Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Security icon

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

Systematically source the skills your organization needs.

Unlock a Free Sample

View Storyboard

Solution Set Storyboard Thumbnail

Contributors

  • Amanda Bluett, Head of Cyber Defence and Assurance, CBRE
  • Eldon Sprickerhoff, Chief Innovation Officer, eSentire, Inc.
  • Anja Adam, Manager of Information Security – IT Risk & Compliance, De Lage Landen International B.V.
  • Four anonymous contributors

Your Challenge

  • The demand for qualified cybersecurity professionals far exceeds supply. As a result, organizations are struggling to protect their data against the evolving threat landscape.
  • It is a constant challenge to know what skills will be needed in the future, and when and how to acquire them.

Our Advice

Critical Insight

  • Plan for the inevitable. All industries are expected to be affected by the talent gap in the coming years. Plan ahead to address your organization’s future needs.
  • Base skills acquisition decisions on the five key factors to define skill needs. Create an impact scale for the five key factors (data criticality, durability, availability, urgency, and frequency) that reflects your organizational strategy, initiatives, and pressures.
  • A skills gap will always exist to some degree. The threat landscape is constantly changing, and your workforce’s skill sets must evolve as well.

Impact and Result

  • Organizations must align their security initiatives to talent requirements such that business objectives are achieved and the business is cyber ready.
  • Identify if there are skill gaps in your current workforce.
  • Decide how you’ll acquire needed skills based on characteristics of need for each skill.

Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should develop a technical skills acquisition strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

3. Develop a sourcing plan for future work roles

Acquire skills based on the impact of the five key factors.

Guided Implementations

This guided implementation is a five call advisory process.

Guided Implementation #1 - Identify skill needs for target state

Call #1 - Define security roadmap skill needs.
Call #2 - Prioritize and associate roles with the initiative skill gaps.

Guided Implementation #2 - Identify technical skill gaps

Call #1 - Align role requirements with future initiative skill needs.

Guided Implementation #3 - Develop a skills sourcing plan for future work roles

Call #1 - Understand and define the factors that influence the skills sourcing plan, and discuss options for sourcing skills.
Call #2 - Score key factors against needed skill, and determine how to source a skill.

Onsite Workshop

Discuss This Workshop

Book Your Workshop

Onsite workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost onsite delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

Module 1: Identify Skill Needs for Target State

The Purpose

  • Determine the skills needed in your workforce and align them to your organization’s security roadmap.

Key Benefits Achieved

  • Insight on what skills your organization will need in the future.

Activities

Outputs

1.1

Understand the importance of aligning security initiatives skill needs with workforce requirements.

1.2

Identify needed skills for future initiatives.

  • Security Initiative Skills Guide
1.3

Prioritize the initiative skill gaps.

  • Skills Gap Prioritization Tool

Module 2: Define Technical Skill Requirements

The Purpose

  • Identify and create technical skill requirements for key work roles that are needed to successfully execute future initiatives.

Key Benefits Achieved

  • Increased understanding of the NICE Cybersecurity Workforce Framework.
  • Standardization of technical skill requirements of current and future work roles.

Activities

Outputs

2.1

Assign work roles to the needs of your future environment.

  • Skills Gap Prioritization Tool
2.2

Discuss the NICE Cybersecurity Workforce Framework.

2.3

Develop technical skill requirements for current and future work roles.

  • Technical Skills Workbook
  • Current Workforce Skills Assessment

Module 3: Acquire Technical Skills

The Purpose

  • Assess your current workforce against their role’s skill requirements.
  • Discuss five key factors that aid acquiring skills.

Key Benefits Achieved

  • A method to acquire skills in future roles.

Activities

Outputs

3.1

Continue developing technical skill requirements for current and future work roles.

  • Technical Skills Workbook
  • Current Workforce Skills Assessment
3.2

Conduct Current Workforce Skills Assessment.

  • Current Workforce Skills Assessment
3.3

Discuss methods of acquiring skills.

  • Technical Skills Workbook
  • Current Workforce Skills Assessment
3.4

Develop a plan to acquire skills.

  • Technical Skills Workbook
  • Current Workforce Skills Assessment

Module 4: Plan to Execute Action Plan

The Purpose

  • Assist with communicating the state of the skill gap in your organization.

Key Benefits Achieved

  • Strategy on how to acquire skills needs of the organization.

Activities

Outputs

4.1

Review skills acquisition plan.

  • Technical Skills Workbook
4.2

Discuss training and certification opportunities for staff.

4.3

Discuss next steps for closing the skills gap.

4.4

Debrief.

Member Testimonials

Schedule Analyst Call

After each Info-Tech experience, we ask our members to quantify the real time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this Blueprint, and what our clients have to say.

Client

Experience

Impact

$ Saved

Days Saved

BWX TECHNOLOGIES, INC.

Guided Implementation

10/10

N/A

N/A