Podcast Summary: "Is the Cyber Talent Ecosystem Broken? [CISO Perspectives]"
Podcast Information:
- Title: CyberWire Daily
- Host/Author: N2K Networks
- Episode: Is the cyber talent ecosystem broken? [CISO Perspectives]
- Release Date: April 17, 2025
Introduction
In the April 17, 2025 episode of "CISO Perspectives," hosted by Kim Jones, the discussion centers around the persistent challenges within the cybersecurity talent ecosystem. The episode delves deeply into why the current approaches to recruiting and developing cybersecurity professionals are failing and explores actionable solutions to bridge the talent gap.
Understanding the Broken Cyber Talent Ecosystem
Kim Jones sets the stage by highlighting the multifaceted issues that Chief Information Security Officers (CISOs) face daily. Unlike superficial discussions often found at conferences or informal gatherings, this episode aims to dissect the problems comprehensively over multiple segments.
"There are more than a handful of complex issues and challenges, technological and otherwise, that plague the average CISO," [01:09].
Key Challenges Identified:
-
Misaligned Job Descriptions: Companies frequently post job requirements that don't align with actual job responsibilities. For instance, demanding a CISSP certification for entry-level positions with only two years of experience is more common than desired.
"Asking, for example, for a CISSP certification from someone with only two years of experience is more common than we would like to admit," [09:30].
-
Ineffective Educational Programs: Despite universities adding cybersecurity curricula, industry professionals criticize these programs for being too theoretical and not providing practical, real-world experience.
"We say we want real-world experience, but in fact, we want targeted real-world experience," [10:00].
-
Lack of Structured Internship and Apprenticeship Programs: There's a notable reluctance to develop and support internship programs, leading to insufficient hands-on training for newcomers.
-
Overemphasis on Traditional Degrees: Job postings often require four-year degrees, even as alternative pathways focusing on experience are encouraged.
-
Fragmented Hiring Criteria: With over 400 different responses from CISOs about entry-level requirements, there's a clear lack of standardization, causing confusion and inefficiency in the hiring process.
"If you ask 50 CISOs, the same question. You'll get 400 and something answers," [27:14].
Impact of Talent Shortage: The cybersecurity field is projected to grow by 32% by 2032, yet up to 500,000 positions in the US may remain unfilled. This significant gap underscores the urgency of addressing the systemic issues within the talent ecosystem.
"We have met the enemy and he is us," [12:30] – quoting Walt Kelly to emphasize internal industry flaws as primary obstacles.
Proposed Solutions to Remedy the Talent Gap
Kim Jones offers two primary solutions to tackle the entrenched issues within the cybersecurity talent ecosystem:
-
End the Search for 'Unicorns': Companies should shift their focus from seeking the perfect candidate—a "purple unicorn"—to nurturing and developing a reliable and skilled workforce.
"Purple unicorns do not exist. If you're just looking for purple unicorns, you are exacerbating the problem," [13:00].
-
Standardize Knowledge, Skills, Abilities, and Experience (KSAEs): Adopting established frameworks like the NICE Cybersecurity Workforce Framework can create consistency in job descriptions and hiring criteria, making the recruitment process more efficient and transparent.
"It would be incredibly useful for the profession to truly adopt these standards and mandate that all job descriptions conform to these requirements," [14:15].
In-Depth Interview with Ed Adams
To further explore these challenges, Kim Jones interviews Ed Adams, a seasoned cybersecurity professional with extensive experience in talent development.
Ed Adams on Cyber Talent Challenges
Adams shares his journey into cybersecurity, emphasizing the historical neglect of security within software quality discussions. He critiques the industry's overreliance on certifications and technical backgrounds, advocating instead for valuing teachability and diverse educational paths.
"The most common trait or characteristic that CISOs are looking for had nothing to do with any degree, any certification, or any experience... the ability to be taught," [27:52].
Key Insights from Ed Adams:
-
Underutilization of Existing Frameworks: While frameworks like the NICE Cybersecurity Workforce Framework exist, few organizations implement them effectively, leading to mismatched job descriptions and candidate expectations.
"The NICE framework is not perfect... but it's a great framework and if you were a hiring manager, why wouldn't you want to start there?" [16:51].
-
Communication Barriers with IT Teams: Cybersecurity professionals often struggle to communicate and collaborate with larger IT and development teams, hindering overall cybersecurity hygiene.
"We as cybersecurity professionals... lack the ability to effectively communicate to the very much larger IT and development teams... thus lifting all the boats by raising the tide," [18:25].
-
Alternative Pathways and Diversity: Adams emphasizes that a technical background isn't mandatory for a successful career in cybersecurity. Highlighting examples like Sharon Burgess, a CISO with a degree in Spanish, he advocates for diverse educational backgrounds.
"You don't need to have a technical background to have a successful career in cybersecurity. Full stop," [28:46].
-
Emerging Trends: Virtual CISOs: The rise of virtual CISO services, driven by retiring cybersecurity veterans, offers a flexible and cost-effective alternative for organizations. However, Adams warns of the potential for misuse and advises due diligence in selecting such services.
"There's a lot out there that are selling overselling, shall I say... you've got to do a little bit of due diligence to find the needles in the haystack," [32:32].
-
Leadership Challenges Among New Cyber Professionals: Technically adept cybersecurity professionals transitioning into leadership roles often struggle with business acumen and effective communication, leading to friction in organizational settings.
"They walk into a boardroom... and get blank stares, they get frustrated, and they walk away," [34:18].
Personal Reflections and Encouragement: Adams shares his own experiences of feeling like an imposter despite lacking traditional cybersecurity credentials, underscoring the importance of diverse skill sets and continuous learning.
"The first three words I wrote in that book is I'm an imposter... Yet I was able to forge a successful career in cybersecurity," [35:36].
Conclusion and Takeaways
The episode highlights the critical need for a standardized, inclusive, and pragmatic approach to building the cybersecurity workforce. By moving away from unrealistic hiring standards and embracing diverse educational and experiential backgrounds, the industry can effectively address the talent shortage and strengthen its defenses.
Kim Jones and Ed Adams emphasize that fostering a culture of collaboration, continuous learning, and clear communication is essential for the sustainability and growth of the cybersecurity field.
Notable Quotes:
- "Purple unicorns do not exist. If you're just looking for purple unicorns, you are exacerbating the problem." – Kim Jones [13:00]
- "The most common trait or characteristic that CISOs are looking for had nothing to do with any degree, any certification, or any experience... the ability to be taught." – Ed Adams [27:52]
- "You don't need to have a technical background to have a successful career in cybersecurity. Full stop." – Ed Adams [28:46]
This comprehensive summary encapsulates the essential discussions, insights, and conclusions from the episode, providing valuable information for those interested in the state and future of the cybersecurity talent ecosystem.
![Is the cyber talent ecosystem broken? [CISO Perspectives] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fbb0954ea-1bb2-11f0-88f0-ff396191dd08%2Fimage%2F4576c79a6260b29daaff0ea0480913c0.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1200&q=75)