December 15, 2016 By Mark Samuels 2 min read

Attempts to build strong corporate defenses could be undermined by a critical lack of IT skills. Executives must take a strategic approach to the expertise gap.

According to a recent report, “Hacking the Skills Shortage,” by Intel and the Center for Strategic and International Studies (CSIS), 82 percent of IT decision-makers are concerned about the cybersecurity skills shortage.

The skills gap presents many challenges to executives looking to stay ahead of the evolving threat landscape. Organizations must take a proactive approach to the security challenges they face.

The Cybersecurity Skills Shortage by the Numbers

Demand for cybersecurity professionals outpaces the supply of qualified workers. According to the report, organizations most commonly covet highly technical skills across. Intrusion detection, secure software development and attack mitigation skills are particularly valued.

More than 209,000 cybersecurity jobs in the U.S. went unfilled through 2015, according to Peninsula Press, which analyzed data from the Bureau of Labor Statistics. The demand for information security professionals is expected to grow by 53 percent through 2018.

The lack of security talent is already having an impact. As many as 71 percent of IT leaders believe the cybersecurity skills shortage is responsible for measurable damage to their organizations, according to Intel and CSIS. Additionally, 1 in 4 respondents claimed their organizations had lost proprietary data due to the cybersecurity skills gap.

Tough Road Ahead in 2017

According to a Ponemon Institute report, technology decision-makers set aside 23 percent of their IT security budgets for cyber resilience. Due to the fast-changing nature of security threats, however, internal technology teams face a tough time staying ahead.

The study also revealed that 71 percent of U.K. organizations rate their cyber resilience as low. The survey, produced in association with Resilient Systems, followed a similar survey of U.S. IT leaders last year, which found that three-quarters of North American firms are similarly ill prepared.

Cybersecurity challenges are likely to increase in 2017 as cybercriminals continue to use creative techniques to open corporate defenses. Chief information security officers (CISOs) should prepare for the increased use of ransomware, extortion and industrial attacks connected to the Internet of Things (IoT), TechRepublic reported.

A New Approach

IT managers tend to get caught up searching for technical skills and fail to consider soft skills when filling positions. Since the biggest threats to security usually stem from people, cybersecurity professionals need strong communication and interpersonal skills.

Businesses looking to deal with the cybersecurity skills challenge should foster new education models, accelerate the availability of training opportunities and diversify their human resources pool, according to Chris Young, senior vice president and general manager of Intel.

The report outlined recommendations for IT decision-makers looking to deal with the cybersecurity skills crisis. First, they should reconsider the minimum credentials required for entry-level IT employment and open their minds to job candidates with nontraditional backgrounds. IT leaders should also provide more on-the-job training and procure intelligent security automation tools that enable analysts to produce better metrics to spot and respond to threats.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today