Professional Documents
Culture Documents
Ciso Foundations Cybersecurity Talent Strategies For Cisos
Ciso Foundations Cybersecurity Talent Strategies For Cisos
CISO Foundations:
Cybersecurity
Talent Strategies
for CISOs
4 October 2022
CISO Foundations: Cybersecurity Talent Strategies
for CISOs
Published 4 October 2022 - ID G00777437 - 8 min read
By Analyst(s): Cybersecurity Research Team
Initiatives: Cybersecurity Leadership
Analysis
Accelerated digital transformation of information and services has rendered many
organizations’ cybersecurity teams unable to handle increased demand for cybersecurity
services. Cybersecurity leaders are experiencing challenges with sourcing talent,
developing teams of skilled specialists, retaining talent, preparing for future talent
demands and improving cybersecurity leadership.
To address these challenges and achieve long-term strategic objectives, chief information
security officers (CISOs) should evolve their talent sourcing and development tactics. By
expanding cybersecurity talent pipelines and employing progressive team development
practices, cybersecurity leaders can meet demands for increased cybertalent, despite a
lack of conventionally qualified hires. CISOs should also anticipate emerging cyberthreats
and create new corresponding roles and skills training to address increased demand and
growing threats.
While preparing cyberteams using these core talent management strategies, CISOs must
simultaneously prioritize the development of their own critical leadership skills and
practices to enhance the effectiveness of their security functions.
Research Highlights
Some recommended content may not be available as part of your current Gartner
subscription.
For these reasons, CISOs should satisfy talent demands by sourcing staff from less
conventional channels. Look beyond external hiring and capitalize on hidden internal
talent pipelines. Build “unicorn” teams using noncybersecurity talent from other functions
to handle lower-level cybersecurity tasks; this will unburden overwhelmed specialists and
enable cybersecurity expertise to proliferate across business functions. Supplement
internal talent sourcing by expanding applicant pools to reach interested nonconventional
talent, prioritizing competencies and fit over restrictive education and industry experience
requirements. Finally, proactively identify and foster emerging cybersecurity leadership
talent in your existing team as a strategy to retain top cybersecurity talent and mitigate
the shortage of leaders.
■ Case Study Actionable CISO Succession Planning — Upgrade CISO succession plans
by identifying multiple qualified candidates to groom throughout your organization
(not just the cybersecurity function). Identify high-potential employees (HIPOs) by
evaluating generalizable criteria such as motivation, performance, growth, company
values and technical knowledge.
■ Leadership Vision for 2022: Security and Risk Management — Discover how
cybersecurity leaders are navigating key challenges and setting priorities for 2022.
Cybersecurity leaders must deliver value to the business to be fully effective in their
role. Consequently, they are increasingly focusing on:
■ Customer concerns.
Report Roadmap
Cybersecurity Trends: Optimize IT Roadmap for Cybersecurity
for Resilience and Performance Create a resilient, scalable and agile
Use this report to equip your cybersecurity cybersecurity strategy.
function for greater resilience.
eBook Webinar
Leadership Vision for Security Strengthen Your Cybersecurity
and Risk Management Leaders Leadership to Navigate Evolving
Explore the top 3 strategic priorities for Security Landscape
security and risk management leaders. Explore this five-part series for insights
into the evolving landscape.
Already a client?
Get access to even more resources in your client portal. Log In
Connect With Us
Get actionable, objective insight to deliver on your mission-critical
priorities. Our expert guidance and tools enable faster, smarter
decisions and stronger performance. Contact us to become a client:
Become a Client
© 2024 Gartner, Inc. and/or its affiliates. All rights reserved. CM_GTS_2971747