March 2, 2018 By Shane Schick 2 min read

Money takes a back seat to respect and empowerment when IT workers make decisions about cybersecurity employment, according to a recent survey. ISC2’s “Hiring and Retaining Top Cybersecurity Talent” report revealed that 84 percent of cybersecurity workers are open to leaving their current role this year, including 14 percent who are actively looking for new employment.

Respect Tops IT Workers’ Cybersecurity Employment Wish List

A skill set of such mission-critical importance is in high demand, but the survey suggested that many security professionals are ready to jump ship because their current employer doesn’t listen to them well enough. About half of respondents (49 percent) cited salary as an important consideration when looking for new cybersecurity employment, behind a strong voice within the company (68 percent), an opportunity to “protect people and their data” (62 percent) and adherence to a code of ethics (59 percent).

When security professionals decide to make the leap to a new firm, 62 percent want their employer to clearly spell out their cybersecurity responsibilities rather than weaving data protection into a more general IT management role. In addition, 59 percent of survey respondents said they wanted to work for a company that invests in security training and emerging technologies.

The Domino Effect of the Cybersecurity Skills Shortage

Other research has shown that the cybersecurity skills gap is contributing to job fatigue among established IT professionals. For example, 51 percent of organizations surveyed by Enterprise Security Group (ESG) said they faced a “problematic shortage” of cybersecurity skills in 2018, which is up from 45 percent in 2017.

This dearth of talent places an even heavier burden on experienced IT workers, which may be another factor that leads them to seek greener pastures. Sixty-three percent of respondents to the ESG survey said the skills shortage has increased the existing staff’s workload. Additionally, 41 percent said this has forced them to spend nearly all their working hours putting out high-priority fires, which contributes to rising levels of stress in the workplace.

Organizations can’t afford to lose their top talent. By focusing on ways to reduce the pressure placed on existing staff and tapping new pools of talent to fill the skills gap, companies can make strides toward fixing the issues that influence IT professionals to seek new cybersecurity employment.

More from

How a new wave of deepfake-driven cybercrime targets businesses

5 min read - As deepfake attacks on businesses dominate news headlines, detection experts are gathering valuable insights into how these attacks came into being and the vulnerabilities they exploit.Between 2023 and 2024, frequent phishing and social engineering campaigns led to account hijacking and theft of assets and data, identity theft, and reputational damage to businesses across industries.Call centers of major banks and financial institutions are now overwhelmed by an onslaught of deepfake calls using voice cloning technology in efforts to break into customer…

Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns

16 min read - Since March 2024, IBM X-Force has been tracking several large-scale phishing campaigns distributing the Grandoreiro banking trojan, which is likely operated as a Malware-as-a-Service (MaaS). Analysis of the malware revealed major updates within the string decryption and domain generating algorithm (DGA), as well as the ability to use Microsoft Outlook clients on infected hosts to spread further phishing emails. The latest malware variant also specifically targets over 1500 global banks, enabling attackers to perform banking fraud in over 60 countries…

New cybersecurity sheets from CISA and NSA: An overview

4 min read - The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments.This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat mitigation, identity and access management, network security and more. Here's our overview of the new CSI sheets, what they address and the key takeaways from each.Implementing…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today