Cybercrime, already a $445 billion business, is showing no signs of slowing down. Combating organized, sophisticated cyber rings takes the right technology and talent. It gives me pause every time I consider the well-documented skills shortage in cybersecurity, which is expected to reach 1.5 million unfilled positions by 2020. Closing that gap is daunting, and requires us to find and nurture different types of talent in new ways.

Out With the Old, In With the New Collar

The private and public sectors have already started to develop some creative solutions. They are looking at new education models, boot camps and security certifications, and increasing the number of colleges and universities with cybersecurity programs.

At IBM, we have been addressing the skills gap by training pre-college students in technology, helping universities develop curricula and providing programs for early professionals. We are also contributing to this effort by creating what we call “new collar” jobs.

Today, we are releasing an executive report, “It’s Not Where You Start — It’s How You Finish: Addressing the Cybersecurity Skills Gap With a New Collar Approach,” that looks at IBM’s new collar approach to closing the skills gap. The report defines new collar roles, which prioritize skills, knowledge and a willingness to learn over degrees and traditional work experiences. It also outlines how enterprises can pursue a course similar to IBM.

A new collar approach is characterized by:

  • New employee profiles: Consider skills, not degrees earned, as a prerequisite to attract nontraditional candidates with diverse backgrounds and abilities.
  • New types of roles: Restructure work around the specific skill sets and knowledge required by emerging technologies.
  • New partnerships: Develop relationships with federal and state government programs, community colleges, K-12 school programs, nonprofits, cyber competitions and veterans training programs.

Slow and Steady Wins the Race

Fast Company recently noted that IBM and other technology companies are embracing new types of workers to fill the IT jobs of today and tomorrow. With an eye toward new collar jobs, enterprises can boost the number of potential candidates who can rapidly get to work, provide fresh and diverse ideas, and bring practical hands-on experience. Organizations that only rely on traditional four-year schools to meet their needs will continue to struggle with the cybersecurity skills gap.

It doesn’t matter where employees start their race; it’s all about how much they contribute and how far they are willing to go. What matters are their skills and experiences, not where they got them.

Stay Up-to-Date

Learn more about the new collar approach and get the latest insights on how IBM is helping security leaders tackle their toughest challenges, including the skills gap.

We invite you to download the complete executive report and also to watch the accompanying webinar, “It’s Not Where You Start – It’s How You Finish.”

Read the report: Addressing the Skills Gap with a New Collar Approach

More from CISO

Bridging the 3.4 Million Workforce Gap in Cybersecurity

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen.Nearly 12,000 participants in that study felt that additional staff would have a hugely positive impact on their ability to perform their duties. More hires would boost proper risk…

CEO, CIO or CFO: Who Should Your CISO Report To?

As we move deeper into a digitally dependent future, the growing concern of data breaches and other cyber threats has led to the rise of the Chief Information Security Officer (CISO). This position is essential in almost every company that relies on digital information. They are responsible for developing and implementing strategies to harden the organization's defenses against cyberattacks. However, while many organizations don't question the value of a CISO, there should be more debate over who this important role…

Everyone Wants to Build a Cyber Range: Should You?

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team training and exercises of cyberattack responses. Companies understand the need to drill their plans based on real-world conditions and using real tools, attacks and procedures. What’s driving this increased demand? The increase in remote and hybrid work models emerging from the COVID-19 pandemic has elevated the priority to collaborate and…

Why Quantum Computing Capabilities Are Creating Security Vulnerabilities Today

Quantum computing capabilities are already impacting your organization. While data encryption and operational disruption have long troubled Chief Information Security Officers (CISOs), the threat posed by emerging quantum computing capabilities is far more profound and immediate. Indeed, quantum computing poses an existential risk to the classical encryption protocols that enable virtually all digital transactions. Over the next several years, widespread data encryption mechanisms, such as public-key cryptography (PKC), could become vulnerable. Any classically encrypted communication could be wiretapped and is…