Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

The War for Cyber Talent Will Be Won by Retention not Recruitment

Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.

When it comes to cybersecurity, there are two common truths any executive will tell you. First, there is a well-documented shortfall of 3 million workers in the industry — too many jobs for too few qualified workers. Second, to fill these jobs, we need to think outside the box and look to professionals who aren't in the computer science and IT fields.

There are more articles than we can count that tangentially explore those two points. We need to move past discussing the problem and who may fill these jobs and explore the deeper question of how we get people into these jobs.

Right now, the supply of skilled workers is significantly less than the incredible demand for these positions; thus, the negotiating power is squarely in the hands of the workers. They can set their requirements and can do so with virtually any number of willing suitors. Consequently, how we attract talent and who we recruit will still be an active area of focus. But how we retain these workers should be positioned with equal or greater importance. Here are six steps to keep your cyber talent from running off to the next highest bidder.

Step 1: Stay competitive with compensation and benefits. This should go without saying: The best legacy cyber workers and the smartest professionals that can be upskilled to be cyber professionals are able to name their price. If the wages and benefit packages aren't fair and competitive, they'll find their next opportunity quickly.

Step 2: Have a well-defined hiring strategy. While there are more jobs than can be filled, there is no need to be reckless and hire for quantity versus quality. Clearly articulate what your organization and team is looking for and hire against those needs. This will provide your hire(s) with a sense of purpose toward a specific goal instead of anonymity in some homogeneous group.

Step 3: Provide continuous education. Cybersecurity is a field that is changing by the hour. There are new threats, new advances in technology, new social and political ramifications, and new solutions to constantly stay in front of. By investing in education, you are equipping your new hires and current employees to be the best in their field and provide the best service and solutions to your clients.

Step 4: Redefine purpose. It's very easy once people are hired to give them objectives and leave them to their own devices. While focusing on the objective is great for short-term goals, in the long term, new hires may begin to wonder what their purpose is on the team, what they are trying to achieve, and how their work is affecting the greater good. At the onset, work with employees to create their big-picture purpose and continually redefine their objectives as the work changes. This will allow your employees to articulate how their positions are impacting the company and society. For instance, while the employment objective may be pinhole testing for system vulnerabilities, that employee's bigger purpose is to discover weaknesses in a bank's mobile app and create defenses against those vulnerabilities to allow for a safe and seamless experience for customers while mobile banking.

Step 5: Create an employee career map. Job security and the opportunity for growth are incredible motivators. However, as cybersecurity practitioners are incredibly coveted in the marketplace, it becomes crucial to show them their career trajectory rather than simply saying "you have a future with this company." By creating an employee journey map, you are laying out clear instructions for how they can succeed and grow organically within the organization.

Step 6: Utilize human resource analytics. The use of HR analytics will allow the hiring manager on the team to not only see in real time what the needs of the team are, who's been hired, and where they came from, but it will also measure the ROI of employee programs and overall workforce performance as well as identify where the team is growing and where resources can be allocated. By utilizing this information, hiring managers can make informed decisions possible that will help them hire the best people, reduce costly and morale-damaging turnover, and allow for the proper management of team resources.

Recruiting the best talent is only the beginning. Where we'll win both the battle and the war for talent is by creating an environment that challenges, stimulates, rewards, and constantly re‑engages our employees to fight the good fight against cybercriminals.

The views reflected in this article do not necessarily reflect the views of the global EY organization or its member firms.

Related Content: 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Sundeep Nehra, Principal, Cybersecurity leader,  Financial Services Office, Ernst & Young LLP As a Principal in the Financial Services Office, Sundeep leads the Integrated Cyber and Resiliency Risk practice. He advises clients on issues related to cyber, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Michael_Coates
50%
50%
Michael_Coates,
User Rank: Apprentice
7/23/2019 | 1:35:45 PM
Agreed!
Great article. I've built security programs at two prominent tech companies, Twitter and Mozilla. We certainly had an advantage of a name brand and a compeling product to attract great candidates. But that alone wouldn't be enough to keep great security staff. I'm glad to see articles like this that stress the importance of the "non-technical" aspects of security. Great teams don't happen by chance. Similarly, great employees don't stick around without a well crafted program that considers elements of retention and career building.

 

-Michael
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprise
Assessing Cybersecurity Risk in Today's Enterprise
Security leaders are struggling to understand their organizations risk exposure. While many are confident in their security strategies and processes, theyre also more concerned than ever about getting breached. Download this report today and get insights on how today's enterprises assess and perceive the risks they face in 2019!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18862
PUBLISHED: 2019-11-11
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.
CVE-2019-18853
PUBLISHED: 2019-11-11
ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
CVE-2019-18854
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to unlimited recursion for a '<use ... xlink:href="#identifier">' substring.
CVE-2019-18855
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to potentially unwanted elements or attributes.
CVE-2019-18856
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the SVG Sanitizer module through 8.x-1.0-alpha1 for Drupal because access to external resources with an SVG use element is mishandled.