{"id":20507,"date":"2022-01-11T21:52:46","date_gmt":"2022-01-11T21:52:46","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20507"},"modified":"2023-11-14T16:03:49","modified_gmt":"2023-11-14T16:03:49","slug":"solving-cybersecurity-skills-gap","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/","title":{"rendered":"Cybersecurity Employment: Solving the Skills Gap"},"content":{"rendered":"\n<p>As we enter 2022, the shortage of cybersecurity pros hasn\u2019t gotten better. In fact, it\u2019s gotten worse. There are currently <a href=\"https:\/\/www.cyberseek.org\/heatmap.html\" target=\"_blank\" rel=\"noreferrer noopener\">about 435,000<\/a> cybersecurity job openings available in the United States, up from <a href=\"https:\/\/www.csis.org\/analysis\/cybersecurity-workforce-gap\" target=\"_blank\" rel=\"noreferrer noopener\">approximately 314,000 in 2019<\/a>. The move to <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\" target=\"_blank\" rel=\"noreferrer noopener\">remote work<\/a> in response to the COVID-19 pandemic increased the workloads for skilled IT professionals, and combined with the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-outlook-2022-ransomware-and-ai-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">rising rate of ransomware attacks<\/a>, many security pros are suffering from burnout. With all that going on, the need for experienced cybersecurity staff hasn\u2019t dwindled, causing recruiters and government officials alike to search for solutions to the skills shortage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Cybersecurity Hiring Gap<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#obstacles\">Obstacles to Cybersecurity Hiring<\/a><\/li>\n\n\n\n<li><a href=\"#government\">Government Initiatives<\/a><\/li>\n\n\n\n<li><a href=\"#business\">Business Recruiting Efforts<\/a><\/li>\n\n\n\n<li><a href=\"#how-to-find\">How to Find and Cultivate Cybersecurity Talent<\/a><\/li>\n\n\n\n<li><a href=\"#dei\">DE&amp;I Improves Cybersecurity Recruiting<\/a><\/li>\n\n\n\n<li><a href=\"#close-the-gap\">How Your Business Can Help Close the Skills Gap<\/a><\/li>\n<\/ul>\n\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"obstacles\">Obstacles to Cybersecurity Hiring<\/h2>\n\n\n\n<p>Compounding the cybersecurity skills shortage is a host of other challenges companies face, from inadequate wages to employee burnout. It&#8217;s not always possible to solve every problem, but you can address some to help improve the situation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Burnout<\/h3>\n\n\n\n<p>According to a <a href=\"https:\/\/www.forrester.com\/report\/predictions-2022-cybersecurity-risk-and-privacy\/RES176406\" target=\"_blank\" rel=\"noreferrer noopener\">Forrester survey<\/a>, \u201c2021 data shows that 51% of cybersecurity professionals experienced extreme stress or burnout, with 65% saying they had considered leaving their job because of job stress.\u201d This level of burnout means that not only are cybersecurity professionals leaving their jobs, but some are also leaving the field altogether. So much of this <a href=\"https:\/\/www.techrepublic.com\/article\/covid-19-has-exacerbated-a-75-job-burnout-rate-study-says\/\" target=\"_blank\" rel=\"noreferrer noopener\">burnout stems directly from the COVID-19 pandemic<\/a>, where cybersecurity pros are being asked to take on heavier workloads as companies undergo digital transformations, not to mention the mental health difficulties that accompany a multi-year pandemic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Non-competitive Wages<\/h3>\n\n\n\n<p>Despite the increase in work that companies are putting on their IT departments, they aren\u2019t increasing wages to compensate for it. And because these jobs are so in demand, many workers can jump ship and easily make a substantially higher salary. Then, once those workers are gone, the business has a nearly impossible time replacing them because the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cyber-security-jobs\/\" target=\"_blank\" rel=\"noreferrer noopener\">salary doesn\u2019t match the expected level of work<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Benefits Don\u2019t Outweigh Job Stress<\/h3>\n\n\n\n<p>While a competitive salary is important, the <a href=\"https:\/\/technologyadvice.com\/blog\/human-resources\/benefits-that-make-life-easier\/\" target=\"_blank\" rel=\"noreferrer noopener\">right set of benefits<\/a> is the actual driver behind <a href=\"https:\/\/www.eweek.com\/security\/avoiding-cyber-burnout\/\" target=\"_blank\" rel=\"noreferrer noopener\">fighting burnout<\/a> and keeping employees. If the benefits package a company is offering doesn\u2019t outweigh the stress of a job, employees will leave and they\u2019ll be difficult to replace. Paid time off and flexible work options are a big part of this and are low-cost ways companies can improve benefits packages for their employees. Hot startups and big-name competitors who can now hire from anywhere are also making it harder for companies to compete for talent because they have the budget or flexibility to offer attractive benefits.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"government\">Government Initiatives<\/h2>\n\n\n\n<p>Even the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/biden-cybersecurity-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\">United States government<\/a> is struggling to fill its cybersecurity roles, leading to government initiatives to solve the problem.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DHS\u2019s Cybersecurity Talent Management System<\/h3>\n\n\n\n<p>The Department of Homeland Security created a Cybersecurity Talent Management System that allows it to streamline the hiring process, create better compensation packages, and build new career development programs. The <a href=\"https:\/\/dhscs.usajobs.gov\/Home\" target=\"_blank\" rel=\"noreferrer noopener\">portal<\/a> includes assessments for a variety of cybersecurity skills, as well as customized applications for each role, so applicants aren\u2019t wasting time filling out unnecessary information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity Workforce \u201cSprint\u201d<\/h3>\n\n\n\n<p>In March of 2021, DSH Secretary Mayorkas outlined six 60-day cybersecurity sprints covering several different cybersecurity priorities. The sprints covered:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ransomware (April &amp; May 2021)<\/li>\n\n\n\n<li>Cybersecurity Workforce (May &amp; June 2021)<\/li>\n\n\n\n<li>Industrial Control Systems (July &amp; August 2021)<\/li>\n\n\n\n<li>Cybersecurity and Transportation (September &amp; October 2021)<\/li>\n\n\n\n<li>Election Security (November &amp; December 2021)<\/li>\n\n\n\n<li>International Cybersecurity (January &amp; February 2022)<\/li>\n<\/ul>\n\n\n\n<p>While the DHS knows work in each of these areas will take more than 60 days, they are using these sprints to ensure existing work is addressing these challenges, target and remove roadblocks, and create an opportunity to form new partnerships as necessary.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"business\">Business Recruiting Efforts<\/h2>\n\n\n\n<p>Businesses are also having to get creative with their recruiting efforts to find and cultivate top cybersecurity talent. Some are partnering with technology organizations (like the SANS Institute or <a href=\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Talent Institute<\/a>) to find potential employees early. Others are looking to current employees for referrals or examining their competitors to see how they can improve their benefits package.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Remote and flexible work options<\/a> are another way businesses are enticing new employees. Allowing workers to work when and where they want is a great option for many cybersecurity roles because they typically don\u2019t need to be in the office to do their job well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-find\">How to Find and Cultivate Cybersecurity Talent<\/h2>\n\n\n\n<p>Even though it\u2019s tough right now, there are steps businesses can take to find and cultivate cybersecurity talent to fill their open roles.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Create Internship Programs<\/h3>\n\n\n\n<p>Internship programs are a great way to find talented workers early and teach them the skills they need to be successful in your business. To create a successful internship program, you need to give your interns actual work experience, rather than just having them handle the grunt work none of your full-time employees want to do.<\/p>\n\n\n\n<p>You also need to partner with local colleges and possibly even high schools to generate interest in the field and find future employees. Many community colleges have strong IT programs, and they can also be a good source for a diverse candidate pool. And you need to pay your interns. It\u2019s the best way to keep them engaged in your business, reduce their stress so they can perform better, and increase the likelihood of getting good referrals.<\/p>\n\n\n\n<p>Also Read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/tech-giants-pledge-big-money-to-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft, Google Among Tech Giants Pledging Big Money to Cybersecurity<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Gather Referrals from Current Employees<\/h3>\n\n\n\n<p>If you\u2019re a recruiter, you likely already know how helpful referrals can be for finding the right candidate. On average, referred candidates are faster to hire, stay at the company about <a href=\"https:\/\/www.apollotechnical.com\/employee-referral-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">twice as long as non-referred candidates<\/a>, and have a higher ROI than other employee sourcing methods. To get referrals from your current employees, they first need to know what you\u2019re looking for.<\/p>\n\n\n\n<p>They should already be familiar with your core values, but take time every so often to let them know which positions are open and which are most critical to your success. Chances are, they aren\u2019t checking out your company\u2019s career page unless they already know someone looking for a job, so you need to tell them what\u2019s available. Additionally, consider offering a referral bonus to incentivize employees to refer people in their network to your open roles.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Subsidize Education for Employees Who Want to Move to Cybersecurity<\/h3>\n\n\n\n<p>You may have talented individuals already in your employ that are interested in cybersecurity but don\u2019t yet have the skills to make the transition. Employees with knowledge of human behavior, <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/gdpr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">compliance<\/a> and government policies, or risk management can all bring that knowledge into a cybersecurity role. Consider funding or subsidizing a training course or tuition for these employees. For example, <a href=\"https:\/\/technologyadvice.com\/careers\/\" target=\"_blank\" rel=\"noreferrer noopener\">TechnologyAdvice<\/a> has partnered with The Nashville Software School to pay for current employees who don\u2019t have technical skills to get the training they need to move into an IT position.<\/p>\n\n\n\n<p>Not only does this provide employees with growth opportunities and make them feel valued by their company, but it also provides the business with more skilled IT workers that are more engaged. Typically, this benefit often comes with a stipulation that the employee must stay with the company for x number of years after they\u2019ve completed their training or coursework or they have to repay the company for the cost of their tuition.<\/p>\n\n\n\n<p>Also Read: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-get-started-in-a-cybersecurity-career\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Get Started in a Cybersecurity Career<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"dei\">DE&amp;I Improves Cybersecurity Recruiting<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/trends\/tech-lgbtq-diversity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Diversity, equity, and inclusion (DE&amp;I)<\/a> is a must for cybersecurity recruiting. Although the industry has been historically dominated by white and Asian men, women and people of color have a lot of value to add, in both new ideas and a stronger workforce.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Diversity jolts us into cognitive action in ways that homogeneity simply does not.<\/p>\n<cite>Katherine Phillips, Professor, Columbia Business School<\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Removing Barriers to Entry<\/h3>\n\n\n\n<p>Focusing on DE&amp;I can often remove barriers to entry because recruiters may realize that some of the requirements they currently have on the job listing aren\u2019t actually relevant for a successful employee, and they may be harming your ability to find good candidates. For example, some roles may not require a four-year degree, especially if the candidate has relevant experience or <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-certifications\/\" target=\"_blank\" rel=\"noreferrer noopener\">proper certifications<\/a>, but many workplaces require such degrees, quickly eliminating a large portion of the population.<\/p>\n\n\n\n<p>Requiring workers to be in the office is another barrier to entry. With <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\" target=\"_blank\" rel=\"noreferrer noopener\">remote work<\/a>, you can significantly increase your talent pool, accommodate disabled individuals, and provide extra benefits to your employees. This also reduces commuting expenses for your employees and offers options for candidates without personal transportation. With technology as it stands now, there are very few jobs that can\u2019t be done at home at least most of the time, especially in IT.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">New Ideas for How to Protect the Organization<\/h3>\n\n\n\n<p>A <a href=\"https:\/\/www.itbusinessedge.com\/communications\/tech-industry-struggles-dei\/\" target=\"_blank\" rel=\"noreferrer noopener\">diverse workforce<\/a> brings new perspectives to the work, allowing organizations to develop new ways to protect themselves from cyberattacks. \u201cDiversity jolts us into cognitive action in ways that homogeneity simply does not,&#8221; wrote Columbia Business School Professor Katherine Phillips in <a href=\"https:\/\/www.scientificamerican.com\/article\/how-diversity-makes-us-smarter\/\" target=\"_blank\" rel=\"noreferrer noopener\">an article for Scientific American<\/a>.<\/p>\n\n\n\n<p>When workers come from diverse backgrounds, they have to work harder to communicate their ideas and understand their coworkers because not everyone sees the world the same way they do. Not only does this breed new ideas, but it also helps improve overall organizational communication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"close-the-gap\">How Your Business Can Help Close the Skills Gap<\/h2>\n\n\n\n<p>The gap between available cybersecurity workers and open roles is a big one, but your business can close it by creating new opportunities for existing employees outside of IT and increasing interest in cybersecurity in students. And in the short term, work with your existing employees to improve your benefits package to attract new employees and retain your current ones, while also increasing the likelihood of referrals. And make sure you\u2019re increasing pay to keep up with the rising demands of cybersecurity and IT work in general. Otherwise, you may lose more employees than you gain.<\/p>\n\n\n\n<p>Read Next: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/finding-cybersecurity-talent-alan-paller\/\">A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d9fb7fcf2-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d9fb7fcf2\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d9fb7fcf2\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d9fb7fcf2\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d9fb7fcf2\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d9fb7fcf2\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d9fb7fcf2\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As we enter 2022, the shortage of cybersecurity pros hasn\u2019t gotten better. In fact, it\u2019s gotten worse. There are currently about 435,000 cybersecurity job openings available in the United States, up from approximately 314,000 in 2019. The move to remote work in response to the COVID-19 pandemic increased the workloads for skilled IT professionals, and [&hellip;]<\/p>\n","protected":false},"author":158,"featured_media":20508,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[31618],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[68],"class_list":["post-20507","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cybersecurity-training","b2b_audience-awareness-and-consideration","b2b_product-staffing-training-and-certifications"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Employment: How to Solve the Skills Gap<\/title>\n<meta name=\"description\" content=\"With the shortage of experienced cybersecurity professionals, businesses struggle to respond to the rising ransomware threat. Learn more now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Employment: How to Solve the Skills Gap\" \/>\n<meta property=\"og:description\" content=\"With the shortage of experienced cybersecurity professionals, businesses struggle to respond to the rising ransomware threat. Learn more now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-11T21:52:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-14T16:03:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenn Fulmer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenn Fulmer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/\"},\"author\":{\"name\":\"Jenn Fulmer\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/246026b2372e81da9f4360516d4eb75e\"},\"headline\":\"Cybersecurity Employment: Solving the Skills Gap\",\"datePublished\":\"2022-01-11T21:52:46+00:00\",\"dateModified\":\"2023-11-14T16:03:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/\"},\"wordCount\":1712,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg\",\"keywords\":[\"cybersecurity training\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/\",\"name\":\"Cybersecurity Employment: How to Solve the Skills Gap\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg\",\"datePublished\":\"2022-01-11T21:52:46+00:00\",\"dateModified\":\"2023-11-14T16:03:49+00:00\",\"description\":\"With the shortage of experienced cybersecurity professionals, businesses struggle to respond to the rising ransomware threat. Learn more now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg\",\"width\":1024,\"height\":683,\"caption\":\"Woman coding at her computer.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Employment: Solving the Skills Gap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/246026b2372e81da9f4360516d4eb75e\",\"name\":\"Jenn Fulmer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/T039FL812-U019MPLGN3D-0b0ff98bdebd-512-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/T039FL812-U019MPLGN3D-0b0ff98bdebd-512-150x150.jpg\",\"caption\":\"Jenn Fulmer\"},\"description\":\"Jenn Fulmer is a writer for TechnologyAdvice, IT Business Edge, Channel Insider, and eSecurity Planet currently based in Lexington, KY. Using detailed, research-based content, she aims to help businesses find the technology they need to maximize their success and protect their data.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jenn-fulmer\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Employment: How to Solve the Skills Gap","description":"With the shortage of experienced cybersecurity professionals, businesses struggle to respond to the rising ransomware threat. Learn more now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Employment: How to Solve the Skills Gap","og_description":"With the shortage of experienced cybersecurity professionals, businesses struggle to respond to the rising ransomware threat. Learn more now.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/","og_site_name":"eSecurity Planet","article_published_time":"2022-01-11T21:52:46+00:00","article_modified_time":"2023-11-14T16:03:49+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg","type":"image\/jpeg"}],"author":"Jenn Fulmer","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenn Fulmer","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/"},"author":{"name":"Jenn Fulmer","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/246026b2372e81da9f4360516d4eb75e"},"headline":"Cybersecurity Employment: Solving the Skills Gap","datePublished":"2022-01-11T21:52:46+00:00","dateModified":"2023-11-14T16:03:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/"},"wordCount":1712,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg","keywords":["cybersecurity training"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/","url":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/","name":"Cybersecurity Employment: How to Solve the Skills Gap","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg","datePublished":"2022-01-11T21:52:46+00:00","dateModified":"2023-11-14T16:03:49+00:00","description":"With the shortage of experienced cybersecurity professionals, businesses struggle to respond to the rising ransomware threat. Learn more now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Cybersecurity-Worker-Shortage.jpeg","width":1024,"height":683,"caption":"Woman coding at her computer."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Employment: Solving the Skills Gap"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/246026b2372e81da9f4360516d4eb75e","name":"Jenn Fulmer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/T039FL812-U019MPLGN3D-0b0ff98bdebd-512-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/T039FL812-U019MPLGN3D-0b0ff98bdebd-512-150x150.jpg","caption":"Jenn Fulmer"},"description":"Jenn Fulmer is a writer for TechnologyAdvice, IT Business Edge, Channel Insider, and eSecurity Planet currently based in Lexington, KY. Using detailed, research-based content, she aims to help businesses find the technology they need to maximize their success and protect their data.","url":"https:\/\/www.esecurityplanet.com\/author\/jenn-fulmer\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20507"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/158"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20507"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20507\/revisions"}],"predecessor-version":[{"id":32826,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20507\/revisions\/32826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20508"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20507"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20507"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20507"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}