectors. Organizations should look to strengthen from within by cross-training existing IT professionals where appropriate. In an era of high-pro le data breaches and devastating cyberattacks, cybersecurity impacts every individual and every organisation. 

Top Job Concerns Among Cybersecurity Professionals include: 

  • 36% Lack of skilled/experienced cybersecurity security personnel 
  • 28% Lack of standard terminology for effective communication 
  • 27% Lack of resources to do my job effectively 
  • 24% Lack of work-life balance 
  • 24% Inadequate budget for key security initiatives 

Cybersecurity professionals are more than twice as likely to be male, meaning there is an under-tapped demographic available for recruiting if companies can position the role in a way that overcomes common stereotypes. 30% of survey respondents were women. 

Among respondents with security-specific titles, 23% of study participants were women. The highest percentage of women cybersecurity professionals came from Latin America (39%) and North America (34%). 

The 2019 (ISC)2 Cybersecurity Workforce Study is based on online survey data collected in June and July 2019 from 3,237 individuals responsible for security/cybersecurity at work throughout North America, Europe, Latin America (LATAM) and Asia-Pacific (APAC).  The sample within each country was controlled to ensure a mix of company sizes and industries. 

InfoSecurity Magazine:          ISC2:

You Might Also Read:

Britain’s Cybersecurity Skills Gap:


 

 

« British Police At War Against Cyber Crime
Four Security Principles For For Small Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Information Technology Association of Canada (ITAC)

Information Technology Association of Canada (ITAC)

ITAC is the voice of the Canadian ICT industry and are dedicated to making Canada a world class, cutting-edge digital society.

Israel National Cyber Directorate (INCD)

Israel National Cyber Directorate (INCD)

The Israel National Cyber Directorate is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power.

Vicarious

Vicarious

Vicarious identify the vulnerabilities in the software without involving the vendor and protect it before the hackers take advantage of it, even in compiled applications.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

Cloudburst Security

Cloudburst Security

Cloudburst Security specialize in providing a full spectrum of high-quality, innovative cybersecurity services to both government and commercial organizations.

Albania Lab

Albania Lab

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services including cybersecurity.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.