There is no question that there is a shortage of data security, information security, and cybersecurity skill sets across the globe. Credit: Thinkstock After talking about the CISOs role in mergers and acquisitions, it’s time we examine the shortage mentioned above, offer short and long-term solutions, and give guidance on how Chief Information Security Officers (CISOs) can be proactive and provide leadership to mitigate the issue.A recent report by Cybersecurity Ventures predicted that the existing cybersecurity workforce gap will increase to 1.5 million job openings by 2019. Some experts predict there will be a global shortage of two million cybersecurity professionals by 2019. Whether it is 1.5 million (July 2016) or two million (March 2017), there is a huge gap in cybersecurity skill sets that is affecting every vertical market. While no one CISO can win this battle, with our combined skills we can collectively mitigate the risk to an acceptable level. As we examine the problem set, there are a few short-term solutions that we can apply to business.1. Cybersecurity skills gap doesn’t have to be an enterprise operational gapIdentify security commodity areas (i.e., Log Management and Analysis) within your business that are more routine in nature, where process and procedures could be replaced by third-party suppliers. Many resource-constrained organizations are addressing the shortage challenge by adopting managed security services. In fact, almost two-thirds (62%) of Global State of Information Security® Survey 2017 respondents say they use security service providers to operate and enhance their cybersecurity programs. Your security team can partner with trusted vendors for managed services or subscribe to service plans where outside experts can act as an extension of your cybersecurity team. A trusted security service provider can train current employees, operate a cybersecurity program, and help to establish enterprise awareness programs, as cybersecurity is a shared responsibility across different functions.2. Educate current employees as to how human error plays a large role in security breaches….…and teach them correct cyber hygiene – from not opening phishing emails, to not downloading software without permission, to creating strong passwords and changing them regularly. 3. Long term, it’s critical for CISOs to employ proactive approaches, such as building your own cybersecurity workforceConsider working with local technical colleges and community colleges in your geographic area to find students who have cybersecurity skill sets, or who are looking for a career in cybersecurity.Consider offering scholarship programs within your enterprise to bring resources to your company and to grow your own talent pool. In addition, think about employing veterans who have skills that may be equivalent to cybersecurity skills, and bring those trained veterans into your workforce. 4. Look to outside organizations that are trying to recruit more professionals into the cybersecurity fieldSuch as the Cybersecurity Workforce Alliance (CWA), which was set up by the financial industry, based around New York, to close the skills gap.Planning, collaboration, and a proactive approach that involves all enterprise entities should be involved in your strategy to secure your enterprise and mitigate the cybersecurity shortage issue. Related content opinion How to prepare for the next cybersecurity attack How should security management ready their organizations? By Christopher Camejo Mar 07, 2018 5 mins Risk Management Security opinion Managing threat information and intelligence The last thing that any organization wants is to make the headlines following a security breach. The damage to their reputation can be enormous, as can the financial costs. Unfortunately, it’s not a case of if it will happen, but when it will h By Steven Bullitt Jan 17, 2018 4 mins Data Breach Technology Industry Cybercrime opinion Vetting third-party IT security partners In the last installment of this blog series, “Report from the Field – CISO’s Top Concerns,” we discuss the benefits and risks of using third-party service suppliers. By John Petrie Jan 03, 2018 4 mins Security opinion Sophistication of cyberthreats – combination of independent hacker organizations and state actors In the same way network security tools are developed and released, cyber criminals can pick up a wide inventory of tools that can make it easy for those who don’t have a technical background to launch a cyberattack. By John Petrie Nov 28, 2017 4 mins Technology Industry Hacking Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe