Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.

Security icon

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

Systematically source the skills your organization needs.

  • The demand for qualified cybersecurity professionals far exceeds supply. As a result, organizations are struggling to protect their data against the evolving threat landscape.
  • It is a constant challenge to know what skills will be needed in the future, and when and how to acquire them.

Our Advice

Critical Insight

  • Plan for the inevitable. All industries are expected to be affected by the talent gap in the coming years. Plan ahead to address your organization’s future needs.
  • Base skills acquisition decisions on the five key factors to define skill needs. Create an impact scale for the five key factors (data criticality, durability, availability, urgency, and frequency) that reflects your organizational strategy, initiatives, and pressures.
  • A skills gap will always exist to some degree. The threat landscape is constantly changing, and your workforce’s skill sets must evolve as well.

Impact and Result

  • Organizations must align their security initiatives to talent requirements such that business objectives are achieved and the business is cyber ready.
  • Identify if there are skill gaps in your current workforce.
  • Decide how you’ll acquire needed skills based on characteristics of need for each skill.

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should develop a technical skills acquisition strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

3. Develop a sourcing plan for future work roles

Acquire skills based on the impact of the five key factors.

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 3-phase advisory process. You'll receive 5 touchpoints with our researchers, all included in your membership.

Guided Implementation 1: Identify skill needs for target state
  • Call 1: Define security roadmap skill needs.
  • Call 2: Prioritize and associate roles with the initiative skill gaps.

Guided Implementation 2: Identify technical skill gaps
  • Call 1: Align role requirements with future initiative skill needs.

Guided Implementation 3: Develop a skills sourcing plan for future work roles
  • Call 1: Understand and define the factors that influence the skills sourcing plan, and discuss options for sourcing skills.
  • Call 2: Score key factors against needed skill, and determine how to source a skill.

Author

Michelle Tran

Contributors

  • Amanda Bluett, Head of Cyber Defence and Assurance, CBRE
  • Eldon Sprickerhoff, Chief Innovation Officer, eSentire, Inc.
  • Anja Adam, Manager of Information Security – IT Risk & Compliance, De Lage Landen International B.V.
  • Four anonymous contributors
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019