SBN

The Best Cybersecurity Camps for Kids in 2019

Introduction

As we all know, the cybersecurity threat landscape is rapidly changing, and the need for highly-trained individuals is always growing. But despite this huge demand, there is actually a severe shortage of workers in the cybersecurity industry. In fact, a recent survey conducted by (ISC)2 reveals the following:

  • The cybersecurity worker shortage is quite severe: in fact, it is estimated that the lack of trained professionals is almost at 4 million
  • The Asia-Pacific region has the highest shortage of workers, with a need at well over 2 million cybersecurity specialists (a primary cause of this has been the recent passage of security-related legislations and mandates in those areas)
  • North America is also facing a shortage, at close to 500,000 needed professionals
  • The EMEA region needs at least 142,000 professionals
  • The Latin American countries have a current demand for 136,000 skilled workers
  • Overall, 63% of the respondents claimed that their IT security teams are understaffed
  • 59% of the respondents also believed that business/corporation that they work for are not all prepared to handle a cyber-attack, primarily because of the lack of trained professionals

One interesting finding is that once an individual has secured a position in cybersecurity, they seem to be quite happy in their current roles. For example, well over 68% of the respondents felt either satisfied or very satisfied with their current cybersecurity job status.

But if demand is so high for cybersecurity workers and the workers who attain their jobs seem happy with being in the industry, why is there still this severe shortage? The following reasons were cited in this survey as well:

  • 34% of the respondents claimed that it is unclear how to get a first job in cybersecurity
  • 32% of the respondents felt that the needed skill sets are not communicated in a (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Chris Sienko. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/ZIwwkUuZ1Ig/