Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

The War for Cyber Talent Will Be Won by Retention not Recruitment

Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.

When it comes to cybersecurity, there are two common truths any executive will tell you. First, there is a well-documented shortfall of 3 million workers in the industry — too many jobs for too few qualified workers. Second, to fill these jobs, we need to think outside the box and look to professionals who aren't in the computer science and IT fields.

There are more articles than we can count that tangentially explore those two points. We need to move past discussing the problem and who may fill these jobs and explore the deeper question of how we get people into these jobs.

Right now, the supply of skilled workers is significantly less than the incredible demand for these positions; thus, the negotiating power is squarely in the hands of the workers. They can set their requirements and can do so with virtually any number of willing suitors. Consequently, how we attract talent and who we recruit will still be an active area of focus. But how we retain these workers should be positioned with equal or greater importance. Here are six steps to keep your cyber talent from running off to the next highest bidder.

Step 1: Stay competitive with compensation and benefits. This should go without saying: The best legacy cyber workers and the smartest professionals that can be upskilled to be cyber professionals are able to name their price. If the wages and benefit packages aren't fair and competitive, they'll find their next opportunity quickly.

Step 2: Have a well-defined hiring strategy. While there are more jobs than can be filled, there is no need to be reckless and hire for quantity versus quality. Clearly articulate what your organization and team is looking for and hire against those needs. This will provide your hire(s) with a sense of purpose toward a specific goal instead of anonymity in some homogeneous group.

Step 3: Provide continuous education. Cybersecurity is a field that is changing by the hour. There are new threats, new advances in technology, new social and political ramifications, and new solutions to constantly stay in front of. By investing in education, you are equipping your new hires and current employees to be the best in their field and provide the best service and solutions to your clients.

Step 4: Redefine purpose. It's very easy once people are hired to give them objectives and leave them to their own devices. While focusing on the objective is great for short-term goals, in the long term, new hires may begin to wonder what their purpose is on the team, what they are trying to achieve, and how their work is affecting the greater good. At the onset, work with employees to create their big-picture purpose and continually redefine their objectives as the work changes. This will allow your employees to articulate how their positions are impacting the company and society. For instance, while the employment objective may be pinhole testing for system vulnerabilities, that employee's bigger purpose is to discover weaknesses in a bank's mobile app and create defenses against those vulnerabilities to allow for a safe and seamless experience for customers while mobile banking.

Step 5: Create an employee career map. Job security and the opportunity for growth are incredible motivators. However, as cybersecurity practitioners are incredibly coveted in the marketplace, it becomes crucial to show them their career trajectory rather than simply saying "you have a future with this company." By creating an employee journey map, you are laying out clear instructions for how they can succeed and grow organically within the organization.

Step 6: Utilize human resource analytics. The use of HR analytics will allow the hiring manager on the team to not only see in real time what the needs of the team are, who's been hired, and where they came from, but it will also measure the ROI of employee programs and overall workforce performance as well as identify where the team is growing and where resources can be allocated. By utilizing this information, hiring managers can make informed decisions possible that will help them hire the best people, reduce costly and morale-damaging turnover, and allow for the proper management of team resources.

Recruiting the best talent is only the beginning. Where we'll win both the battle and the war for talent is by creating an environment that challenges, stimulates, rewards, and constantly re‑engages our employees to fight the good fight against cybercriminals.

The views reflected in this article do not necessarily reflect the views of the global EY organization or its member firms.

Related Content: 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Sundeep Nehra, Principal, Cybersecurity leader,  Financial Services Office, Ernst & Young LLP As a Principal in the Financial Services Office, Sundeep leads the Integrated Cyber and Resiliency Risk practice. He advises clients on issues related to cyber, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Michael_Coates
50%
50%
Michael_Coates,
User Rank: Apprentice
7/23/2019 | 1:35:45 PM
Agreed!
Great article. I've built security programs at two prominent tech companies, Twitter and Mozilla. We certainly had an advantage of a name brand and a compeling product to attract great candidates. But that alone wouldn't be enough to keep great security staff. I'm glad to see articles like this that stress the importance of the "non-technical" aspects of security. Great teams don't happen by chance. Similarly, great employees don't stick around without a well crafted program that considers elements of retention and career building.

 

-Michael
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
CVE-2019-16761
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0...
CVE-2019-16762
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any...
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.