Careers & People

6/27/2018
01:26 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
100%
0%

The 3 R's for Surviving the Security Skills Shortage

How to recruit, retrain, and retain with creativity and discipline.

As threats escalate and enterprise cybersecurity teams struggle to build teams that can handle mounting volumes of work, the hue and cry over the cybersecurity skills shortage continues to grow more urgent by the year.

In fact, a study released earlier this year from Enterprise Strategy Group (ESG) shows that over the past four years, the percentage of IT leaders who complained about a problematic shortage of cybersecurity skills has more than doubled. Security skills, according to ESG, are the shortest in supply, ahead of IT architecture and planning, and server and virtualization administration, which were numbers two and three, respectively. 

If organizations are to survive this skills crunch, they're going to need to get creative about how they build their teams. According to many longtime security experts, this means rethinking the basics. Fundamental to the process is for organizations to be both disciplined and open-minded as they recruit, retrain, and retain staffers.

Here's what the experts say it will take to leverage these three R's.

Recruit
Organizations often get so hung up with checking off a laundry list of resume prerequisites — either specific security certifications, technology proficiencies, exact numbers of years in the industry, or all of the above — that they eliminate excellent candidates from the pool before they've even started recruited. 

"It's important to think outside the box and be open-minded when recruiting security talent. Throw stereotypes out the window and focus on understanding the types of people you are looking to hire," says Jennifer Sunshine Steffens, CEO of IOActive. "They may not have degrees or certifications, they may not have years of experience in security, and they may not wear hoodies." 

As Steffens and others explain, security is more of a way of life and a mode of thinking, so recruitment should be about filtering by personality types and mentalities more so than by checklists. Security recruiters who focus more on picking people who can round out a team rather than filling an exact role will see greater success down the line, says David Emerson, CISO for Cyxteram. This is particularly important considering that the pace of change is going to make those checklist items obsolete in a few years anyway. The more important thing is finding someone who can grow with the team.

"The person you need now is not necessarily the person you need one year from now, or three years from now, so make sure your hires have enduring characteristics, such as dedication and a penchant for collaborative problem solving, not merely point-in-time qualities or trendy resume points," Emerson warns.

Organizations should be similarly creative about where and how they run recruitment drives, Steffens adds. 

"In cybersecurity, we've found some of the best talent by looking outside the industry 'norms.' Sure, recruitment at college fairs and offering internship programs will yield great candidates, but with 2 million jobs openings, the talent must come in nontraditional ways," she says. "At IOActive, recruiting is part of our everyday lives. We travel around the world attending conferences, hosting events, and visiting hackerspaces to find the right talent."

Finally, if you absolutely must fill a specific list of resume metrics, then you'll need to ensure that what you offer a candidate is on track with market realities.

"[Organizations] will need to open their wallets and clearly define their cultural identity to win the affections of those who are already established as leaders in the field," says Jared Coseglia, CEO of TRU Staffing Partners, a recruiter specializing in cybersecurity.

Retrain
Hiring based on potential is important, but to get the most out of all that latent ability you'll need to actually give employees the opportunity to make good on it. Training is crucial to helping existing staff keep up with current trends and develop those promising new recruits. 

"Companies that don't provide the space and the time for their security staff to keep their skills sharp are setting themselves up to fail," says Ryan Barrett, vice president of security for Intermedia. "Companies with successful security teams give them the time to conduct internal evaluations and regularly send them to security conferences for fresh perspectives and hands-on training."

Training can also be a huge tool for reducing cybersecurity recruitment spending when it is used to retrain or cross-train smart people who already work for the organization in different roles outside of security. According to Coseglia, this can be a very clever way to bridge gaps that can't be filled by external recruitment. 

"Pull professionals who know your culture and know your data from tertiary departments and reinvest in them rather than rely exclusively on external hires," he says. "For example, many corporations and consulting firms are transitioning tech savvy e-discovery or forensic investigation professionals into cyber-centric roles. These individuals often have the technical, business savvy, customer service, and/or project management skills needed to step in and provide leadership once trained on specific areas of cybersecurity."

One of the biggest mistakes organizations make is undervaluing the potential that existing IT employees could have to become excellent cybersecurity staffers, agrees Frank Downs, senior manager of Cyber Information Security Practices at ISACA. 

"Many of these people long to stay relevant within the organization but are not provided the funding or the mechanisms to cross-train," Downs says. "Many IT professionals want to become cybersecurity relevant. For the cost of some additional education, organizations can have someone who is familiar with the corporate rules and culture [that are] directly applicable to the cybersecurity needs."

Retain
Finally, organizations need to remember that simply filling a role is just the start to solid cybersecurity team-building. Even more important is ensuring that those roles remained filled for as long as possible.

This doesn't happen magically. Security managers must develop a sound retention strategy if they want to remain fully staffed in such a competitive market.

"As long as demand for experienced professionals remains high and supply low, a good retention strategy is crucial," says Tom Gilheany, portfolio manager of security training and certifications for Cisco Services. "Retention isn't necessarily driven by higher salaries alone. Research has shown that other factors play a surprisingly strong role when it comes to employee retention."

This means offering employees career and skills development programs and providing a clear path for growth in their roles and responsibilities.

"You can't hire and retain top cybersecurity professionals without presenting them with growth opportunities and a career path," says Drew Nielsen, CISO of Druva. "Hiring managers also have to consider and improve on company culture to attract top talent." 

Coseglia agrees that culture is the secret sauce for hanging on to the best and brightest. 

"Culture is key to the top echelon of cyber professionals," he says. "Culture can mean different things to different organizations. Some cultures offer advanced challenges, and the nature of their work becomes an enticement, while others offer cultural lifestyle differentiations." 

So whether it is giving staff the opportunity to hack into blockchain technology or the artificial intelligence of driverless cars, or it is giving them more flexibility to work from home to achieve a work/life balance, employers must up their game in making their companies a place where security pros want to set down roots.

Related Content:

 

 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18519
PUBLISHED: 2018-11-19
BestXsoftware Best Free Keylogger 5.2.9 allows local users to gain privileges via a Trojan horse "%PROGRAMFILES%\BFK 5.2.9\syscrb.exe" file because of insecure permissions for the BUILTIN\Users group.
CVE-2018-19355
PUBLISHED: 2018-11-19
modules/orderfiles/ajax/upload.php in the Customer Files Upload addon 2018-08-01 for PrestaShop (1.5 through 1.7) allows remote attackers to execute arbitrary code by uploading a php file via modules/orderfiles/upload.php with auptype equal to product (for upload destinations under modules/productfi...
CVE-2008-7320
PUBLISHED: 2018-11-18
** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.
CVE-2018-19358
PUBLISHED: 2018-11-18
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig...
CVE-2018-19351
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHand...