• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechTech

Cyber security’s ever-growing brain drain

By
Peter Suciu
Peter Suciu
Down Arrow Button Icon
By
Peter Suciu
Peter Suciu
Down Arrow Button Icon
September 9, 2015, 12:14 PM ET
FireEye information analyst works in front of a screen showing a near real-time map tracking cyber threats at the FireEye office in Milpitas, California
A FireEye information analyst works in front of a screen showing a near real-time map tracking cyber threats at the FireEye office in Milpitas, California, December 29, 2014. FireEye is the security firm hired by Sony to investigate last month's cyberattack against Sony Pictures. Picture taken December 29. REUTERS/Beck Diefenbach (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) - RTR4JTQCPhotograph by Beck Diefenbach — Reuters

Good help is increasingly hard to find. For proof, just watch the cyber security industry, where it may soon be impossible to fill all the jobs that need to be staffed. And though this isn’t a new problem for the space, it’s one that’s poised to get much worse in years to come.

For instance, three years ago Symantec (“SYMC”) CEO Michael Brown warned that the United States faced an impending shortage of cyber security professionals and predicted there’d be a shortfall by this year. This past June, he updated his forecast, suggesting that the demand for security professionals could reach six million people globally by 2019, with nearly 1.5 million new positions that would need to be filled.

These numbers are in-line with Cisco’s 2014 Annual Security Report, which warned that there are nearly one million openings worldwide for security pros. In March, data from Boston-based labor analytics firm Burning Glass released also reported that cyber security jobs grew 74 percent from 2007 to 2013—more than twice the growth rate of all IT jobs.

While that means there could be plenty of well-paying jobs out there, there’s also a labor pool that doesn’t have enough qualified individuals to fill them, let alone address needs in the coming years.

The demand is already apparent in salaries. According to research from Robert Half Technology (“RHI”) the average IT starting salary was expected to raise by 5.7 percent for 2015, while five-out-of-six security positions were expected to see larger-than-average bumps in starting pay this year.

Higher starting salaries may incentivize students towards cyber security jobs, but they won’t solve the longer-term problem. Instead, closing the cyber security gap requires more drastic measures, like ensuring there’s enough high-quality education available, and encouraging students to pursue cyber security courses and degrees.

This is something the National Security Agency (NSA), the Department of Homeland Security, and the National Science Foundation has worked on this for over a decade, says Steven LaFountain, dean of the College of Cyber at the NSA. “The Centers of Academic Excellence in Information Assurance/Cyber Defense and related programs have helped drive increases in capacity and quality of cyber security education at all college levels,” he says.

But college may be too late. While America’s youth have become rather tech savvy thanks to ever-present mobile phones, tablet devices and video games, K-12 students are behind other nations according to a Pew Research Center report. It seems that the use of these mobile devices are not instilling any skills.

“Substantial growth in the number of middle and high school students who study cyber security and then continue onto cyber security careers will require outreach and incentives from industry, government, and academic organizations,” says LaFountain.

Specifically, the U.S. needs to push STEM education while actively trying to generate more early interest in computer science in middle and high school students. STEM education may be crucial in addressing the future requirements, but not every cyber security job may require such a deep technical understanding of computer science. A basic understanding of STEM disciplines will still be required for jobs in policy, oversight and compliance—yet the majority of the higher paying jobs will still require various levels of technical depth.

In the meantime, the higher pay being used to attract today’s college students may be causing a problem with workers already in the industry. Chasing the ever-climbing pay, many security pros jump from job to job, a problem that leaves new gaps to fill in the positions they vacated.

“Many of these jobs require certain types of certification, and many of the positions require at least an associates or bachelors degree,” says Rodney Peterson, lead for the National Initiative for Cybersecurity Education at the National Institute for Standards and Technology. In addition, many security positions require experience in the three to five year range, he says, and 83 percent of the jobs actually require three or more years on the job. These barriers make it hard to keep up with the demand.

“Just count the number of news stories this year regarding security breaches,” says Professor Clifford Neuman, director of the USC Center for Computer Systems Security. Every time there’s a hack, a large number of well-trained cyber security staffers are needed to perform forensic analysis to determine what has been breached; to patch and repair the systems so that the vulnerability does not persist; and to deploy new security technologies to prevent similar break-ins from occurring, says Neuman. There are not enough experts to keep up.

Making this cycle worse is that it’s just in response to breaches—it doesn’t even cover the staffing needs for designing systems with improved security in mind. “All development needs to be performed by teams that have core members who have been trained in security,” Neuman says. “That rarely happens, in part because there is a shortage of trained individuals, and because they are so highly in-demand to respond to attacks.”

And so for now, the cyber security industry hopes and waits as education races to help the field catch up.

“Throughout the country, faculty are increasingly adding discussion of security into existing curricula from computer networking classes, operating systems, and software engineering,” says Neuman. “These changes need to continue…. The demand for these skills is increasing enrollments in these programs, but the demand will continue to grow as business computing increasingly moves toward the cloud.” In other words, when it comes to cyber security staffing, enough may not be enough.

Learn how to navigate and strengthen trust in your business with The Trust Factor, a weekly newsletter examining what leaders need to succeed. Sign up here.

About the Author
By Peter Suciu
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

hacking
CybersecurityHacking
Student hackers get revenge on final exams as ‘ShinyHunters’ takes down nearly 9,000 schools study software
By Heather Hollingsworth and The Associated PressMay 8, 2026
9 minutes ago
Michael Saylor says remarks about selling Bitcoin were intended to jam short-sellers and ‘haters’ 
CryptoBitcoin
Michael Saylor says remarks about selling Bitcoin were intended to jam short-sellers and ‘haters’ 
By Ben WeissMay 8, 2026
20 minutes ago
Apple promised a smarter Siri, but a lawsuit says it didn’t deliver—and you can get up to $95 back
LawApple
Apple promised a smarter Siri, but a lawsuit says it didn’t deliver—and you can get up to $95 back
By Catherina GioinoMay 8, 2026
24 minutes ago
Fortune 500 Power Moves: Which executives gained and lost power this week
C-SuiteFortune 500 Power Moves
Fortune 500 Power Moves: Which executives gained and lost power this week
By Fortune EditorsMay 8, 2026
40 minutes ago
Tired hispanic man in a professional suit feeling sad while waiting for the appointment of a job interview at a recruitment office
EconomyJobs
The job market is healing for everyone—except in the office
By Eva RoytburgMay 8, 2026
1 hour ago
Anthropic grew 80-fold in a single quarter. Now it’s renting Elon Musk’s data center to cope
AIAnthropic
Anthropic grew 80-fold in a single quarter. Now it’s renting Elon Musk’s data center to cope
By Marco Quiroz-GutierrezMay 8, 2026
1 hour ago

Most Popular

California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
North America
California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
By Sasha RogelbergMay 7, 2026
20 hours ago
U.S. Treasury will have to borrow $2 trillion this year just to continue functioning—more than $166 billion every month
Economy
U.S. Treasury will have to borrow $2 trillion this year just to continue functioning—more than $166 billion every month
By Eleanor PringleMay 7, 2026
1 day ago
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
Arts & Entertainment
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
By Dave Lozo and Morning BrewMay 7, 2026
21 hours ago
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
Magazine
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
By Sharon GoldmanMay 6, 2026
2 days ago
Current price of oil as of May 7, 2026
Personal Finance
Current price of oil as of May 7, 2026
By Joseph HostetlerMay 7, 2026
1 day ago
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
Success
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
By Emma BurleighMay 7, 2026
1 day ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.