Professional Documents
Culture Documents
CONTENTS
4 Executive Summary
4 Survey Methodology
7 Uncertainty Amid a Global Pandemic
8 / Vacancies
12 / Pipeline Challenges
14 / Employer Actions
15 / Education vs. Training
19 / Retention Positivity
21 Has Cybersecurity Funding Reached an
Apex?
23 What Now?
24 / National Initiative for Cybersecurity
Education
24 / European Union Agency for Cybersecurity
25 / Workforce Development Perspective
25 / Industry Perspective
26 Conclusion—Business as Usual Is Not
Working
27 Acknowledgments
ABSTRACT
State of Cybersecurity 2021, Part 1: Global Update on Workforce Efforts, Resources and
Budgets reports the results of the annual ISACA® global State of Cybersecurity Survey,
conducted in the fourth quarter of 2020. This Part 1 report focuses on the current trends
in cybersecurity workforce development, staffing and cybersecurity budgets. The survey
findings reinforce past reporting and, in certain instances, mirror prior year data despite
enterprises dealing with a global pandemic and the resulting resource and finance
issues. Staffing levels, ease of hiring, and retention remain pain points across the globe,
and cybersecurity budgets continue a downward trend.
Executive Summary
Now in its seventh year, the ISACA® global State of ISACA and many others have been reporting cybersecurity
Cybersecurity Survey continues to identify current workforce shortages that have not improved significantly
challenges and trends in the cybersecurity field. State of in over five years. This report features expert commentary
Cybersecurity 2021, Part 1 analyzes the current survey from industry participants, governmental bodies and
results regarding cybersecurity workforce development apprenticeship programs to help enterprises understand
and resourcing. In Part 2 of this report, ISACA examines why the workforce shortage is not lessening—at least to a
the survey results relating to IT-related operations, certain degree. Much work remains to be done to improve
cyberthreats and cybermaturity. the workforce pipeline, but the good news is that many
organizations are tackling the problem.
The survey findings are largely consistent with the
findings from prior years: Enterprises continue to lack Lack of equity and diversity are global issues plaguing all
desired staffing levels to combat cyberthreats. Although technology-related fields. In 2020, ISACA launched the
the impact of COVID-19 on many businesses and One In Tech™ foundation, which seeks to build a healthy
enterprises is negative, respondent data show that the digital world that is safe, secure and accessible for all. To
global pandemic helps retention. However, hiring talent aid the One In Tech strategic evidence-based initiatives,
remains challenging. Also, optimism surrounding ISACA transferred all diversity-related data collection to
cybersecurity budgets continues to slide despite a sizable the foundation. Thus, unlike reports released in prior
number of respondents reporting pandemic-specific years, State of Cybersecurity 2021 does not address
security spending. diversity issues.1 1
Survey Methodology
In the final quarter of 2020, ISACA sent online survey • Cybersecurity budgets
professionals who hold the ISACA Certified Information • Organizational governance and risk management
1
1
ISACA continues to focus on diversity issues, but these issues span much more than the cybersecurity space. One In Tech, an ISACA Foundation
founded in 2020, is now better able to investigate and communicate findings on these important issues.
2
2
Certain questions included the option to choose “Don’t know” from the list of answers. Where appropriate, “Don’t know” responses were removed from
the calculation of findings, consistent with prior-year survey reports. Result percentages are rounded to the nearest integer.
REGIONS
NORTH
IS ACA
MEMBER
50% 17% 20%
INDUSTRIES
3%
3%
23 %
L AT I N
MIDDLE
EAST
A M E R I CA A F R ICA
3% 4%
OCE ANIA
34 % 60%
CY B E R S EC U R I T Y
M A N AG E M E N T
23%
T EC H N O LOGY
8%
S E R V I C E S/C O N S U LT I N G
IT
35%
O PE R AT IO N S
EMPLOY ED IN
AN ENTERPRISE
WITH
15
IT RISK
% M A N AG E M E N T, AT L E A S T
13% AU DI T,
G OV E R N M E N T/MI L I TA RY CY B E R S EC U R I T Y
GOV E R N A N C E,
COMPLIANCE 1,500
P R ACT IT IO N E R E M PLOY E E S
Financial/Banking 23%
Government/Military–
15%
National/State/Local
Other 8%
Healthcare/Medical 5%
Manufacturing/Engineering 4%
Insurance 4%
Telecommunications/ 4%
Communications
Retail/Wholesale/Distribution 3%
Mining/Construction/
2%
Petroleum/Agriculture
Utilities 2%
Transportation 1%
Public Accounting 1%
Aerospace 1%
Legal/Law/Real Estate 1%
Advertising/Marketing/Media 1%
Pharmaceutical 1%
3
3
(ISC)2®, Cybersecurity Professionals Stand Up to a Pandemic, (ISC)2 Cybersecurity Workforce Study, 2020, www.isc2.org/-
/media/ISC2/Research/2020/Workforce-Study/ISC2ResearchDrivenWhitepaperFINAL.ashx
4
4
Goldstein, M.; P.G. Martinez; S. Papineni; J. Wimpey; “The Global State of Business During COVID-19: Gender Inequalities,” World Bank Blogs, 8
September 2020, https://blogs.worldbank.org/developmenttalk/global-state-small-business-during-covid-19-gender-inequalities
5
5
McKinsey & Company, “COVID-19: Briefing note #49, April 7, 2021,” COVID-19: Implications for business, 7 April 2021, www.mckinsey.com/business-
functions/risk/our-insights/covid-19-implications-for-business
6
6
(ISC)2® reports that 17 percent of respondents reported a reduction in hours, and 19 percent reported a reduction in salary. See Op cit (ISC)2®.
7
7
The 2021 State of Cybersecurity survey received 3,659 responses, compared with 2,051 responses to the 2020 survey.
8
8
The sellers are the cybersecurity job applicants (or employees), while the buyers are the hiring enterprises that are seeking qualified candidates.
the respondents whose organizations experienced more they have experienced difficulties retaining qualified
attacks indicate they have experienced difficulties cybersecurity professionals—conceivably due to burnout.9 , 10 9 10
How would you describe the current staffing of your organization’s cybersecurity team?
Somewhat overstaffed 3%
Significantly overstaffed 1%
Not applicable 2%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Yes 55%
No 34%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
9
9
Paterson, J.; “Pandemic Burnout: Yes, It’s a Thing. And It’s a Security Risk,” Security Boulevard, 14 October 2020,
https://securityboulevard.com/2020/10/pandemic-burnout-yes-its-a-thing-and-its-a-security-risk/
10
10
Palmer, D.; “How remote working is making life easier for hackers,” ZDNet, 12 January 2021, www.zdnet.com/article/cybersecurity-teams-are-struggling-
with-burnout-but-the-attacks-keep-coming/
Technical cybersecurity positions were again the top results across the five categories of positions. Figure 9
vacancy reported this year (figure 6); however, the percent shows four-year trending on future demand, which
of respondent enterprises with positions left unfilled appears to signal a leveling off.
increased this year, between two and five percentage
points, for every position.
Some positive news—however slight—is that managers
and directors who are exploring new opportunities have
Some positive news—however slight—is that managers more available to them.
and directors who are exploring new opportunities have
more available to them. Figure 7 shows year-over-year However, post-pandemic data will be required to ascertain
reporting data of unfilled positions. the ultimate effect of COVID-19 and workforce
When asked about future demand (figure 8), respondents development initiatives on cybersecurity
On average, how long does it take your organization to fill a cybersecurity position with a qualified candidate?
2%
< 1 month
1%
5%
1 month
5%
15%
2 months
12%
44%
3 months to 6 months
30%
16%
Greater than 6 months
29%
2%
Cannot fill open positions
3%
5%
Not applicable
6%
10%
Don’t know
15%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
2021 2020
How many of your unfilled (open) cybersecurity positions are at the following levels?
9%
38%
Individual contributor/ 25%
Technical cybersecurity 11%
17%
3%
12%
Individual contributor/ 31%
Nontechnical cybersecurity
22%
32%
3%
9%
Cybersecurity manager 23%
26%
39%
3%
6%
Senior manager/ 13%
Director of cybersecurity
24%
53%
3%
6%
Executive or C-Suite 8%
cybersecurity (e.g., CISO)
14%
69%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
100%
90%
92%
80%
82% 81% 83%
70% 75%
66% 68%
60%
63% 61% 63%
30% 36%
31%
28% 29%
20%
19%
10%
0%
11
This figure compares the unfilled position data from 2018-to-2021 ISACA State of Cybersecurity reports. Percentages represent the sum of all reported
vacancy percentages for each position and exclude the “None” response percentages.
In the next year, do you see the demand for the following cybersecurity position levels increasing, decreasing or remaining
the same?
79%
Individual contributor/Technical
20%
cybersecurity
1%
47%
46%
3%
34%
30%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
100%
Individual contributor/
90%
Technical cybersecurity
Individual contributor/
80%
Nontechnical cybersecurity
70%
Cybersecurity manager
60%
Senior manager/
50% Director of cybersecurity
40% Executive or
C-suite cybersecurity
30% (e.g., CISO)
20%
10%
0%
2018 2019 2020 2021
On average, how many cybersecurity applicants are well qualified for the positions for which they are applying?
0% 0%
1-25% 23%
26-49% 27%
50-75% 22%
76-100% 6%
Not applicable 5%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
How important is each of the following factors in determining if a cybersecurity candidate is qualified?
74%
21%
Prior hands-on 2%
cybersecurity experience
0%
2%
37%
52%
Credentials 7%
1%
3%
25%
56%
Hands-on training 14%
2%
3%
22%
48%
Employer recommendation 21%
5%
4%
22%
46%
University degree 22%
7%
3%
8%
34%
Association membership 40%
14%
3%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Very important Somewhat important Not very important Not at all important Don’t know
What are the biggest skill gaps you see in today’s cybersecurity professionals? Select all that apply.
Soft skills
(e.g., communication, 56%
flexibility, leadership)
Security controls
(e.g., endpoint, network, 36%
application, implementation)
Software development-related
topics (e.g., languages, machine 33%
code, testing, deployment)
Networking-related topics
(e.g., architecture, addressing, 27%
networking components)
Network operations
(e.g., configuration, 23%
performance monitoring)
Computing devices
(e.g., hardware, software, 10%
file systems)
Don’t know 8%
Other 6%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Employer Actions
Training increases three percentage points from last year,
The actions that enterprises are taking to address
while contractors or consultants dips three percentage
perceived skills gaps closely resemble those reported last
points. Artificial intelligence increases slightly to 22
year (figure 13). Cross-training of enterprise personnel and
percent (from 20 percent), and reliance on credentials
increased use of contractors and consultants remain
slips two percentage points from a year ago.
primary mitigations.
Which, if any, of the following has your organization undertaken to help decrease this cybersecurity skills gap?
Select all that apply.
Increased reliance on
credentials to attest to actual 18%
subject matter expertise
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Education vs. Training positions, based on 2020 and 2021 report data, and
indicates how each is trending.
University education remains a common, albeit imperfect,
means of supplying the talent pipeline. Respondents When asked about skills gaps among recent university
remain split about whether a university degree well graduates, respondents again highlight soft skills
prepares recent graduates for the cybersecurity (figure 17). Given the vast number of organizations that
challenges facing enterprises (figure 14). Despite this require a university degree for entry-level positions, the
division, 58 percent of respondents report that their lack of soft skills is concerning and needs to be
organizations require a degree (figure 15), although this addressed. The technical skills that survey respondents
requirement varies greatly by geographic area. Figure 16 find most lacking in recent graduates (figure 17) suggest
shows the regional percentage of enterprises that omissions or inadequacies within university programs
require a university degree for entry-level cybersecurity regarding networking and hardening.
To what extent do you agree or disagree that recent university graduates in cybersecurity are well prepared for the
cybersecurity challenges in your organization?
Strongly agree 4%
Agree 23%
Disagree 19%
Strongly disagree 5%
Don’t know 9%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Does your organization typically require a university degree to fill your entry-level cybersecurity positions?
Yes 58%
No 34%
Don’t know 9%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Does your organization typically require a university degree to fill your entry-level cybersecurity positions?
68%
Asia
62%
69%
Africa
78%
51%
Europe
46%
68%
Latin America
64%
54%
North America
54%
78%
Middle East
67%
41%
Oceana
37%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
2021 2020
Which of the following skills gaps have you noticed among recent university graduates? Select all that apply.
Security controls
(e.g., endpoint, network, 56%
application) implementation
Network operations
(e.g., configuration, 41%
performance monitoring)
Networking-related topics
(e.g., architecture, addressing, 41%
networking components)
Software development-related
topics (e.g., languages, machine 30%
code, testing, deployment)
Computing devices
(e.g., hardware, software, 22%
file systems)
Other 11%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Recruitment remains a challenge for many. Survey data shortening the time to fill open positions. Of those
shown in figure 18 illustrate the disconnect between respondents who report that HR always or frequently
hiring managers and those charged with sourcing understands their cybersecurity hiring needs, 30 percent
candidates—just 31 percent feel that their human hire in less than two months, which is consistent with last
resources (HR) department fully understands their hiring year’s survey data.
needs. Closing this gap remains aligned closely to
How often do you feel your HR department fully understands your cybersecurity hiring needs to properly
pre-screen candidates?
Always 8%
Frequently 23%
Occasionally 39%
Rarely 26%
Never 5%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Which, if any, of the following reasons do you feel are causing cybersecurity professionals to leave their current jobs?
Select all that apply.
Limited opportunities
to work with latest technologies 22%
(e.g., AI)
Retirement 12%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
14%
19%
43%
41%
37%
34%
4%
Somewhat overfunded 4%
3%
1%
Significantly overfunded 1%
2%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
11
12
ISACA, State of Cybersecurity 2020, Part 1: Global Update on Workforce Efforts and Resources, 2020, www.isaca.org/bookstore/bookstore-wht_papers-
digital/whpsc201
How, if any, will your organization’s cybersecurity budget change in the next 12 months?
5%
Significantly increase 4%
8%
47%
47%
27%
34%
16%
9%
4%
Significantly decrease 2%
3%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Has your organization increased its spending specifically on new security technology initiatives during the
COVID-19 pandemic?
Yes 36%
No 43%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
100%
90%
80%
70%
61% 64%
55% 58%
60% 52%
50%
50%
40%
30%
20%
10%
0%
What Now?
For many years, ISACA and others have been reporting on positions or, at the very least, rightsizing position
the imbalance between supply and demand for descriptions that enterprises believe are necessary to
cybersecurity talent. ISACA annual surveys show no source the best candidates.
evidence that the efforts of governments, academia and
It is increasingly obvious that the industry requires
industry have made any real headway to correct this
recalibration. ISACA solicited input from US and European
imbalance.13 Why has so little headway been made when, for
governmental bodies, industry participants, and an
12
highly. Ultimately, university programs and other cybersecurity leaders. There is no quick solution to the
workforce development initiatives offer little upside shortage and the entire continuum must be considered—
without substantial increases in the number of entry-level from early learning through on-the-job skills maintenance.
12
13
ISACA Global remains concerned that the situation continues to be the same year-over-year. As a nonprofit association, ISACA works with industry,
government and apprenticeship programs, but the needle has not moved. Those passionate about this issue are encouraged to join the ISACA Engage
Community: Information and Cybersecurity to continue the discussion.
13
14
In US baseball, a farm team is analogous to a river tributary. It is a less robust team whose role in the program is to provide experience and training that
allows successful new players to move to a higher-level team.
14
15
Petersen, R.; interview conducted by ISACA
Cybersecurity Education 25
and NICE Framework Users.26
Cybersecurity Education
24 25
19
15
16
NIST, National Initiative for Cybersecurity Education (NICE), Strategic Plan, 18 March 2021, www.nist.gov/itl/applied-cybersecurity/nice/about/strategic-
plan
16
17
NIST, NICE Framework Resource Center, www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center
17
18
Op cit Petersen
18
19
NIST, NICE Community Coordinating Council, www.nist.gov/itl/applied-cybersecurity/nice/about/community-coordinating-council
19
20
National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE), “Modernize Talent Management Working
Group,” www.nist.gov/itl/applied-cybersecurity/nice/about/community-coordinating-council/modernize-talent-management
20
21
National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE), “Promote Career Discovery Working
Group,” www.nist.gov/itl/applied-cybersecurity/nice/about/community-coordinating-council/promote-career-discovery
21
22
National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE), “Transform Learning Process Working
Group,” www.nist.gov/itl/applied-cybersecurity/nice/about/community-coordinating-council/transform-learning-process
22
23
National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE), “Apprenticeships in Cybersecurity
Community of Interest,” www.nist.gov/itl/applied-cybersecurity/nice/about/community-coordinating-council/apprenticeships-cybersecurity
23
24
National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE), “Cybersecurity Skills Competitions
Community of Interest,” www.nist.gov/itl/applied-cybersecurity/nice/about/community-coordinating-council/cybersecurity-skills
24
25
National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE), “K12 Cybersecurity Education Community
of Interest,” www.nist.gov/itl/applied-cybersecurity/nice/about/community-coordinating-council/k12-cybersecurity-education
25
26
National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE), “NICE Framework Users Group,”
www.nist.gov/itl/applied-cybersecurity/nice/about/community-coordinating-council/nice-framework-users
26
27
European Union Agency for Cybersecurity (ENISA), Cybersecurity Skills Development in the EU, December 2019, www.enisa.europa.eu/publications/the-
status-of-cyber-security-education-in-the-european-union/at_download/fullReport
27
28
European Union Agency for Cybersecurity (ENISA), “Cyberhead,” www.enisa.europa.eu/topics/cybersecurity-education/cyberhead/view
28
29
DiFranco, F.; interview conducted by ISACA
29
30
European Union Agency for Cybersecurity (ENISA), “European Cybersecurity Skills Framework,” www.enisa.europa.eu/topics/cybersecurity-
education/european-cybersecurity-skills-framework
economic and national security issues caused by the entry-level certification and placement with an employer
cybersecurity skills shortage plaguing member states. for one year, as an apprentice. CyberUp fully embraces the
need to engage students early in life. One way it does this
An ad hoc working group (AHWG) serves to harmonize
is through monthly cybersecurity competitions for
cybersecurity education, training and workforce
students, typically aged 11 to 18.
development ecosystems with the following planned
deliverables: According to CyberUp Executive Director Tony Bryan, the
largest barrier is the mindset that industry faces a skills
• Unambiguous taxonomy of skills, competences and
gap as opposed to a talent pipeline problem. Employers
occupations in the cybersecurity workforce
still use 20-year-old hiring practices (internship and co-op)
• List of cybersecurity profiles and associated skills,
and must reimagine hiring. Pathways such as
competences, responsibilities, accountabilities and tasks
apprenticeship offer a low-cost, low-risk, faster way to
• Analysis of a detailed cybersecurity workforce market in Europe
ready a workforce.33
• Common cybersecurity skills and competencies for Europe
32
CyberUp is a US-based talent pipeline supplier that serves asked about the largest barriers to decreasing the gap
adults and youth to teach them cybersecurity skills, with between cybersecurity supply and demand, Varghese
the intention of connecting them to employment highlighted a lack of technology skills among applicants
opportunities. 32 31
Initiatives include 16-week part-time pre- and a shortage of those able to design secure systems,
apprenticeship training, which helps individuals acquire write safe computer code and detect malicious acts.34 33
30
31
Most large-scale apprenticeship programs in the United States (e.g., construction, electricians, plumbers) are fostered by labor unions. To date,
cybersecurity does not have a union nor widespread adoption in the United States.
31
32
CyberUp, “Cultivating the Cybersecurity Talent Pipeline,” https://wecyberup.org/
32
33
Bryan, R.; interview conducted by ISACA
33
34
Varghese, R.; interview conducted by ISACA
skills, leadership, critical thinking, teamwork, work ethic attention of government and industry alike and may finally
and positive attitude. Of these, communication skills— provide the necessary boost to make meaningful changes.
verbal and written—can be taught but often require However, cybersecurity career awareness and preparation
practice. Informal analysis of programs reveals that efforts may be insufficient in areas across the globe that lack
universities focus little here. Of specific interest to broadband connectivity.36 In the meantime, the effect of
35
cybersecurity professionals is critical thinking, which technology on classrooms for students aged 11 to 18 can
includes analysis, interpretation, inference, explanation, not be overlooked when the soft skills continue to be the
self-regulation, open-mindedness and problem solving—all major skills missing in the modern workplace.
34
35
For example, SolarWinds and Microsoft Exchange Server
35
36
In the United States, the FCC minimum standard for broadband is 25 Mbps down/3Mbps.
Acknowledgments
ISACA would like to recognize:
Board of Directors
Tracey Dedrick, Chair Brennan P. Baybeck
Former Chief Risk Officer, Hudson City CISA, CRISC, CISM, CISSP
Bancorp, USA ISACA Board Chair, 2019-2020
David Samuelson
Chief Executive Officer, ISACA, USA
Gerrard Schmid
President and Chief Executive Officer,
Diebold Nixdorf, USA
Gregory Touhill
CISM, CISSP
President, AppGate Federal Group, USA
Asaf Weisberg
CISA, CRISC, CISM, CGEIT
Chief Executive Officer, introSight Ltd.,
Israel
Anna Yip
Chief Executive Officer, SmarTone
Telecommunications Limited, Hong Kong
About ISACA
For more than 50 years, ISACA® (www.isaca.org) has advanced the best
talent, expertise and learning in technology. ISACA equips individuals with 1700 E. Golf Road, Suite 400
knowledge, credentials, education and community to progress their careers Schaumburg, IL 60173, USA
and transform their organizations, and enables enterprises to train and build
quality teams that effectively drive IT audit, risk management and security
Phone: +1.847.660.5505
priorities forward. ISACA is a global professional association and learning
organization that leverages the expertise of more than 150,000 members who
Fax: +1.847.253.1755
work in information security, governance, assurance, risk and privacy to drive
innovation through technology. It has a presence in 188 countries, including
Support: support.isaca.org
more than 220 chapters worldwide. In 2020, ISACA launched One In Tech, a
philanthropic foundation that supports IT education and career pathways for
Website: www.isaca.org
under-resourced, under-represented populations.
About HCL
HCL Technologies (HCL) empowers global enterprises with technology for the Provide Feedback:
next decade, today. HCL’s Mode 1-2-3 strategy, based on its deep-domain
www.isaca.org/state-of-cybersecurity-
industry expertise, client-centricity and entrepreneurial culture of
Ideapreneurship™, enables businesses to transform into next-gen enterprises. 2021
HCL offers its services and products through three business units: IT and
Business Services (ITBS), Engineering and R&D Services (ERS) and Products & Participate in the ISACA Online
Platforms (P&P). ITBS enables global enterprises to transform their Forums:
businesses through offerings in the areas of applications, infrastructure, https://engage.isaca.org/onlineforums
digital process operations and next generation digital transformation
Twitter:
solutions. ERS offers engineering services and solutions in all aspects of
www.twitter.com/ISACANews
product development and platform engineering. P&P provides modernized
software products to global clients for their technology and industry specific LinkedIn:
requirements. Through its cutting-edge co-innovation labs, global delivery www.linkedin.com/company/isaca
capabilities and broad global network, HCL delivers holistic services in various Facebook:
industry verticals, categorized as Financial Services, Manufacturing, www.facebook.com/ISACAGlobal
Technology and Services, Telecom and Media, Retail and CPG, Life Sciences
and Healthcare, and Public Services. As a leading global technology company, Instagram:
www.instagram.com/isacanews/
HCL takes pride in its diversity, social responsibility, sustainability, and
education initiatives. For the 12 months ended Dec. 31, 2020 HCL had
consolidated revenue of US$ 10.02 billion. Its 159,682 Ideapreneurs operate
out of 50 countries. For more information, visit www.hcltech.com.
DISCLAIMER
ISACA has designed and created State of Cybersecurity 2021, Part 1: Global
Update on Workforce Efforts, Resources and Budgets (the “Work”) primarily as
an educational resource for professionals. ISACA makes no claim that use of
any of the Work will assure a successful outcome. The Work should not be
considered inclusive of all proper information, procedures and tests or
exclusive of other information, procedures and tests that are reasonably
directed to obtaining the same results. In determining the propriety of any
specific information, procedure or test, professionals should apply their own
professional judgment to the specific circumstances presented by the
particular systems or information technology environment.
RESERVATION OF RIGHTS
State of Cybersecurity 2021, Part 1: Global Update on Workforce Efforts, Resources and Budgets