No Easy Button Solution To Cybersecurity’s Skills Shortage

You may have heard the news. The information security industry is desperate for good people. Some people think this is over-hyped, and others think they have a simple solution. Do we have a talent shortage?
 
By Evan Francen, CEO of FRSecure
 
If you believe what you read, the issue is settled. Information security talent shortage news is plastered everywhere. 
 
 
• “We predict there will be 3.5 million unfilled cybersecurity positions by 2021.” – Cybersecurity Ventures
• “It’s estimated that by 2014, the industry will still be short more than a million security professionals across the globe.” – Cisco 2014 Annual Security Report
• “Demand is expected to rise to 6 million globally by 2019, with a projected shortfall of 1.5 million” - Michael Brown, CEO at Symantec
• “2 Million: Global Shortage of Cybersecurity Professionals by 2019” – Information Systems Audit and Control Association (ISACA)
• “Cybersecurity jobs are in high and growing demand. But, there’s a critical shortage of qualified workers across the nation.” – CyberSeek claims that there are 715,715 people employed in “cybersecurity” and that there are 313,735 open positions in the United States.
 
We’re security people though, and we don’t believe everything we read. We’re a skeptical group, but the news looks convincing. Upon closer inspection, you may notice some key words like “predict” and “expected”. You might also notice some discrepancies in the numbers and publication dates. The quotes from Cybersecurity Ventures, Cisco, Symantec, and ISACA are all predictions, and some of them are outdated now. Anyone can make a prediction, right? We might assume that these predictions are credible because the organizations are credible. Despite this, the skeptics could have a case. 
 
Not everything is a prediction however. There have been studies too, but correlation is difficult because of differing methodologies and data sources. Plenty of stories, plenty of predictions, and a few studies, so what’s fact? The facts are debatable, but the consensus isn’t. 
 
The general consensus confirms that we have a talent shortage problem, and I agree. It’s difficult to discount multiple credible sources. What’s not certain is the true extent of the problem. This can be debated. The numbers cited in the predictions are large, sensational numbers. Sensational numbers become news stories that get attention, drive traffic, and increase revenue. We don’t usually publish big numbers for pure altruistic purposes. We publish big numbers because we want your attention.
 
Here’s a reasonable take. We have a talent shortage problem. Predictions are predictions, some come true, some don’t. The extent of the problem is assumed to be significant, but really large numbers (without facts) are less credible. Don’t get wrapped up in the details because nobody has all the facts anyway.
 
Job Seeker Doubt
The greatest doubters of the talent shortage problem are the good people trying to land an information security job, but can’t. If there’s such a shortage, why can’t they find an opportunity? Legit question.
 
This take may not be a popular one, but the logic checks out. Getting a job is like matchmaking. Both sides have expectations and both sides are looking for a commitment. One side posts a profile about themselves and what they’re looking for in a relationship (job posting). The other side might post the same (resume). The job seeker is looking for a date and an eventual relationship, so they start browsing and asking for dates (interviews) with ideal mates (jobs/companies).
 
It’s not a lack of potential mates (jobs) that’s a problem, it’s the lack of dates and commitments. Here’s why…
 
1. Unrealistic expectations - one side or the other is looking for an ultra-attractive, physically fit, multi-millionaire mate, with a beautiful personality and sense of humor who loves puppies and world travel. Good luck.
2. You can’t get a date - maybe you’re not looking in the right places. Reconsider where you’re looking and get creative. Networking goes a long way because some jobs never get posted.
3. You get dates, but you can’t get someone to commit – I’m not happy saying this, but maybe it’s you. This is hard because it requires the most honesty.
 
Every situation is different. Seek a mentor, seek advice, be persistent, and don’t give up. The jobs are out there.
 
No Easy Button
We live in an easy button, shortcut world. It would be nice if there was a simple solution to this global problem, but there isn’t and there never will be. The solution is multi-faceted, requiring many initiatives, many people working together, and selflessness.
 
Can we get enough information security people working together, selflessly giving back to their communities and industry? I think so, but we have a ways to go.
 
Here are some of the initiatives that are already happening today:
 
• Continued growth and improvements in post-secondary education and degree programs.
• Continued/greater investment in K-12 STEM programs.
• Continued/greater investment in K-12 awareness and training programs (not necessarily STEM).
• Free high-quality online and in-person training.
• Free mentoring. Everyone should have a mentee and a mentor.
• Continued/greater investment in military security to private industry transition initiatives.
 
I’m sure there are many others, but these are a start. A single organized, centralized, sponsored approach would be great. Our industry is still immature, so this isn’t happening soon. At FRSecure, we’re excited for the 10th annual free CISSP Mentor Program.
 
There’s still time for you to attend! Please share what you’re doing to help, or what you’re willing to do. Maybe we can join forces.
 
Evan Francen is CEO & Co-Founder of FRSecure 
« UK And EU Will Connect With Cybersecurity After Brexit
Hackers Are Focused On Hijacking Payment Data »

Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: Shifting Your Network Security Architecture To The Cloud

WEBINAR: Shifting Your Network Security Architecture To The Cloud

Thursday, July 8, 2021 - In this webinar, SANS and AWS Marketplace will discuss how to adapt network security architecture and control implementation to a cloud-based model.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SS8 Networks

SS8 Networks

SS8 provide an analytics platform for monitoring high speed communication flows to identify 'suspects-of-interest' for law enforcement and intel agencies.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

SWAMP

SWAMP

SWAMP offers a suite of secure and dependable analysis services, to help reduce the number of security vulnerabilities deployed in software.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

ImmuniWeb

ImmuniWeb

ImmuniWeb® AI Platform illuminates your external attack surface and Dark Web exposure for well-informed, risk-based and DevSecOps-enabled application penetration testing.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.