The shortage of trained cybersecurity professionals is a global challenge, and India is no stranger to the situation. An alarming 87 percent of respondents to ISACA’s “2015 Global Cybersecurity Status Report — India Data” admitted India is facing a severe cybersecurity skills gap, whereas only 41 percent felt prepared to fend off sophisticated cyberattacks.

The National Association of Software and Services Companies (NASSCOM) estimated that India will need 1 million cybersecurity professionals by 2020 to meet the demands of its rapidly growing economy. Demand for security professionals will increase in all sectors due to the unprecedented rise in the number of cyberattacks. Despite having the largest information technology talent pool in the world, India is highly unlikely to produce an adequate number of professionals to close the cybersecurity skills gap.

Skills Shortage Exposes Indian Businesses

The cybersecurity skills gap is ever widening due to the fluid nature of threats, innovative new cybercrime techniques, a lack of formal training and, most importantly, a lack of awareness about careers in cybersecurity. This scarcity exposes Indian businesses to cyberattacks and reduces their ability to quickly respond to complex threats. In the long run, the skills gap may discourage Indian companies from implementing new technologies or making new investments.

The shortage of cybersecurity professionals is also pushing up the cost of hiring experienced cybersecurity staff and forcing Indian businesses to increase their cybersecurity budgets. The “Global State of Information Security Survey 2016” from PwC reported a 117 percent increase in cyberattacks in India and a 71 percent increase in budget.

High Stakes for India

Because several global IT corporations operate in India, the cybersecurity skills gaps also impacts the global economy at large. The IT sector is one of the major employment generators in India, employing over 2.5 million people. A major breach could significantly jeopardize future growth within this critical IT sector.

NASSCOM launched cybersecurity training initiatives in collaboration with key IT companies. Along with the Data Security Council of India (DSCI), it launched a new Cyber Security Task Force (CSTF) to improve the supply of trained cybersecurity professionals. However, it will take some time before the CSTF starts making an impact on the ground. And it’s but a drop in the ocean given the escalating onslaught of cyberattacks that the Indian government and local businesses are facing.

Cognitive Security Bridges the Cybersecurity Skills Gap

While promoting cybersecurity education can help address the skills gap to some degree, it will not be enough to address rapidly multiplying cyberthreats. Luckily, Watson for Cybersecurity can help offset the skill shortage in India.

Watson for Cybersecurity is a first-of-its-kind, cloud-based cognitive technology. It’s trained to reason and learn from unstructured data — or 80 percent of all data on the internet that traditional security tools cannot process, including blogs, articles, videos, reports, alerts and other information.

“By leveraging Watson’s ability to bring context to staggering amounts of unstructured data, impossible for people alone to process, we will bring new insights, recommendations and knowledge to security professionals, bringing greater speed and precision to the most advanced cybersecurity analysts and providing novice analysts with on-the-job training,” said Marc van Zadelhoff, general manager of IBM Security.

Watson can empower cybersecurity professionals with superior capabilities and help them become more efficient. As Caleb Barlow, vice president of IBM Security, aptly told Fortune, “It’s not about replacing humans, but about making them superhumans.”

Learn more about Cognitive Security and how it can help bridge the Cybersecurity skills gap

More from Artificial Intelligence

Data Privacy: How the Growing Field of Regulations Impacts Businesses

The proposed rules over artificial intelligence (AI) in the European Union (EU) are a harbinger of things to come. Data privacy laws are becoming more complex and growing in number and relevance. So, businesses that seek to become — and stay — compliant must find a solution that can do more than just respond to current challenges. Take a look at upcoming trends when it comes to data privacy regulations and how to follow them. Today's AI Solutions On April…

Tackling Today’s Attacks and Preparing for Tomorrow’s Threats: A Leader in 2022 Gartner® Magic Quadrant™ for SIEM

Get the latest on IBM Security QRadar SIEM, recognized as a Leader in the 2022 Gartner Magic Quadrant. As I talk to security leaders across the globe, four main themes teams constantly struggle to keep up with are: The ever-evolving and increasing threat landscape Access to and retaining skilled security analysts Learning and managing increasingly complex IT environments and subsequent security tooling The ability to act on the insights from their security tools including security information and event management software…

4 Ways AI Capabilities Transform Security

Many industries have had to tighten belts in the "new normal". In cybersecurity, artificial intelligence (AI) can help.   Every day of the new normal we learn how the pandemic sped up digital transformation, as reflected in the new opportunities and new risks. For many, organizational complexity and legacy infrastructure and support processes are the leading barriers to the effectiveness of their security.   Adding to the dynamics, short-handed teams are overwhelmed with too much data from disparate sources and…

What’s New in the 2022 Cost of a Data Breach Report

The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a year ago and 12.7% since 2020. New research in this year’s report also reveals for the first time that 83% of organizations in the study have experienced more than one data breach and just 17% said this was their first data breach. And at a time when…