Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

// // //
01:00 PM
Jessica Gulick
Jessica Gulick
Connect Directly
E-Mail vvv

Did the Cybersecurity Workforce Gap Distract Us From the Leak?

Cyber games can play a critical role in re-engaging our workforce and addressing the employee retention crisis.

What if our nation invested in its human cybersecurity workforce as much as we have innovative tools? Many would answer, "We have!" And they would be partially correct; we have invested to recruit new talent, relentlessly pursuing early career cyber pros, through college programs, school partnerships, or just readjusting our salary and benefits packages yet again. We've been trying to fill the gap with a variety of programs.

Related Content:

Cyber Athletes Compete to Form US Cyber Team

Special Report: Building the SOC of the Future

New From The Edge: Security 101: The 'PrintNightmare' Flaw

Undoubtedly, we must address the 500,000 unfilled positions as nearly two-thirds of cyber pros report staff shortages at their own organizations. But as we've poured more and more resources into filling the gap, have we missed a significant leak in our current workforce funnel?

Our cyber community has fixated on the workforce gap at the top of the funnel for over a decade — and clearly the deficit is apt to continue as our digital lives expand. But there is another story lost in the shadow of this looming problem: There are several leaks and missing development paths in our workforce funnel.

Cyber's Overlooked Retention Problem
The sizable workforce gap is hiding cybersecurity's industrywide problem of employee retention, development, and engagement. The constant need for fresh talent isn't just due to the growing space we're in; in fact, the gap is in experienced roles, not junior levels. Our colleagues are leaving their jobs in droves.

Under normal circumstances, jobs in cybersecurity are inherently stressful; then the pandemic kicked things up another notch. In cybersecurity, the effect of stress and risk of burnout has been described as "reaching epidemic levels and has increased exponentially during the COVID-19 crisis." According to a recent Ponemon survey, 75% of respondents agreed that the high-pressure environment in SOCs and the workload are causing analysts to burn out quickly, and average tenure in an organization is just two years.

But it's not just burnout that's triggering cyber pros to exit organizations. An ISACA study indicated 66% of cyber pros agreed it's difficult to retain talent, and half cited the main reason for staff leaving was limited promotion and development opportunities.

Cyber professionals are bored protecting the same network each day, and tired of losing the internal fight on the right way to secure a network. Their jobs, once full of challenge and pride, over time become mundane and tedious. Fine-tuning skills and continuing to intellectually challenge seasoned professionals is essential to combating the drain happening on our teams. It's critical that we address this issue immediately before the brain drain becomes even more acute with an aging workforce.

Focus on Talent Development, Engagement Planning
The reason why our people feel under-developed is pretty well documented: "Continuous cyber-training is lacking, in part, because there seems to be no time to learn while chronically fighting the next conflagration." Prioritizing employee development is a challenge we need to meet head-on.

In fact, a NIST whitepaper concluded, "The current and projected workforce needs must be met not only by training more cybersecurity personnel, but also by raising the bar on their skills, aptitude and ability to collaborate. Cybersecurity competitions can play a critical role in this mandate."

Cyber games as a development tool are even more critical than ever before. Development as a work "to-do" just adds extra strain on an already fragile employee. Play has a different role. It's been credited with the ability to combat boredom, stress, and loneliness, and results have shown that play at work could "reduce employees' experienced burnout which in turn lead to their innovation behaviors."

Got Game?
Cyber competitions are a game in which we all win. By addressing our industrywide problem of employee retention and engagement through training games that develop our employees, minimizing burnout and churn, we can start to make inroads on the all-too-real cybersecurity workforce gap. "Since training games are 'practice by doing,' learners retain up to 75% of what they learn, a 25% to 70% increase over other forms of training. When employees retain more, they perform better."

Game platforms like TryHackMe, HacktheBox, SANS NetWars, Packet Wars, and US Cyber Range impart skills in a fun and engaging manner. Initiatives like the US Cyber Games elevate the discussion from an annual cyber competition to a traveling sports team competing against other nations globally — a whole new level of cyber-as-a-sport. 

The cybersecurity games market space is evolving quickly and one to watch for not just its growth but its impact on the community.

Jessica Gulick is Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting the US Cyber Team; CEO of Katzcy, a woman-owned growth strategy and marketing firm; and, founder of PlayCyber, a new business line promoting cyber games and ... View Full Bio
Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...