Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Security icon

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

Systematically source the skills your organization needs.

Unlock a Free Sample

View Storyboard

Solution Set Storyboard Thumbnail


  • Amanda Bluett, Head of Cyber Defence and Assurance, CBRE
  • Eldon Sprickerhoff, Chief Innovation Officer, eSentire, Inc.
  • Anja Adam, Manager of Information Security –IT Risk & Compliance, De Lage Landen International B.V.
  • One anonymous contributor

Your Challenge

  • The demand for qualified cybersecurity professionals far exceeds supply. As a result, organizations are struggling to protect their data against the evolving threat landscape.
  • It is a constant challenge to know what skills will be needed in the future, and when and how to acquire them.

Our Advice

Critical Insight

  • Plan for the inevitable. All industries are expected to be affected by the talent gap in the coming years. Plan ahead to address your organization’s future needs.
  • Base skills acquisition decisions on the five key factors to define skill needs. Create an impact scale for the five key factors (data criticality, durability, availability, urgency, and frequency) that reflects your organizational strategy, initiatives, and pressures.
  • A skills gap will always exist to some degree. The threat landscape is constantly changing, and your workforce’s skill sets must evolve as well.

Impact and Result

  • Organizations must align their security initiatives to talent requirements such that business objectives are achieved and the business is cyber ready.
  • Decide how you’ll acquire needed skills based on characteristics of need for each skill.

Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should develop a technical skills acquisition strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

2. Develop a sourcing plan

Acquire skills based on the impact of the five key factors.

Guided Implementations

This guided implementation is a four call advisory process.

Guided Implementation #1 - Identify skill needs for target state

Call #1 - Understand the importance of aligning security roadmap skill needs to workforce requirements, and define security initiatives, impact rating scale, and skill needs.
Call #2 - Align role requirements with future initiative skill needs.

Guided Implementation #2 - Develop a skills sourcing plan

Call #1 - Understand and define the factors that influence the skills sourcing plan, and discuss options for sourcing skills.
Call #2 - Score key factors against needed skill, and determine how to source a skill.