{"id":3817,"date":"2017-01-11T12:17:00","date_gmt":"2017-01-11T12:17:00","guid":{"rendered":"http:\/\/localhost\/projects\/horsesforsources\/secret-for-sourcing-security-talent_011117\/"},"modified":"2021-12-03T11:25:20","modified_gmt":"2021-12-03T11:25:20","slug":"secret-for-sourcing-security-talent_011117","status":"publish","type":"post","link":"https:\/\/www.horsesforsources.com\/secret-for-sourcing-security-talent_011117\/","title":{"rendered":"Poach, diversify or upskill? What is the secret for sourcing security talent?"},"content":{"rendered":"

With the continued rise in cyber security threats, highlighted by the recent Tesco banking breach in the UK and the ongoing Russian hacking debacle in the US, organizations across industries are scrambling to get their cyber security measures in order. The General Data Protection Regulation (GDPR) and the Network Information and Security (NIS) directives in the EU have only increased the urgency for organizations in this region to bolster their cyber defenses.<\/p>\n

This urgent need to address cyber security, coupled with challenging hurdles to overcome in building internal security practices, is driving more firms to partner and outsource this critical business function.<\/p>\n

One of the key internal hurdles we have identified in this market is that clients are challenged to source the required talent to keep abreast of their security requirements. This is a well-documented<\/a> problem within the cyber security community and is one of the top three drivers that is shaping and driving the outsourced cyber security market at present.<\/p>\n

So, the solution seems simple enough, if you can\u2019t find the talent, hand over the responsibility on to someone who already has it.<\/p>\n

But this begs the question: if there is a lack of security talent in the market how are service providers finding it?<\/strong><\/span><\/p>\n

<\/strong><\/span><\/p>\n

Well, not easily is the answer. The more successful service providers have branched out and are tackling this problem from several angles. These can be largely categorized under external sourcing and internal sourcing:<\/p>\n

External Sourcing<\/u><\/strong><\/span><\/p>\n