November 5, 2024 By Mike Elgan 2 min read

The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM’s 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year.

And that’s expensive. This skills deficit adds an average of $1.76 million in additional breach costs.

The shortage spans both technical cybersecurity skills and adjacent competencies. Cloud security, threat intelligence analysis and incident response capabilities are in high demand. Equally crucial are skills in data analysis, risk management and compliance expertise.

Critical skills in short supply

According to cybersecurity experts, an incident response specialist is one of the most critical roles for reducing breach impacts. The IBM reports from 2020 and 2022 make it clear that the ability to quickly detect, contain and mitigate breaches can radically reduce costs, and this is still true today.

While a well-rounded security team with diverse skills remains the ideal scenario for most organizations, it remains elusive for many.

Cloud security expertise is also increasingly prized as more organizations migrate data to the cloud.

Strong coding skills for secure development and automation are also in short supply. Proficiency in security information and event management (SIEM) tools and threat-hunting techniques can significantly improve detection and response times.

While technical prowess is crucial, soft skills are also surprisingly important. The number one soft skill, of course, is communication. Cybersecurity pros need to be able to explain complicated security concepts, processes and threats to non-security technical people and non-technical people in the organization.

In incident response scenarios, staying calm under pressure and making sound decisions quickly can make the difference between a contained incident and a full-blown data breach. Problem-solving skills are also essential when teams encounter unfamiliar threats, requiring creative thinking to develop custom containment strategies.

Read the Cost of a Data Breach Report

Red flags in the hiring process

Organizations should be wary of certain traits when building security teams. Rigidity and an unwillingness to learn are major red flags in an industry where the threat landscape evolves constantly. Lone-wolf mentalities are also detrimental, as effective security requires collaboration across multiple disciplines.

Hiring people who can think critically, collaborate effectively and adapt quickly to changing circumstances is critical.

Closing the cybersecurity skills gap

Many organizations are taking a multi-pronged approach to combating the skills shortage. Common strategies include expanding internal training programs, encouraging certifications and partnering with universities to develop cybersecurity curricula.

Innovative companies are leveraging AI to augment their team’s capabilities, allowing human experts to focus on higher-value tasks.

“With the advent of Generative AI, we can provide less experienced staff with insights and recommendations, enabling them to make better decisions,” according to Sam Hector, Senior Strategy Leader at IBM Security. “AI is also enabling better management of complex security environments by identifying misconfigurations and vulnerabilities, either remediating them automatically or recommending how.”

And just as the cost of breaches that result from the skills gap can be measured in dollar terms, so can the savings resulting from AI tools. “Those with extensive use of AI [are] realizing average breach cost savings of $1.9 million,” according to Hector. “And those using AI extensively in prevention workflows specifically were able to save $2.2 million in breach costs on average.”

As the cybersecurity skills shortage persists, organizations must prioritize hiring and upskilling to build robust security teams. Companies can better position themselves to mitigate the costly impact of data breaches by focusing on a mix of technical prowess and essential soft skills. The investment in human capital today could save millions in potential breach costs tomorrow.

More from Data Protection

Why safeguarding sensitive data is so crucial

4 min read - A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other.The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction recovery help and mental health treatment in Connecticut, Florida, Texas and other states.The breach, first reported by WIRED, involved PII, such as patient names and addresses,…

Addressing growing concerns about cybersecurity in manufacturing

4 min read - Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, they’ve vastly expanded the cyberattack surface.According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in the industrial sector was $5.56 million. This reflects an 18% increase for the sector compared to 2023.Apparently, the data being stored in industrial control systems is…

3 proven use cases for AI in preventative cybersecurity

3 min read - IBM’s Cost of a Data Breach Report 2024 highlights a ground-breaking finding: The application of AI-powered automation in prevention has saved organizations an average of $2.2 million.Enterprises have been using AI for years in detection, investigation and response. However, as attack surfaces expand, security leaders must adopt a more proactive stance.Here are three ways how AI is helping to make that possible:1. Attack surface management: Proactive defense with AIIncreased complexity and interconnectedness are a growing headache for security teams, and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today