Sign up
Sign up
Every year, ISC2 publishes a report on the global cybersecurity workforce. They recently published their 2023 edition, which, in addition to the normal survey stats, also covers timely topics around the impact of AI and the impact of the cooling economy on workplaces.
Each year, ISC2 reports a headline stat on the size of the global cybersecurity workforce and the ‘gap.’ Lots of people take this statistic and the headline of 3.5M open jobs from cybersecurity ventures. ISC2’s own figure is 4M (actually 3,999,964 which, by the way, is an absurd level of precision). Of this 4M, 520K are in the US (cited as a 20% YOY increase). Interestingly, ~2.5M of the gap is in Asia- presumably driven by extrapolations based on population.
I, personally, call BS on these stats.
I run a job board that does not proport to have a universal perspective on open jobs, but I do look at data scraped from 150 applicant tracking systems on cybersecurity job openings and then curate the jobs that show up on our site. Each week, we see a couple hundred new jobs populate and a few hundred leave, with an average time to fill of about 2-3 months.
Even if you assume coverage gaps in the data (which there are), this gets nowhere near a persistent gap of 500K jobs. Searching for cyber openings on Indeed, Linkedin, and aggregation sites such as google jobs yield quality results most in the low thousands (and many more jobs that are way wide of the mark). And since 500K is a ‘stock’ or run rate number, you’d expect to see roughly that balance of jobs open at any given time, with a much larger number ‘flowing’ through each year (as some jobs do get filled).
My sense is that ISC2 is coming under some degree of pressure for the stats, as this year they published this disclaimer in the body of the report:
It’s important to note what this year’s workforce gap represents. The workforce gap calculates the difference between the number of cybersecurity professionals that organizations require to properly secure themselves and the number of cybersecurity professionals available for hire. The workforce gap does not aim to estimate the actual current job market for cybersecurity professionals.
In previous years, the definition of demand was: Demand is defined as the number of cybersecurity jobs organizations would like to employ over the next year minus the number of current workers.
So, what we have is an estimate of what it would take to actually adequately secure the world. This raises the obvious question of how you define ‘properly secure.’ Additionally, it seems foolish to invalidate the choices that companies are actually making about their risk tolerance. Choosing not to post security roles is, explicitly or implicitly, a business decision.
So, I think we can definitively say that the gap is something much less than 500K jobs.
Nevertheless, we do operate in an industry where there are significant demand and supply imbalances. One of the best thinkers on this topic is Ben Rothke, who has written several pieces on Medium unpacking the topic.
He recently posted The big lie of millions of information security jobs (gated), which does a great job unpacking the issue. Previously, he posted Is there really an information security jobs crisis? Ben’s main points, which I agree with and I think we can definitively state:
The ISC2 report does have good data on where these skill gaps are most prominent:
Clearly, 2023 has been the most challenging year for the infosec space in probably the past two decades. On the tech vendor side, as companies and their backers (most often VCs) have sought to reduce cash burn and extend runway (most are unprofitable), employees got hit hard with layoffs.
On the practitioner side, you can divide that camp into services companies and enterprise. Many cybersecurity services business saw declines of 5-25% YOY in 2023, and had layoffs in line with that. In enterprise, the picture was more muted, with employees more likely to feel the impact of hiring freezes, slow rolling new hires, and caps on technology budgets. Relatively few security teams in enterprise were directly hit by layoffs this year.
Here’s the data from ISC2:
Regardless of the size of the talent shortfall, it is clear that there are important enterprise security tasks that are simply not getting done because the people aren’t there to do it. The data above shows just how overburdened many security teams are.
The things that tend not to get done are often the ones that are most proactive in nature, such as: regularly re-assessing risks and quantifying them, documenting process and procedure, clearing out backlogs of vulnerabilities, and team training and development.
Here’s what ISC2 found about what is not getting done:
Here are other stats from the report that are particularly interesting:
You can read the full report here. I’d love to hear your takeaways!