January 16, 2018 By Julian Meyrick 3 min read

In today’s world, a company’s most vulnerable area is no longer physical, but digital. Shop fronts, banks and factories are being attacked not just in person, but also online, 24 hours a day and 365 days a year. With the threat increasing, companies need highly skilled cyberwarriors to defend their networks. But often these skills are hard to find, and the people needed for this crucial line of defense are scarce.

The Security Skills Gap

Though security has always been important, the number and sophistication of attacks is increasing rapidly. Security is now on the board’s mind more than ever before and demand for cyber skills is far outstripping supply. In fact, Frost & Sullivan predicted that the gap between available, qualified cybersecurity professionals and unfulfilled positions will reach 1.8 million by 2022.

Though connecting our world through the Internet of Things (IoT) can boost productivity, efficiency and the customer experience, all these new connections generate huge amounts of data and increase the size of the potential attack surface. This creates more gaps to be plugged and the need for a bigger security team.

As Marc van Zadelhoff, general manager of IBM Security, recently stated, “Even if the industry was able to fill the estimated 1.5 million open cybersecurity jobs by 2020, we’d still have a skills crisis in security. The volume and velocity of data in security is one of our greatest challenges in dealing with cybercrime.”

The Cognitive Explosion

More data is being generated than ever before, with 2.5 quintillion bytes created every day. Without a dedicated team to keep a constant eye on all this data, many companies will turn to cognitive systems.

According to an IBM report, the number of security professionals implementing these solutions is expected to increase threefold in the next two to three years. Using cognitive technologies to take over the security team’s most mundane and repetitive tasks frees up the highly valuable cyber professionals to do the more complicated (and often the more interesting) work.

As the bad guys start using their own artificial intelligence (AI) to steal sensitive data, cognitive security is becoming more of a necessity than a luxury. As a result, deep skills in areas such as data science are now crucial. However, since these areas are relatively new, the related skills are still limited to a small number of people whose expertise and hands-on experience is in high demand.

The New Collar Approach

One way to reduce this security skills gap is to adopt a new collar approach to hiring. The idea is that to be a great cybersecurity professional, you don’t necessarily need a traditional four-year university degree. What is most important is technical skill and aptitude. By increasing the size of the recruitment pool to include a more diverse range of backgrounds and restructuring work around specific skill sets to create new roles, companies hope that highly talented individuals who may previously have been overlooked will now join the security workforce.

It is also important to note that the security industry doesn’t just need people with technical degrees and skills. In addition to these essential “builders,” such as integration engineers, security device analysts and developers, companies also need “operators” to serve as penetration testers and threat analysts, as well as “communicators” to work as cyber help desk analysts, technical writers and security awareness trainers. According to the Harvard Business Review, 20 percent of the new hires who have joined IBM Security in the U.S. since 2015 have been new collar professionals.

Join Us at the First Cyber Careers Show

In an endeavor to bring more skilled individuals into the security industry, IBM is taking part in the first Cyber Careers Show in London on Jan. 17, 2018. The event is open to students, experienced professionals and those looking to move into a cybersecurity career. It will give attendees an opportunity to meet potential employers and find out more about security careers, from security architecture and consulting to penetration testing, incident response and much more.

If you may be interested in joining our team, we encourage you to check out these current career opportunities at IBM Security.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today