What are the most common IT security skills gaps in organizations?
Learn from the community’s knowledge. Experts are adding insights into this AI-powered collaborative article, and you could too.
This is a new type of article that we started with the help of AI, and experts are taking it forward by sharing their thoughts directly into each section.
If you’d like to contribute, request an invite by liking or reacting to this article. Learn more
— The LinkedIn Team
IT security is a critical function for any organization, but it also requires a high level of skills and competencies to perform effectively. However, many organizations face IT security skills gaps that can expose them to cyber threats, compliance issues, and operational inefficiencies. In this article, we will explore some of the most common IT security skills gaps in organizations and how to address them.
One of the most basic IT security skills gaps is the lack of cybersecurity fundamentals among IT staff and users. Cybersecurity fundamentals include the concepts, principles, and best practices of protecting data, systems, and networks from unauthorized access, use, or damage. Without a solid understanding of cybersecurity fundamentals, IT staff and users may not be able to identify, prevent, or respond to cyberattacks, or comply with security policies and standards. To close this gap, organizations should provide regular training and awareness programs on cybersecurity fundamentals, as well as monitor and test the knowledge and behavior of IT staff and users.
-
Devashish Singh 🇮🇳 🇲🇾
Information Security Advisor - AirAsia | Ex-Maybank | CEH | CCSA | CISSP | DevSecOps | SOC | GCIH | GSEC | GCP | Azure
To begin with, being passionate about any profession is crucial. Many people simply follow market trends and join a job for the sake of it. However, when they actually step into the field, they often start losing interest. Next, people are not given attention to uplift them. They lose interest after doing the same thing repeatedly for years. They are neither provided with proper guidance nor any additional roles assigned to them. I think C-level and senior management should engage with individuals at all levels within the department periodically, rather than interacting with only a few individuals. They should seek feedback and assess their skills.
-
Emmanouil Serrelis
Cyber Security Leader | Sustainability Advocate | Innovation Thought Leader & Researcher
It seems that IT security skills gaps are more volatile than ever, mainly due to the fact that the tech environment and the business cases around these are changing in an increasing pace. I would distinguish the gaps into two parts: The Hard Skills, including Cybersecurity Judgement, Compliance/Regulatory Knowledge, Leading Edge Technologies (e.g. AI, Data Analytics) Risk Management and the Soft Skills, that include empathy, communication, minimum effective mindset and adaptability. Bridging these gaps for any professional, would obviously reduce risks, but also increase productivity and sustainability of business.
-
Syed Muhammad Abdul Karim
Information Security Architect @ NymCard | CEH v12 Certified | Ex Securiti.ai
A concerning issue is the lack of cybersecurity fundamentals among IT staff and users. Without this knowledge, they may inadvertently violate security policies, leading to compliance breaches and regulatory penalties. Organizations must prioritize training and awareness programs to mitigate this risk and maintain compliance.
Another common IT security skills gap is the lack of cloud security expertise among IT staff. Cloud security refers to the set of skills and competencies needed to secure cloud-based services, platforms, and infrastructure, such as AWS, Azure, or Google Cloud. Cloud security involves different challenges and requirements than traditional on-premise security, such as managing access control, encryption, compliance, and incident response in a dynamic and distributed environment. To close this gap, organizations should invest in cloud security certifications, tools, and frameworks for their IT staff, as well as adopt cloud security best practices and standards.
-
Filipi Pires
Security Researcher | Cybersecurity Advocate | Snyk Ambassador | Hacking Is Not a Crime Advocate | Speaker | Writer
Cloud Environments give us a great advantage in terms of scalability and mainly implementing microservices structures, so the permission level must be looked at with the utmost attention, cloud architects often think about facilitating access and they give privileged access to many groups and people within an organization, making the attack surface very large, making each cloud user a possible High-Value Target, which is why implement Threat Modeling solutions, Security requirements for cloud architecture, tools such as CIEM, CSPM, KSPM, CNAPP, among others are very important.
-
Vivek Singh Kalakoti
2.5 Million + Impressions || LinkedIn Top Networking and Leadership voice || Marketer ||Avid Learner || Personal Branding || Content Creator || Thinker || Cyclist || Investor || DM for Collaboration
While the IT staff's role is crucial, selecting a trustworthy cloud service provider is equally significant. To identify a reliable service provider, it is essential to examine the certifications they possess, such as ISO27001, HITRUST, and SOC2 Type2. Beyond just certifications, it's vital to assess the scope of the audit associated with these certifications. In summary, even if a cloud service provider holds certifications, an audit report is indispensable for evaluating the maturity of their information security controls.
-
Sonia Cuff
Cloud Advocacy Lead at Microsoft for Modern Infrastructure, Cloud Native & Linux
It's natural to look at a cloud environment and explore how you would do the thing you've always done on-premises, but in the cloud. This is the wrong approach, Instead, explore both the new security capabilities that the cloud can offer, as well as the new attack points for your cloud or cloud-connected resources.
A third common IT security skills gap is the lack of threat intelligence capabilities among IT staff. Threat intelligence refers to the process of collecting, analyzing, and disseminating information about current and emerging cyber threats, such as actors, tactics, techniques, and procedures. Threat intelligence helps IT staff to anticipate, detect, and mitigate cyberattacks, as well as to improve their security posture and strategy. To close this gap, organizations should leverage external sources of threat intelligence, such as vendors, partners, or communities, as well as develop their own internal threat intelligence processes and platforms.
-
Aleksandar K.
Information Security Analyst/ Technical Support Specialist Endpoint Security
Threat intelligence is very important, but only if it is implemented the right way in an organization. Only an integrated approach to threat intelligence that looks at geopolitical, political, economic, security, and cyber threats, and their interconnection, is the right approach for medium and large organizations that work internationally. Also, it is very important to have an inclusive threat intelligence program, that spans throughout the organization, of course with special attention to IT staff. Threat intelligence should support all other efforts that the company implements to manage risks (awareness programs, enterprise risk management, incident management, physical security, business continuity, etc.)
-
Vivek Singh Kalakoti
2.5 Million + Impressions || LinkedIn Top Networking and Leadership voice || Marketer ||Avid Learner || Personal Branding || Content Creator || Thinker || Cyclist || Investor || DM for Collaboration
Effective utilization of threat intelligence is vital, provided it is applied appropriately within an organization. The correct approach for medium and large international organizations involves an integrated perspective on threat intelligence that encompasses geopolitical, political, economic, security, and cyber threats, while recognizing their interconnected nature. Furthermore, it's essential to establish a comprehensive threat intelligence program that spans the entire organization, with specific emphasis on the IT staff. This program should complement and reinforce all other risk management initiatives, including awareness programs, enterprise risk management, incident management, physical security, and business continuity efforts.
-
Lokesh Verma
Military Veteran | Cyber Security | Mentor | Speaker | @ Amazon
Threat intelligence still refers to collecting IP/Domain from OSINT and use to block in perimeter. We are not bothered about the context, intention behind those attempts, attacks. Root cause for scanning, phishing attacks, that is where TI skills comes handy. Leaders should set a objective for TI and scope. as proactive approach should define threat models, target threat actors and start building the threat database and even before that understand the business and its criticality. Physical and online dangers from adversaries, this will help. Try to build predective threat intelligence based on data collected. Build more preventive and detective controls in tools and process. Divide Tactical, Strategic and operational intelligence
A fourth common IT security skills gap is the lack of security automation skills among IT staff. Security automation refers to the use of tools and technologies to automate and orchestrate security tasks and workflows, such as vulnerability scanning, patching, configuration management, incident response, and reporting. Security automation helps IT staff to improve their efficiency, accuracy, and scalability, as well as to reduce human errors and risks. To close this gap, organizations should adopt security automation platforms and frameworks, such as Security Orchestration, Automation, and Response (SOAR), as well as train their IT staff on how to use and integrate them.
-
Atinuke Victoria Owete
CISM || ISO 27001 Lead Implementer || Security+ || AWS CCP || Microsoft x1 || Tutor
Within the cybersecurity business, one of the biggest concerns is the talent gap in security automation which is crucial in managing the increasing volume and complexity of cyber threats. Some of the major reasons for this include but not limited to: - Rapid Advancements in Technology: Cybersecurity is constantly evolving, with new attack methods and dangers emerging. Organizations face challenges in keeping up with the latest security automation tools, exacerbated by limited education and training resources. - Knowledge gaps due to inadequate training and development, usually a result of limited training budget. Also, many training programs do not adequately cover security automation concepts.
-
Vivek Singh Kalakoti
2.5 Million + Impressions || LinkedIn Top Networking and Leadership voice || Marketer ||Avid Learner || Personal Branding || Content Creator || Thinker || Cyclist || Investor || DM for Collaboration
In the realm of cybersecurity, a prominent issue is the shortage of skilled professionals proficient in security automation, a critical aspect in handling the growing scale and intricacy of cyber threats. Some of the primary contributing factors to this problem encompass, but are not confined to: - Swift Technological Advancements: The ever-evolving nature of cybersecurity introduces new attack techniques and threats regularly. Organizations grapple with staying abreast of the latest security automation tools, a challenge exacerbated by the scarcity of educational and training resources. - Knowledge Gaps Arising from Insufficient Training and Development.
-
Lokesh Verma
Military Veteran | Cyber Security | Mentor | Speaker | @ Amazon
Automation is taking place into operations in hefty ways. We are eliminating manual tasks and replacing with playbooks into SOAR, SIEM. We can maintain KPI in proper way mainly MTTR / MTTD. Orgnisation mindset, capabilities, skills and resource are few road blocker in acheiving automation. My opinion for automation is that we acutally need to integrate in platform out of box like DIY, so to increase the acceptibility and remove complexity. and thereafter focus on niche skills, technologies (AI/ML dangers)
A fifth common IT security skills gap is the lack of soft skills among IT staff. Soft skills include the interpersonal, communication, and leadership skills that enable IT staff to collaborate effectively with other teams, stakeholders, and customers, as well as to influence and persuade others on security matters. Without soft skills, IT staff may face difficulties in building trust, rapport, and alignment on security goals and initiatives, as well as in managing conflicts, expectations, and feedback. To close this gap, organizations should foster a culture of security awareness and engagement, as well as provide coaching and mentoring programs for their IT staff.
-
Martin Rafi
Information Security Analyst at Intapp
Having empathy is crucial in IT security. While it may be easy for a security analyst like me to spot a phishing email, it may not be as easy for someone who does not operate in a security or even an IT role. It is important to be non-judgmental and understanding to foster a healthy working environment where information security matters can be shared and discussed without difficulties.
(edited) -
Lokesh Verma
Military Veteran | Cyber Security | Mentor | Speaker | @ Amazon
I have seen in my tenure with my teams, one can be incredible talented in terms of tech skills, but very poor in presenting his own work to a larger audience, needless to say this is very common, to address this i would like to focus on: 1. Identify the weak pole and provide more and more oppurtunity to nourish (debate, internal team presentation, document writing etc) 2. Provide more oppurtunity to participate and lead in inter team connection to create visibility, exposure and trust 3. Further, regular connect with IT and Security team to better colloboration, understanding priorities.
-
Md Mahbub Hasan
Business Information Security Officer @ Axiata Group Berhad | Cybersecurity, Telecom & 5G Security
I would like to highlight three points in this category 1. Understanding business objectives why an organization exists, what key objectives they want to achieve, and on top how IT security/Cyber security can support achieving this 2. Articulate how security risks would create impact on achieving the objectives 3. Develop necessary technical skills to implement the right (not the best) for organizations. Also organizations must support employees to excel and grow.
-
Charles Dorak
Cybersecurity Specialist
The biggest skills gap is experience. Why? Because the hiring manager is looking for experienced people. Got 2 years under your belt? Great your hired. Just got out of college with a degree in Cybersecurity? Sorry, you do not have experience. Hiring managers need to take the leap of faith and hire that the new person. Take the chance. You may just find your next cybersecurity rock star.
-
Mayenn S.
Executive Director, Information & Cyber Security
The most common gap is in the implementation of IT Security solutions & inability to use logic/common sense as we are so focused in situations or lack organisational constructs that we don't see the obvious. One must have deep understanding of technology, risk management, and business operations. A combination of these skills will allow you to not only protect the technical aspects but also align security measures with the company's strategic goals, ensuring an effective cybersecurity posture. Cybersecurity doesn't exist in a vacuum. It's important that professionals understand the needs & objectives of the business they are protecting. Knowledge of infrastructure security, Network, Cryptography, Cloud, IAM & Software development is a must.
-
Denise Bod
Cybersecurity- Governance, Risk Management and Compliance
The ability to set up and organize security processes. Security tools are implemented without building proper processes to optimize the use of those tools.