• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  CISO/CIO  /  How can the CISO tackle the challenge of talent shortage?
How can the CISO tackle the challenge of talent shortage?
11 December 2019

How can the CISO tackle the challenge of talent shortage?

Written by Seqrite
Seqrite
CISO/CIO

Year-after-year, apart from malware, the cybersecurity industry continues to face the major threat of finding skilled professionals.

It’s a crisis that has been validated by concerning numbers from different sources — a report in 2018 by the International Information System Security Consortium (ISC)2 noted that the cybersecurity workforce gap had increased to more than 2.9 million globally with 59% of professionals observing that the widening workforce gap put their organizations at risk.

Another report in May 2019 by Enterprise Strategy Group (ESG) and Information Systems Security Association (ISSA) found that the cybersecurity skills shortage impacts 74% of organizations with 91% of respondents believing that their organizations were vulnerable to a cyber attack. A Frost & Sullivan report observed that the global cybersecurity workforce will have more than 1.5 million unfulfilled positions by 2020.

Alarming data

Closer at home in India, the trend is similar – between January 2017 and March 2018, job postings by Indian employers for cybersecurity roles increased by 150% according to research. The top Indian companies are actively trying to find ways to invest more in cybersecurity talent to plug this gap.

These are alarming numbers and represent a very real challenge for Chief Information Security Officers (CISOs) to address, all while ensuring they keep their representative enterprises safe from cyber threats. It’s a tightrope for CISOs to walk; here are some pointers on the best course of action they can take:

  1. Identify attitude, not skills

When it comes to cybersecurity hiring, unlearning is the need of the hour.

Unlike many other functions, cybersecurity hiring cannot be based just on the basis of skills or certifications, mainly because this is a field where such skills can get outdated very quickly. Rather, there are some specific traits required in cybersecurity professionals — the ability to make sound decisions in crises, working in an organized and disciplined manner, understanding the importance of cybersecurity, etc. being some of them. When CISOs, in partnership with recruiting managers, hunt for cybersecurity talent, they would be better off hunting for professionals with these qualities and attitude, rather than specific skills.

  1. Consider cross-skilling

As demonstrated in the last point, a good cybersecurity professional is someone who has certain qualities rather than specific skills. CISOs can consider cross-skilling to tackle the talent shortage in this space – they can try and identify talent within their own organization, providing them with training for cybersecurity. This will help in cost optimization while also enabling a better knowledge management program.

  1. Upskill your talent through certifications

It’s not always required to have a huge cybersecurity team even if you have a vast enterprise with many endpoints. A solid small team who has the right skill sets and attitudes may be more effective than a bigger team that works in silos. However, it is important for CISOs to ensure that their current team members stay updated with the latest cybersecurity trends through certifications and regular training. Seqrite offers certification courses like Seqrite Certified Endpoint Security Professional and Seqrite Certified UM Professional, enabling professionals to demonstrate product features, configure security policies and deploy products in standard environments.

  1. Consider investing in machine learning and automation solutions

Machine Learning, big data and automation are the buzz words of this decade and cybersecurity is no stranger to them. However, automation certainly provides great opportunities for CISOs when it comes to cybersecurity – by using artificial intelligence to scan huge datasets, it is possible to train systems to identify and take automatic action on anomalies. CISOs can consider exploring these options as they tackle the skill shortage.

The talent gap in cybersecurity is very real and organizations of all shapes and sizes are in the process of finding ways to bridge the gap. In the meantime, to ensure that their enterprises remain safe from cyber threats, they may consider deploying Seqrite’s range of powerful cybersecurity solutions to stay protected from cyber threats.

 Previous PostMitigating cyber threats through Better data protection
Next Post  Enterprise security in the age of nation-state cybersecurity thre...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • CISO-lookout

    Top five cybersecurity challenges for the CISO

    November 14, 2019
  • The-need-for-businesses-to-empower-the-CISO

    Why do boards need to empower their CISO?

    October 22, 2019
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (32) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies