Unlock Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan
Get Instant Access
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan
Systematically source the skills your organization needs.
- The demand for qualified cybersecurity professionals far exceeds supply. As a result, organizations are struggling to protect their data against the evolving threat landscape.
- It is a constant challenge to know what skills will be needed in the future, and when and how to acquire them.
Our Advice
Critical Insight
- Plan for the inevitable. All industries are expected to be affected by the talent gap in the coming years. Plan ahead to address your organization’s future needs.
- Base skills acquisition decisions on the five key factors to define skill needs. Create an impact scale for the five key factors (data criticality, durability, availability, urgency, and frequency) that reflects your organizational strategy, initiatives, and pressures.
- A skills gap will always exist to some degree. The threat landscape is constantly changing, and your workforce’s skill sets must evolve as well.
Impact and Result
- Organizations must align their security initiatives to talent requirements such that business objectives are achieved and the business is cyber ready.
- Identify if there are skill gaps in your current workforce.
- Decide how you’ll acquire needed skills based on characteristics of need for each skill.
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan Research & Tools
Start here – read the Executive Brief
Read our concise Executive Brief to find out why you should develop a technical skills acquisition strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.
1. Identify skill needs for target state
Identify what skills will be needed in your future state.
2. Identify technical skill gaps
Align role requirements with future initiative skill needs.
3. Develop a sourcing plan for future work roles
Acquire skills based on the impact of the five key factors.
About Info-Tech
Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.
We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.
What Is a Blueprint?
A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.
Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.
Need Extra Help?
Speak With An Analyst
Get the help you need in this 3-phase advisory process. You'll receive 5 touchpoints with our researchers, all included in your membership.
Guided Implementation 1: Identify skill needs for target state
- Call 1: Define security roadmap skill needs.
- Call 2: Prioritize and associate roles with the initiative skill gaps.
Guided Implementation 2: Identify technical skill gaps
- Call 1: Align role requirements with future initiative skill needs.
Guided Implementation 3: Develop a skills sourcing plan for future work roles
- Call 1: Understand and define the factors that influence the skills sourcing plan, and discuss options for sourcing skills.
- Call 2: Score key factors against needed skill, and determine how to source a skill.
Author
Michelle Tran
Contributors
- Amanda Bluett, Head of Cyber Defence and Assurance, CBRE
- Eldon Sprickerhoff, Chief Innovation Officer, eSentire, Inc.
- Anja Adam, Manager of Information Security – IT Risk & Compliance, De Lage Landen International B.V.
- Four anonymous contributors
Related Content: Governance, Risk & Compliance
Search Code: 87542
Last Revised: July 17, 2019
TAGS:
talent gap, talent shortage, cybersecurity talent gap, cybersecurity talent shortage, cybersecurity skills gap, cybersecurity workforce strategy, Skills shortage, NIST, NICE, NICE Cybersecurity Workforce Framework, NICE workforce framework, NIST workforce framework, NIST cybersecurity framework, Workforce, Security workforce, Security staff, Video, Whiteboard, Whiteboard SeriesBook an Appointment
IT Research & Advisory Services
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.