{"id":267361,"date":"2019-07-04T10:31:11","date_gmt":"2019-07-04T14:31:11","guid":{"rendered":"https:\/\/policyoptions.irpp.org\/issues\/the-critical-shortage-of-cybersecurity-expertise\/"},"modified":"2025-10-07T22:35:57","modified_gmt":"2025-10-08T02:35:57","slug":"the-critical-shortage-of-cybersecurity-expertise","status":"publish","type":"issues","link":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/","title":{"rendered":"The critical shortage of cybersecurity expertise"},"content":{"rendered":"<p class=\"dropcap-big\">For many Canadians, the world of cyberattacks and hackers still seems far removed from their day-to-day activities. Perception, however, does not always match reality.<\/p>\n<p>Anyone employed by a sizable business in the private or public sector works in a place where cybersecurity is taken very seriously. Organizations know that those who fail to adequately invest in this area risk becoming perennial targets for cybercriminals in search of personal or proprietary data, valuable R&amp;D information and more. They\u2019ve also witnessed the devastating impact such attacks can have, resulting in significant service disruptions or the exposure of sensitive data, and are willing to do what it takes to avoid becoming casualties themselves.<\/p>\n<p>Addressing these challenges requires the proper balance of technology, people and processes. As a result, cybersecurity expertise has become a must-have skill for most organizations. However, in seeking to bolster their cybersecurity posture, many organizations struggle to find the right talent to lead these initiatives. That\u2019s because our country faces a growing cybersecurity skills gap. <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/ca\/Documents\/risk\/ca-cyber-talent-campaign-report-pov-aoda-en.PDF\">Research<\/a> from Deloitte shows this lack of talent is being felt across corporate Canada and, unfortunately, it is more than a temporary issue. Critical roles are going unfilled, and it\u2019s expected that organizations across Canada will need to fill an estimated <a href=\"https:\/\/www.theglobeandmail.com\/business\/commentary\/article-how-canada-can-close-the-cybersecurity-talent-gap\/\">8,000<\/a> additional cybersecurity positions by 2021.<\/p>\n<p><strong>The challenge of the cybersecurity skills gap<\/strong><\/p>\n<p>Several factors have combined to get us here. First, the skill sets required for cybersecurity positions are evolving at such a speed that organizations are struggling just to keep pace. Chief information security officers used to be able to hire people with basic technical security skills and backgrounds, give them a quick security primer and largely call it a day.<\/p>\n<p>Today, companies are embarking on a digital transformation strategy in a bid to run more efficiently and meet changing customer demand. As a result, they are running a variety of environments, such as <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/cloud-security.html\">multi-cloud networks<\/a> or <a href=\"https:\/\/www.fortinet.com\/blog\/business-and-technology\/extend-security-with-secure-sd-branch.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+fortinet%2Fblogs+%28Fortinet+All+Blogs%29\">next-gen branches<\/a>, which can expose their networks to potential attacks on more fronts, and sometimes these companies don\u2019t even know where they are vulnerable. What is needed is specialized skill sets. General IT and security skills are still important, but they have quickly become outdated as the threat landscape evolves and networks expand.<\/p>\n<p>Amid all this, organizations must contend with new and evolving Canadian security regulations while juggling a wide array of security tools they have accumulated over the years.<\/p>\n<p>The result: Canada is in need of seasoned security people who are also well-versed in research, strategy, communication and data science, and they need to be able to apply these skills to new environments and ecosystems.<\/p>\n<p>The answer would seem to be better education, but most of our universities and other educational institutions are failing to train students in cybersecurity necessities. Ironically, according to Deloitte, this is due in part to the same challenge facing businesses: not enough capable cybersecurity professionals are available to educate the next generation of security experts.<\/p>\n<p>Additionally, due to rapidly changing technologies, schools are struggling to keep their curriculums up to date \u2014 so much so that some experts are concerned that the skills taught in school will soon be so far behind as to be functionally obsolete.<\/p>\n<p><strong>Bridging the skills gap<\/strong><\/p>\n<p>If we\u2019re ever going to bridge the skills gap, we need urgent attention from \u2013 and collaboration among \u2013 government agencies, the private sector and academic institutions. Specifically, they must put aside the tendency to compete and instead work together to focus on <a href=\"https:\/\/www.fortinet.com\/blog\/industry-trends\/why-education-and-training-are-essential-for-closing-the-cyberse.html?utm_source=blog&amp;utm_campaign=2019-q1-skills-gap\">training and education<\/a>, combined with actively developing an apprenticeship and mentoring infrastructure that is necessary to bring up the next generation of cybersecurity professionals.<\/p>\n<p>Training and education might sound the same, but they entail different curriculums. And they must work hand in hand to close the gap.<\/p>\n<p><strong>Education<\/strong><\/p>\n<p>Education focuses on knowledge of threats that exist in the \u201cwild\u201d \u2013 the real world rather than in computer testing systems \u2013 along with skills and strategies to minimize them. It focuses broadly on security; training focuses on a particular security product. Education is as much about learning how to see and solve security challenges as it is about becoming familiar with a set of technologies.<\/p>\n<p>And it\u2019s here where organizations and academia can work together to overcome challenges surrounding competition and evolving curriculums. For example, <a href=\"https:\/\/www.fortinet.com\/support-and-training\/training\/fortinet-network-security-academy.html?utm_source=blog&amp;utm_campaign=2018-fnsa-program\">Fortinet\u2019s Network Security Academy<\/a> has worked to design a curriculum for schools that can be incorporated into a multi-year program. Organizations can also take a more active role in academia, as security companies are starting to do in schools across Canada.<\/p>\n<p>Additionally, cybersecurity experts and companies must work with independent organizations such as standards-setting bodies to establish cybersecurity competencies, job roles and responsibilities and professional certifications that are recognizable, verifiable and portable across companies. This will not only provide a critical benchmark for HR recruiters but will also be very useful for those seeking to join the cybersecurity profession.<\/p>\n<p><strong>Training<\/strong><\/p>\n<p>There should also be a greater focus on training general IT professionals in specific security products and strategies. This approach is particularly useful for people already working in technical professions who might not be focused on cybersecurity, to help them become more involved in these roles. This is an effective way to give motivated people the hands-on experience they need in configuring and troubleshooting security controls while learning how to quickly respond to security incidents. Further, training in specific security products can provide insight into how security teams can leverage technology during an incident response.<\/p>\n<p><strong>Looking ahead<\/strong><\/p>\n<p>Finally, we must look ahead. Cybersecurity organizations are increasingly incorporating machine learning and automation into their tools to respond to threats in real time. It\u2019s also a way to reduce the number of personnel required to run an effective security operation. Training with these cutting- edge tools, and keeping an eye on the next generation of technologies and strategies that are around the corner, such as artificial intelligence (AI), enables IT teams to understand how to leverage new solutions to augment existing security practices. By using automated systems to set up or remove users, analyze access logs or handle other mundane tasks, for example, organizations can allow their experts to focus on higher-order analysis, enabling them to be more efficient and effective.<\/p>\n<p>As long as competition exists between companies, agencies and schools, the cybersecurity skills gap will continue to plague organizations in Canada and around the world. When we establish real working partnerships, the proper resources and objectives can be put in place, giving us the opportunity to become a model for the rest of the world and show what\u2019s possible when all stakeholders come together for a common goal. For the good of our economy and the well-being of our citizens, it\u2019s a mission we need to undertake, and soon.<\/p>\n<p><span class=\"image-caption\">Photo: Shutterstock, b<span lang=\"EN-US\" style=\"font-family: 'inherit',serif; color: #666666;\">y\u00a0<\/span><span lang=\"EN-US\"><a href=\"https:\/\/www.shutterstock.com\/g\/ranjith+ravindran\"><span style=\"font-family: 'inherit',serif; color: #298aae;\">ranjith ravindran<\/span><\/a><\/span><\/span><\/p>\n<hr \/>\n<p><em>Do you have something to say about the article you just read? Be part of the\u00a0<\/em>Policy Options<em>\u00a0discussion, and send in your own submission.\u00a0Here is a\u00a0<\/em><a href=\"https:\/\/policyoptions.irpp.org\/article-submission\/\"><em>link<\/em><\/a><em>\u00a0on how to do it. <\/em><em>|\u00a0Souhaitez-vous r\u00e9agir \u00e0 cet article ? <\/em><em>Joignez-vous aux d\u00e9bats d\u2019<\/em>Options politiques\u00a0<em>et soumettez-nous votre texte en suivant ces\u00a0<\/em><a href=\"https:\/\/policyoptions.irpp.org\/fr\/article-submission\/\"><em>directives<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For many Canadians, the world of cyberattacks and hackers still seems far removed from their day-to-day activities. Perception, however, does not always match reality. Anyone employed by a sizable business in the private or public sector works in a place where cybersecurity is taken very seriously. Organizations know that those who fail to adequately invest [&hellip;]<\/p>\n","protected":false},"featured_media":276000,"template":"","meta":{"_acf_changed":false,"content-type":"","ep_exclude_from_search":false,"apple_news_api_created_at":"2025-10-08T02:35:59Z","apple_news_api_id":"da831312-5c67-4749-9563-af1c6d3b95d6","apple_news_api_modified_at":"2025-10-08T02:35:59Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/A2oMTElxnR0mVY68cbTuV1g","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false},"categories":[9379,9372,9383],"tags":[8377,8547],"article-status":[],"irpp-category":[4209,4337,4266],"section":[],"irpp-tag":[7173,7102],"class_list":["post-267361","issues","type-issues","status-publish","has-post-thumbnail","hentry","category-education","category-recent-stories-fr","category-sciences-et-technologies","tag-skills-fr","tag-cybersecurite-fr","irpp-category-education","irpp-category-science-et-technologie","irpp-category-travail","irpp-tag-competences","irpp-tag-cybersecurite"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The critical shortage of cybersecurity expertise<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The critical shortage of cybersecurity expertise\" \/>\n<meta property=\"og:description\" content=\"For many Canadians, the world of cyberattacks and hackers still seems far removed from their day-to-day activities. Perception, however, does not always match reality. Anyone employed by a sizable business in the private or public sector works in a place where cybersecurity is taken very seriously. Organizations know that those who fail to adequately invest [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/\" \/>\n<meta property=\"og:site_name\" content=\"Policy Options\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IRPP.org\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-08T02:35:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/rashotte.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@irpp\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/\",\"url\":\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/\",\"name\":\"The critical shortage of cybersecurity expertise\",\"isPartOf\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/rashotte.jpg\",\"datePublished\":\"2019-07-04T14:31:11+00:00\",\"dateModified\":\"2025-10-08T02:35:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#primaryimage\",\"url\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/rashotte.jpg\",\"contentUrl\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/rashotte.jpg\",\"width\":2000,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/policyoptions.irpp.org\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The critical shortage of cybersecurity expertise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/#website\",\"url\":\"https:\/\/policyoptions.irpp.org\/fr\/\",\"name\":\"Policy Options\",\"description\":\"Institute for Research on Public Policy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/policyoptions.irpp.org\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The critical shortage of cybersecurity expertise","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/","og_locale":"fr_FR","og_type":"article","og_title":"The critical shortage of cybersecurity expertise","og_description":"For many Canadians, the world of cyberattacks and hackers still seems far removed from their day-to-day activities. Perception, however, does not always match reality. Anyone employed by a sizable business in the private or public sector works in a place where cybersecurity is taken very seriously. Organizations know that those who fail to adequately invest [&hellip;]","og_url":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/","og_site_name":"Policy Options","article_publisher":"https:\/\/www.facebook.com\/IRPP.org","article_modified_time":"2025-10-08T02:35:57+00:00","og_image":[{"width":2000,"height":700,"url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/rashotte.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@irpp","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/","url":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/","name":"The critical shortage of cybersecurity expertise","isPartOf":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#primaryimage"},"image":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#primaryimage"},"thumbnailUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/rashotte.jpg","datePublished":"2019-07-04T14:31:11+00:00","dateModified":"2025-10-08T02:35:57+00:00","breadcrumb":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#primaryimage","url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/rashotte.jpg","contentUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/rashotte.jpg","width":2000,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/policyoptions.irpp.org\/fr\/2019\/07\/the-critical-shortage-of-cybersecurity-expertise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/policyoptions.irpp.org\/fr\/"},{"@type":"ListItem","position":2,"name":"The critical shortage of cybersecurity expertise"}]},{"@type":"WebSite","@id":"https:\/\/policyoptions.irpp.org\/fr\/#website","url":"https:\/\/policyoptions.irpp.org\/fr\/","name":"Policy Options","description":"Institute for Research on Public Policy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/policyoptions.irpp.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/issues\/267361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/issues"}],"about":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/types\/issues"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media\/276000"}],"wp:attachment":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media?parent=267361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/categories?post=267361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/tags?post=267361"},{"taxonomy":"article-status","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/article-status?post=267361"},{"taxonomy":"irpp-category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-category?post=267361"},{"taxonomy":"section","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/section?post=267361"},{"taxonomy":"irpp-tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-tag?post=267361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}