#IMOS20 The Workforce You Want: Upskilling Your Security Team

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The cybersecurity skills gap is much-discussed and greatly maligned. The latest figures from (ISC)2 predict that global IT security skills shortages have now surpassed four million, a figure that continually appears to be increasing. In fact, the same research estimates that the global security workforce needs to increase by a staggering 145% to cope with a surge in hiring demand.

This suggests that, with shortages and the hiring of new talent remaining ongoing challenges, companies can hugely benefit by focusing on retaining and progressing their current workforces – including implementing effective training, upskilling and encouraging individual growth.

In this session, a panel of experts and thought-leaders will explore how and why organizations can mitigate the security skills gap crisis by concentrating on developing those already employed within their businesses.

In this session, learn:

  •  The best strategies for upskilling and retaining your security team
  •  The power of individual development and how to achieve it
  • How to implement effective training


Photo of Lisa Forte

Lisa Forte

Partner, Red Goat Cyber Security

Photo of Holly Foxcroft

Holly Foxcroft

Associate Lecturer Cyber Security, Chichester College

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.