Industry Coverage icon

Addressing the Cybersecurity Talent Shortage in Government

The role of culture, workforce development strategy, and AI in maturing security programs within federal government departments and agencies.

Unlock a Free Sample

Getting the whole organization on board is a challenge, even as the need to deliver more digitally increases the risk of cyberattacks.

Cyber resilience suffers due to:

  • Inability to retain/hire cybersecurity talent.
  • Lack of modern technology and skilled workforce.
  • Not leveraging digital technology (e.g. AI to assist with cyber resilience efforts).
  • Lack of government investment in cyber technology, cyber products, and cyber workforce development.

Our Advice

Critical Insight

A comprehensive cybersecurity workforce development strategy addresses the inability to hire staff with the desired skills. Define the skills gap in your cyber workforce and build a development plan that includes strategies that fully empower skilled employees to resist cyber threats.

Impact and Result

Digital transformation introduces challenges and opportunities. Info-Tech’s approach involves three elements:

  • Create a cybersecurity culture: Cyber resilience is everybody’s responsibility.
  • Implement a cybersecurity workforce development strategy and hire the right people with the right cyber skills.
  • Harness artificial intelligence to assist with recruitment and threat detection and response.

Addressing the Cybersecurity Talent Shortage in Government Research & Tools

1. Addressing the Cybersecurity Talent Shortage in Government Storyboard – A step-by-step guide that enables federal government departments and agencies to enhance their ability to retain cybersecurity professionals.

Government departments and agencies can use the suggested steps in this research to improve their ability to attract and retain cybersecurity professionals, even in the face of stiff competition from the private sector. By doing so, they can better protect sensitive information and systems and enhance national security.

Unlock a Free Sample

Addressing the Cybersecurity Talent Shortage in Government

The role of culture, workforce development strategy, and AI in maturing security programs within federal government departments and agencies.

Analyst Perspective

Governments are increasingly at risk from cyberattacks as they become more digital, requiring them to take proactive measures to enhance their cyber resilience. A common challenge is getting the entire organization on board with cybersecurity measures. This can result in insufficient understanding of strategies and technology, as well as difficulty in maintaining a skilled and engaged workforce.

To address this challenge, Info-Tech suggests a three-pronged approach. First, governments should foster a culture of accountability and collaboration throughout the organization to create a shared responsibility for cybersecurity. Second, governments should implement a comprehensive cyber workforce strategy that includes acquiring individuals with the necessary skills and expertise and investing in innovative training programs and educational partnerships. Third, governments must invest in advanced technologies such as AI and machine learning, to detect threats more quickly and accurately.

Paul Chernousov
Research Director, Industry
Info-Tech Research Group

Executive Summary

Your Challenge Common Obstacles Info-Tech’s Approach

Governments are becoming increasingly digital, leading to increasingly diverse cyberattack scenarios.

Cyberattacks are becoming more prevalent and creating serious consequences for government departments and agencies.

Cyberattacks impact governments, businesses, and individuals, by compromising critical infrastructure; disrupting essential services, power, and communication systems; and potentially leaving people without access to the resources they need.

Your government needs to take proactive steps to address these threats and protect citizens from the potentially devastating digital and real-world impacts.

Getting the whole organization on board as the need to deliver more digitally increases the risk of cyberattacks.

Cyber resilience suffers due to:

  • The inability to retain/hire cybersecurity talent.
  • Lack of modern technology and skilled workforce.
  • Not leveraging digital technology (e.g. AI to assist with cyber resilience efforts).
  • Lack of government investment in technology, cyber products, and cyber workforce development.

Digital transformation introduces challenges and opportunities. Info-Tech’s approach involves three elements:

  1. Create a cybersecurity culture: Cyber resilience is everybody’s responsibility.
  2. Implement a cybersecurity workforce development strategy and hire the right people with the right cyber skills.
  3. Harness artificial intelligence to assist with recruitment and threat detection and response.

Info-Tech Insight
A comprehensive cybersecurity workforce development strategy addresses the inability to hire staff with the desired skills. Define the skills gap in your cyber workforce and build a development plan that includes strategies that fully empower skilled employees to resist cyberthreats.

We are in an increasingly vulnerable digital world

Digital transformation often introduces new digital risks for an organization to manage.

95% Percentage of cybersecurity issues that can be traced to human error.

43% Percentage of cybersecurity breaches or infractions represented by insider threats, either intentional or accidental.

Source: GlobeNewsWire, 2021; World Economic Forum, 2022.

Potential workforce risks enabled by digital transformation:

  • New digital identity governance and threat-monitoring challenges
  • Cultural and behavioral changes
  • Lack of skills availability
  • More sophisticated threat actors

Info-Tech Insight
Digital transformation presents new workforce risks, such as cyberthreats and challenges associated with distributed workforce. Organizations need to proactively address these risks to ensure a successful digital transformation at all levels.

Digital transformation enables improved outcomes

Digital technologies are integrated into all aspects of public sector operations, fundamentally changing the way services are delivered and how value is provided to citizens. This transformation also involves a cultural shift, as government departments and agencies need to continually challenge traditional processes, experiment, and adapt to new ways of working.

Digital citizen experience
Enhancing citizen interactions and satisfaction by leveraging digital technologies to provide seamless, personalized, and data-driven experiences in accessing government services.
Examples: Online portals for tax filing, mobile applications for reporting civic issues, and chatbots for addressing public queries.

Operational efficiency
Streamlining and automating government processes to improve productivity, reduce costs, and optimize resource use.
Examples: Implementing cloud-based systems for interagency collaboration and using predictive analytics to optimize public service delivery.

Policy and service innovation
<>Adapting or creating new policies and services that leverage digital technologies to deliver value in new ways or to better address citizen needs.
Examples: Implementing digital identity solutions, using open data platforms to improve transparency, and leveraging data-driven insights to inform policy decisions.

Workforce enablement
Empowering public sector employees with the right digital tools, skills, and mindset to adapt to the evolving work environment and contribute effectively to the government's digital transformation journey.
Examples: Providing digital skills training, implementing collaboration tools (e.g. Slack, Microsoft Teams), and promoting a culture of continuous learning and innovation.

Data and analytics
Leveraging data-driven insights to inform decision-making, optimize processes, and drive innovation across government organizations.
Examples: Applying machine learning algorithms to predict citizen behavior, using big data analytics to identify social trends, and employing real-time data monitoring to optimize resource allocation.

Digital security
Implementing robust cybersecurity measures to protect government digital assets, citizen data, and overall digital infrastructure.
Examples: Deploying AI-based threat detection systems, establishing secure data storage and encryption protocols, and conducting regular security audits and training.

Digital transformation is also creating new attack surfaces

Digital transformation is introducing new technologies, systems, and processes to government departments and agencies, leading to the following obstacles:

01
Expanded digital landscape and cyberthreats
Digital transformation in government involves the integration of new technologies, systems, and processes that lead to an increased exposure to cyberthreats. These include malware, ransomware, and other forms of cybercrime.

02
Cultivating a cybersecurity-aware culture
New challenges make it essential for governmental departments and agencies to foster a culture of cybersecurity awareness within their workforce. This includes providing regular training and promoting a shared responsibility to maintain digital security.

03
Addressing the cybersecurity talent gap
The growing complexity of cyberthreats necessitates a skilled cybersecurity workforce in government. However, a shortage of cybersecurity talent makes it challenging to effectively combat these threats and safeguard digital infrastructure.

04
Enhancing cyber resilience and security
To mitigate the risks of cyberthreats, government departments and agencies must prioritize the creation of robust cybersecurity strategies, invest in employee training, and collaborate with external parties to enhance their cyber defense capabilities.

Digital threats are coming from various actors

Threats to cybersecurity can come from a multitude of sources. One common source is email phishing scams, where attackers send fraudulent emails designed to trick recipients into revealing sensitive information or downloading malicious software.

Other sources of digital threats include unsecured networks and devices, malicious software downloads, and social engineering attacks. It is important for individuals and organizations to stay vigilant and educated about these threats to protect their sensitive information and assets.

The nature of cybersecurity risks is changing

Remote/Hybrid workers

Traditional security models rely on perimeter-based defenses that assume everything within the network is trustworthy. This can be an issue since threats can originate from within that network.

Traditional security measures such as firewalls, antivirus, and intrusion detection systems may not be sufficient against increasingly sophisticated cyberthreats.

The attack surface is becoming more complex

The adoption of new and emerging technologies, such as automation and digital transformation concepts, introduces additional vulnerability at all organizational levels.

The complexity of the attack surface can make it difficult for organizations to identify and mitigate all potential vulnerabilities, increasing the risk of successful cyberattacks.

Automation brings additional cybersecurity risks

Automation has led to several types of cybersecurity attack

DDoS Wipers Espionage Disinformation
Distributed Denial of Service (DDoS) attacks are a cyberattack from multiple remote locations intended to cripple an organization’s online operations. Wiper attacks are a type of cyberattack that destroys data on infected machines. Cyber espionage is a type of cyberattack committed against a rival business or governmental organization with the goal of obtaining sensitive information. Disinformation refers to false information that is spread with the specific intent of misleading or deceiving people. It is sometimes confused with misinformation. Misinformation is defined as false information but is not deliberate.

Cisco Ransomware Attack

On the same day that the Yanluowang ransomware group published a partial list of files it says were stolen from Cisco, the networking giant's Talos Intelligence Group confirmed that Cisco had, indeed, been hacked. Cisco said the initial access vector was through the successful phishing of an employee’s personal Google account, which ultimately compromised their credentials and led to access to the Cisco VPN.

WannaCry Ransomware

In 2017, the WannaCry ransomware attack affected hundreds of thousands of computers in over 150 countries. The attack exploited a vulnerability in Microsoft's Windows operating system, and it was able to spread quickly due to the widespread use of automated systems and tools. Several government agencies and organizations, including the UK's National Health Service, were impacted by the attack.

The role of culture, workforce development strategy, and AI in maturing security programs within federal government departments and agencies.

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Authors

Patrick Spencer

Paul Chernousov

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019