Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

// // //
7/14/2021
01:00 PM
Jessica Gulick
Jessica Gulick
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv

Did the Cybersecurity Workforce Gap Distract Us From the Leak?

Cyber games can play a critical role in re-engaging our workforce and addressing the employee retention crisis.

What if our nation invested in its human cybersecurity workforce as much as we have innovative tools? Many would answer, "We have!" And they would be partially correct; we have invested to recruit new talent, relentlessly pursuing early career cyber pros, through college programs, school partnerships, or just readjusting our salary and benefits packages yet again. We've been trying to fill the gap with a variety of programs.

Related Content:

Cyber Athletes Compete to Form US Cyber Team

Special Report: Building the SOC of the Future

New From The Edge: Security 101: The 'PrintNightmare' Flaw

Undoubtedly, we must address the 500,000 unfilled positions as nearly two-thirds of cyber pros report staff shortages at their own organizations. But as we've poured more and more resources into filling the gap, have we missed a significant leak in our current workforce funnel?

Our cyber community has fixated on the workforce gap at the top of the funnel for over a decade — and clearly the deficit is apt to continue as our digital lives expand. But there is another story lost in the shadow of this looming problem: There are several leaks and missing development paths in our workforce funnel.

Cyber's Overlooked Retention Problem
The sizable workforce gap is hiding cybersecurity's industrywide problem of employee retention, development, and engagement. The constant need for fresh talent isn't just due to the growing space we're in; in fact, the gap is in experienced roles, not junior levels. Our colleagues are leaving their jobs in droves.

Under normal circumstances, jobs in cybersecurity are inherently stressful; then the pandemic kicked things up another notch. In cybersecurity, the effect of stress and risk of burnout has been described as "reaching epidemic levels and has increased exponentially during the COVID-19 crisis." According to a recent Ponemon survey, 75% of respondents agreed that the high-pressure environment in SOCs and the workload are causing analysts to burn out quickly, and average tenure in an organization is just two years.

But it's not just burnout that's triggering cyber pros to exit organizations. An ISACA study indicated 66% of cyber pros agreed it's difficult to retain talent, and half cited the main reason for staff leaving was limited promotion and development opportunities.

Cyber professionals are bored protecting the same network each day, and tired of losing the internal fight on the right way to secure a network. Their jobs, once full of challenge and pride, over time become mundane and tedious. Fine-tuning skills and continuing to intellectually challenge seasoned professionals is essential to combating the drain happening on our teams. It's critical that we address this issue immediately before the brain drain becomes even more acute with an aging workforce.

Focus on Talent Development, Engagement Planning
The reason why our people feel under-developed is pretty well documented: "Continuous cyber-training is lacking, in part, because there seems to be no time to learn while chronically fighting the next conflagration." Prioritizing employee development is a challenge we need to meet head-on.

In fact, a NIST whitepaper concluded, "The current and projected workforce needs must be met not only by training more cybersecurity personnel, but also by raising the bar on their skills, aptitude and ability to collaborate. Cybersecurity competitions can play a critical role in this mandate."

Cyber games as a development tool are even more critical than ever before. Development as a work "to-do" just adds extra strain on an already fragile employee. Play has a different role. It's been credited with the ability to combat boredom, stress, and loneliness, and results have shown that play at work could "reduce employees' experienced burnout which in turn lead to their innovation behaviors."

Got Game?
Cyber competitions are a game in which we all win. By addressing our industrywide problem of employee retention and engagement through training games that develop our employees, minimizing burnout and churn, we can start to make inroads on the all-too-real cybersecurity workforce gap. "Since training games are 'practice by doing,' learners retain up to 75% of what they learn, a 25% to 70% increase over other forms of training. When employees retain more, they perform better."

Game platforms like TryHackMe, HacktheBox, SANS NetWars, Packet Wars, and US Cyber Range impart skills in a fun and engaging manner. Initiatives like the US Cyber Games elevate the discussion from an annual cyber competition to a traveling sports team competing against other nations globally — a whole new level of cyber-as-a-sport. 

The cybersecurity games market space is evolving quickly and one to watch for not just its growth but its impact on the community.

Jessica Gulick is Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting the US Cyber Team; CEO of Katzcy, a woman-owned growth strategy and marketing firm; and, founder of PlayCyber, a new business line promoting cyber games and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4031
PUBLISHED: 2022-11-29
The Simple:Press plugin for WordPress is vulnerable to arbitrary file modifications in versions up to, and including, 6.8 via the 'file' parameter which does not properly restrict files to be edited in the context of the plugin. This makes it possible with attackers, with high-level permissions such...
CVE-2022-4032
PUBLISHED: 2022-11-29
The Quiz and Survey Master plugin for WordPress is vulnerable to iFrame Injection via the 'question[id]' parameter in versions up to, and including, 8.0.4 due to insufficient input sanitization and output escaping that allowed iframe tags to be injected. This makes it possible for unauthenticated at...
CVE-2022-4033
PUBLISHED: 2022-11-29
The Quiz and Survey Master plugin for WordPress is vulnerable to input validation bypass via the 'question[id]' parameter in versions up to, and including, 8.0.4 due to insufficient input validation that allows attackers to inject content other than the specified value (i.e. a number, file path, etc...
CVE-2022-4034
PUBLISHED: 2022-11-29
The Appointment Hour Booking Plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.3.72. This makes it possible for unauthenticated attackers to embed untrusted input into content during booking creation that may be exported as a CSV file when a site's administrator...
CVE-2022-4035
PUBLISHED: 2022-11-29
The Appointment Hour Booking plugin for WordPress is vulnerable to iFrame Injection via the ‘email’ or general field parameters in versions up to, and including, 1.3.72 due to insufficient input sanitization and output escaping that makes injecting iFrame tags p...