ThriveDX launches Cyber Talent Hub to help close the cyber skills gap 

by | Jul 19, 2022 | Technology

We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 – 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!

Finding qualified cybersecurity professionals is something that many organizations struggle to do. According to ISC, the cybersecurity workforce fell 2.72 million positions short in 2021, meaning that the global cybersecurity workforce needs to grow by 65% to fill all vacant roles. 

Unfortunately, as long as these positions go unfilled, organizations simply won’t have the expertise needed to stave off the next generation of online threats. 

To address the shortage, cybersecurity skills training provider ThriveDX today announced the launch of a Cyber Talent Hub, designed to unite educators and employers across commercial and government organizations to help organizations attract, retain, and develop cyber talent more efficiently.

Through the hub, organizations will be able to access a talent pool of qualified and diverse candidates and aspiring security professionals from major universities across the country. It’s a system that will enable enterprises to quickly find qualified candidates for entry-level positions. 

At launch, industry and education partners supporting the initiative include Carahsoft, Exclusive Networks, Ingram Micro Inc, Jacobs, Kyndryl, Liberty Mutual Insurance, Mandiant, Marsh, New York University, University of Chicago, University of Michigan and the University of Wisconsin. 

Filling the cyber skills gap 

One of the main issues caused by the cyber skills gap, is that many organizations lack the expertise they need to secure their environments against threat actors.  In fact, research suggests that the cybersecurity skills gap contributes to 80 percent of breaches. 

The simple reality is that if an organization can’t hire a specialist to identify gaps in their defenses, then those vulnerabilities are wide open to exploitation by threat actors as part of ransomware attacks and other coordinated assaults.

Article Attribution | Read More at Article Source

Share This