According to ISACA, the cybersecurity skills shortage is projected to reach 2 million unfilled positions by 2019. Addressing this widening skills gap requires a multifaceted strategy that must include new professional and computing capability. This approach calls for the adoption of cutting-edge technologies and engagement with new professionals to augment the existing, increasingly shorthanded cybersecurity workforce.

Three Keys to New Collar Recruitment

In 2017, IBM announced a cybersecurity skills initiative through a new collar workforce strategy. A report titled, “It’s Not Where You Start — It’s How You Finish: Addressing the Cybersecurity Skills Gap With a New Collar Approach,” outlined the three key elements of this strategy.

1. New Employee Profiles

When I was working at a startup, we hired based on reputation and capability. The focus was on creating or looking for those core attributes and skills in the market as a way to source individuals. Some of those engineers are still top performers despite having no university qualifications.

Traditional university course content and engagement is not the only way forward: A new collar approach focuses on skills, not degrees, as a prerequisite to find nontraditional candidates with diverse backgrounds and experience. That’s why IBM joined forces with Tamesek Polytechnic in Singapore to train 500 students over five years to fight cybercrime in a security operations center (SOC) setting. This initiative is an example of IBM’s commitment to helping aspiring cybersecurity professionals build practical, specific security skills as an output rather than focusing on the credit points required to fulfill degree qualifications.

2. New Types of Roles

New roles focused on emerging technologies require specific skills and knowledge to perform. Like other emerging science, technology, engineering and mathematics (STEM) career paths, the cybersecurity workforce needs people who are builders, operators and communicators.

Security leaders can often find candidates for cybersecurity roles who are already working in various nontechnical departments throughout the organization. For example, with a little fast-tracked education, disaster recovery experts can become excellent incident response professionals. Likewise, health care professionals possess the foundational skills required to become effective threat hunters — only instead of fighting disease, they would be combating security incidents that threaten the overall health of the security immune system.

Twenty percent of the new hires who have joined IBM Security in the U.S. since 2015 have been new collar workers. These professionals contribute various skills, insights and perspectives that fulfill the core responsibilities required to keep up with today’s evolving threat landscape.

3. New Partnerships

A new collar approach requires security leaders to reach out and develop new relationships. Initiatives such as the Australian government’s Cyber Security Growth Centre and Joint Cyber Security Centre promote this type of outreach. IBM Australia, in association with Federation University, also established a national Pathways in Technology (P-Tech) schools program, a public-private partnership in which industry players provide mentoring by way of paid internships. Seven P-Tech schools are already in operation, and the program is set to reach a total of 14 by 2018.

Empowering the Cybersecurity Workforce With Cognitive Capabilities

Attracting more talent to the industry is one avenue to help close this skills gap, but new technology is required to help those professionals cope with the complexity within today’s environments.

Cognitive capabilities help deliver insights gathered from collaborative global threat intelligence, cybersecurity blogs, wiki pages, podcasts and more. By using Watson capabilities, IBM Security brings a global perspective to help security professionals optimize decision-making. This enables individuals with varying levels of skill and experience to more quickly arrive at conclusions and reduce the time required to perform a task. At the same time, Watson provides the evidence it uses to arrive at these conclusions, helping security professionals grow their knowledge base.

These cognitive capabilities cover all kinds of cybersecurity tasks, from prioritizing mobile patches to helping the security operations team evaluate incidents and broaden its investigative scope.

The New Collar Approach in Action: Local Partnerships Through Active Engagement

In recognition of the need for security professionals to form new partnerships, IBM Security launched the IBM Security Technology Customer Council for Australia and New Zealand in 2016. The objective was to form a community of users through a meetup-style event held every four to six months. At the most recent events, I encouraged invitees to bring a colleague who is new to cybersecurity.

With the diverse panel and many new guests, attendees were given access to perspectives from various professional backgrounds. It reminded me again that diversity provides fresh and unique views that challenge us to think differently about problems technologists have pondered for decades. This is a great example of the new collar approach in action.

Read the complete IBM report: Addressing the Skills Gap with a New Collar Approach

More from Artificial Intelligence

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

How I got started: Cyber AI/ML engineer

3 min read - As generative AI goes mainstream, it highlights the increasing demand for AI cybersecurity professionals like Maria Pospelova. Pospelova is currently a senior data scientist, and data science team lead at OpenText Cybersecurity. She also worked at Interest, an AI cybersecurity company acquired by MicroFocus and then by OpenText. She continues as part of that team today.Did you go to college? What did you go to school for?Pospelova: I graduated with a bachelor’s degree in computer science and a master’s degree…

Back to basics: Better security in the AI era

4 min read - The rise of artificial intelligence (AI), large language models (LLM) and IoT solutions has created a new security landscape. From generative AI tools that can be taught to create malicious code to the exploitation of connected devices as a way for attackers to move laterally across networks, enterprise IT teams find themselves constantly running to catch up. According to the Google Cloud Cybersecurity Forecast 2024 report, companies should anticipate a surge in attacks powered by generative AI tools and LLMs…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today