Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

// // //
7/14/2021
01:00 PM
Jessica Gulick
Jessica Gulick
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv

Did the Cybersecurity Workforce Gap Distract Us From the Leak?

Cyber games can play a critical role in re-engaging our workforce and addressing the employee retention crisis.

What if our nation invested in its human cybersecurity workforce as much as we have innovative tools? Many would answer, "We have!" And they would be partially correct; we have invested to recruit new talent, relentlessly pursuing early career cyber pros, through college programs, school partnerships, or just readjusting our salary and benefits packages yet again. We've been trying to fill the gap with a variety of programs.

Related Content:

Cyber Athletes Compete to Form US Cyber Team

Special Report: Building the SOC of the Future

New From The Edge: Security 101: The 'PrintNightmare' Flaw

Undoubtedly, we must address the 500,000 unfilled positions as nearly two-thirds of cyber pros report staff shortages at their own organizations. But as we've poured more and more resources into filling the gap, have we missed a significant leak in our current workforce funnel?

Our cyber community has fixated on the workforce gap at the top of the funnel for over a decade — and clearly the deficit is apt to continue as our digital lives expand. But there is another story lost in the shadow of this looming problem: There are several leaks and missing development paths in our workforce funnel.

Cyber's Overlooked Retention Problem
The sizable workforce gap is hiding cybersecurity's industrywide problem of employee retention, development, and engagement. The constant need for fresh talent isn't just due to the growing space we're in; in fact, the gap is in experienced roles, not junior levels. Our colleagues are leaving their jobs in droves.

Under normal circumstances, jobs in cybersecurity are inherently stressful; then the pandemic kicked things up another notch. In cybersecurity, the effect of stress and risk of burnout has been described as "reaching epidemic levels and has increased exponentially during the COVID-19 crisis." According to a recent Ponemon survey, 75% of respondents agreed that the high-pressure environment in SOCs and the workload are causing analysts to burn out quickly, and average tenure in an organization is just two years.

But it's not just burnout that's triggering cyber pros to exit organizations. An ISACA study indicated 66% of cyber pros agreed it's difficult to retain talent, and half cited the main reason for staff leaving was limited promotion and development opportunities.

Cyber professionals are bored protecting the same network each day, and tired of losing the internal fight on the right way to secure a network. Their jobs, once full of challenge and pride, over time become mundane and tedious. Fine-tuning skills and continuing to intellectually challenge seasoned professionals is essential to combating the drain happening on our teams. It's critical that we address this issue immediately before the brain drain becomes even more acute with an aging workforce.

Focus on Talent Development, Engagement Planning
The reason why our people feel under-developed is pretty well documented: "Continuous cyber-training is lacking, in part, because there seems to be no time to learn while chronically fighting the next conflagration." Prioritizing employee development is a challenge we need to meet head-on.

In fact, a NIST whitepaper concluded, "The current and projected workforce needs must be met not only by training more cybersecurity personnel, but also by raising the bar on their skills, aptitude and ability to collaborate. Cybersecurity competitions can play a critical role in this mandate."

Cyber games as a development tool are even more critical than ever before. Development as a work "to-do" just adds extra strain on an already fragile employee. Play has a different role. It's been credited with the ability to combat boredom, stress, and loneliness, and results have shown that play at work could "reduce employees' experienced burnout which in turn lead to their innovation behaviors."

Got Game?
Cyber competitions are a game in which we all win. By addressing our industrywide problem of employee retention and engagement through training games that develop our employees, minimizing burnout and churn, we can start to make inroads on the all-too-real cybersecurity workforce gap. "Since training games are 'practice by doing,' learners retain up to 75% of what they learn, a 25% to 70% increase over other forms of training. When employees retain more, they perform better."

Game platforms like TryHackMe, HacktheBox, SANS NetWars, Packet Wars, and US Cyber Range impart skills in a fun and engaging manner. Initiatives like the US Cyber Games elevate the discussion from an annual cyber competition to a traveling sports team competing against other nations globally — a whole new level of cyber-as-a-sport. 

The cybersecurity games market space is evolving quickly and one to watch for not just its growth but its impact on the community.

Jessica Gulick is Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting the US Cyber Team; CEO of Katzcy, a woman-owned growth strategy and marketing firm; and, founder of PlayCyber, a new business line promoting cyber games and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file