• Register

Data Net Blog

DHS Worried About Lack of Cybersecurity Talent

DHS Worried About Lack of Cybersecurity Talent

We spend a lot of time on this blog discussing cybersecurity. Understanding the effects of full-scale cybersecurity attacks is useful, but will only motivate a person or business to do things that will work to keep their network secure. The problem is that when it comes to public computing resources, there isn’t enough being done. 

The Department of Homeland Security has gone on the record several times recently about the shortage of cybersecurity talent and how it is not just a troubling trend, it is a major problem and a threat to U.S. national security. Today, we’ll take a look at some of the statements made by the DHS and talk about a couple ideas that will get young people to become interested enough in cybersecurity to want to do it for a living.

What DHS Says

The U.S Department of Homeland Security’s whole mission is to keep Americans and American-owned businesses safe here at home. As such, they have a cybersecurity division that is tasked with protecting public computing resources from theft and attack. Recently, the Assistant Director for Cybersecurity and Infrastructure Security Agency (CISA), Jeanette Manfra talked about how CISA is making cybersecurity training initiatives an important part of their professional development platform. 

“It’s a national security risk that we don’t have the talent,” Manfra said. “We have a massive shortage that is expected to grow larger.” 

The Cybersecurity Skills Gap

Demand for comprehensive cybersecurity has never been higher and it is becoming a very large problem. According to the Center for Cyber Safety and Education there are over 1.5 million unfilled cybersecurity jobs, which will grow to 1.8 million by 2021. With not enough people to monitor networks and fewer even to provide comprehensive training, the talent shortage is a big reason there are so many data breaches. 

Reasons for the Shortage

You’d immediately think that the reason for a lack of workers in a certain sector would come from a lack of education. While not many computer science curriculums prioritize cybersecurity, in this case, lack of cybersecurity-related courses isn’t the biggest issue. 

It’s the job.

Working in cybersecurity isn’t sexy. It’s a lot like being a cop or a sanitation worker, thankless, but without people willing to do those jobs, society would be chaos. This is a high stress job, that gets no recognition, and is maligned when something goes wrong. Since this doesn’t paint a picture of a job that would be in high demand, it’s no surprise that there is a shortage, and that even if they are staffed, they are short on resources. 

...But Education Could Be Better

The educational opportunities are actually decreasing, even as cybercrime becomes a multi-trillion dollar per year problem. For-profit trade schools, some of the only places prioritizing information security, are going the way of the dinosaur, and curriculums at major universities haven’t transitioned as fast as cybercriminals have, leaving a big gap in IT education.

Fortunately for everyone there are approximately a million ethical hackers out there who are constantly checking systems for vulnerabilities. Instead of stealing information, these individuals typically work some type of deal to get a paycheck for telling a company about the vulnerabilities they find. Moreover, these individuals are the future of cybersecurity. As a result, there are organizations that are creating free coursework designed by these ethical hackers for a talent pool that has no choice but to grow. With tools like Cyber Aces, Hacker101, Google Gruyere, and more, there is an active attempt by cybersecurity firms to find talent that has an interest in doing these jobs. 

Manfra explained that CISA is really pushing their development of curriculum for developers in grade and secondary school and, borrowing a strategy from big tech by developing workforce training procedures that are modeled with recruitment and retention in mind. Since filling these jobs are a priority, you could begin to see special incentive programs for people willing to focus on cybersecurity as an expertise. 

Manfra sees government subsidy for the educational costs cybersecurity professionals pick up if they are willing to work in the public sector for a few years before they move on to the private sector. Allowing CISA to “ a community of people with shared experience.” The more people who are on the same page, the more costs will stabilize, which will help business.

Cybercime isn’t going away, so making sure that your business’ network and infrastructure is well maintained and your staff is trained can go a long way toward protecting your business’ assets. Subscribe to our blog for more great cybersecurity articles.

Identifying (and Preventing) Burnout in the Workpl...
Small Business File Sharing and Collaboration


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, February 18, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity Privacy Data Efficiency Smartphones Malware Hackers Innovation Communication User Tips Email Microsoft Google Tech Term IT Support Managed IT Services Software Computer Small Business Hardware Communications Internet Mobile Device Users Cybersecurity VoIp Android Cloud Windows 10 Mobile Devices Business Management Outsourced IT Ransomware Miscellaneous Workplace Tips Business Cloud Computing Passwords Collaboration IT Services Social Media Browser Data Backup Apps Hosted Solutions Network Gadgets Information Data recovery Smartphone Holiday Windows Facebook Internet of Things Wi-Fi Upgrade Applications Bandwidth Backup Blockchain Patch Management Managed IT services Phishing Networking Access Control Managed Service Employer-Employee Relationship Chrome Gmail Microsoft Office Marketing VPN Wireless Word Business Intelligence Router Automation Saving Money Quick Tips Managed IT Service Save Money Laptop Apple Compliance Value BDR Windows 7 Data Management Remote Monitoring Bring Your Own Device Cortana How To Tech Terms Cost Management RAM Virus Business Continuity Remote Monitoring and Management Payment Cards Computers Government Remote Computing Retail Wireless Charging Medical IT Social Network Telephone System Physical Security Office Virtual Assistant Virtualization Connectivity Artificial Intelligence Healthcare Going Green Excel Net Neutrality Password Company Culture Office 365 Processor Data Protection Scam Data Breach Voice over Internet Protocol Settings Data Security Telephony Mobility Paperless Office Batteries iPhone Employee-Employer Relationship G Suite Business Technology Website Specifications Search Operating System Unified Communications Authentication WhatsApp File Sharing Millennials Help Desk National Security Digital Websites Internet Explorer Proactive IT E-Commerce Bitcoin SSD Downloads Dark Web Education Profiles Video Mobile Device Management Telecommute Wireless Internet Knowledge Battery Sports Reporting Licensing Humor Hard Drive Electronic Health Records Vendor Update News Security Cameras Risk Management Conferencing Lead Generation Time Management Insurance Authorization Safety Threat Payment Trends Error Live Streaming Shadow IT Customer Service Holidays Data loss Amazon Big Data Technology Tips Tech Support Memes Processors Health Database Hybrid Cloud Outlook eCommerce Wearables Virtual Private Network Chrome OS File Management Network Attached Storage Environment Microsoft Teams Updates Edge Printing instant Messaging Threats IT budget Twitter A.I. Law Enforcement Telecommuting OneNote HP Spam Remote Support SaaS Alert Vulnerability IT User Tip Spyware Employees Distribution Cybercrime Cables Profitability Cleaning Sales Online Shopping Customer Relationship Management Content Filtering Current Events e-waste Certification Dongle Paper Server Vulnerabilities Scams Inventory Movies Touchscreen Windows Server 2008 R2 Document Management Antivirus Backup and Disaster Recovery GDPR Hosted Desktop Solid State Drive Fleet Management Machine Learning Tactics Eliminating Downtime Tablet Recycling Managed Service Provider WannaCry Human Resources Mobile Office disposal Managing Stress User Security Display Ink Comparison Cryptocurrency Project Management IT Management Mobile Security Microsoft Office 365 Congratulations Workers Taskbar Staff Maintenance Plug-In Hard Drives Streaming Media Storage Travel Firewall Tip of the week Hard Disk Drive Multi-Factor Authentication BYOD Botnet Personal Information Co-Managed IT HIPAA Managed Services Provider Server Management Troubleshooting Voice over IP Training Benchmarks Analytics PowerPoint WiFi Financial Analysis Computer Repair Disaster Recovery Thank You IT Service Printers Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123