AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Soft skills: an ongoing challenge for the cybersecurity sector

Challenges and opportunities for cybersecurity professionals in the digitally advanced job market

A new report from ISACA highlights gaps in cybersecurity professionals, such as interpersonal skills, cloud computing and security measures. There are shortages of specialized personnel and difficulties in retaining talent. The most sought after skills are identity and access management, cloud computing, data protection, incident response and DevSecOps.

This pill is also available in Italian language

New research in the field of cybersecurity highlights gaps in cybersecurity professionals, focusing attention on interpersonal skills, cloud computing and security measures as the biggest skill gaps for cybersecurity specialists, according to a new report from the ISACA.

Difficulty in managing personnel specialized in IT security

59% of cybersecurity leaders say they have a staffing shortage on their team. 50% of respondents indicated there were open positions for advanced roles, compared to 21% who had open positions for entry-level roles.

Challenges in retaining cybersecurity talent continue

While progress has been made in improving employee retention rates, it will continue to be a difficult undertaking. Fifty-six percent of cybersecurity leaders say they have difficulty retaining qualified cybersecurity professionals, although this percentage is down four points from last year.

The skills most requested by companies in the field of IT security

When hiring, employers say they are looking for the following top five technical skills in cybersecurity professionals: identity and access management (49%), cloud computing (48%), data protection (44%), incident response (44%) and DevSecOps (36%).

Follow us on Google News for more pills like this

10/05/2023 07:32

Marco Verro

Last pills

Serious vulnerability discovered in AMD CPUs: invisible malware riskCritical flaws put AMD CPUs at risk: how hackers can gain stealth, persistent access to your systems

Shocking discovery in the world of browsers: a backdoor that has been exploited for 18 yearsHackers able to access private networks via backdoors in major web browsers

AI Act: new rules that will change the future of technologyNew rules for artificial intelligence: how the AI Act will change the technological and industrial landscape in Europe. Discover the challenges, opportunities and importance of international cooper...

Digital chaos: global connection issues hit Azure and Microsoft 365Microsoft's cloud services in haywire: here's what's happening and how the company is responding