* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/) * Cybersecurity Talent Acqu... # Cybersecurity Talent Acquisition in 2019: My Top Three Recommendations [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2019%2F01%2Fcybersecurity-talent-acquisition-2019-top-three-recommendations%2F) [](https://twitter.com/share?text=Cybersecurity+Talent+Acquisition+in+2019%3A+My+Top+Three+Recommendations&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2019%2F01%2Fcybersecurity-talent-acquisition-2019-top-three-recommendations%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2019%2F01%2Fcybersecurity-talent-acquisition-2019-top-three-recommendations%2F&title=Cybersecurity+Talent+Acquisition+in+2019%3A+My+Top+Three+Recommendations&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2019/01/cybersecurity-talent-acquisition-2019-top-three-recommendations/&ts=markdown) \[\](mailto:?subject=Cybersecurity Talent Acquisition in 2019: My Top Three Recommendations) Link copied By [Lucas Moody](https://www.paloaltonetworks.com/blog/author/lucas-moody/?ts=markdown "Posts by Lucas Moody") Jan 07, 2019 5 minutes [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown) [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) [cybersecurity](https://www.paloaltonetworks.com/blog/tag/cybersecurity/?ts=markdown) [Talent Acquisition](https://www.paloaltonetworks.com/blog/tag/talent-acquisition/?ts=markdown) This post is also available in: [日本語 (Japanese)](https://www.paloaltonetworks.com/blog/2019/06/cybersecurity-talent-acquisition-2019-top-three-recommendations/?lang=ja "Switch to Japanese(日本語)") As we begin 2019, we are crossing the threshold into another exciting year in cybersecurity. Building on the momentum of 2018 -- a year filled with steep growth and innovation -- cybersecurity now takes center stage in a big way. We can see a significant increase in awareness and passion about cybersecurity as a career. People from all walks of life are talking about the opportunities, asking questions including: * "What are the biggest challenges in cybersecurity?" * "Which tactics, techniques and procedures can be used, and when?" * "What skills and experiences are required to have a successful career in this field?" As cybersecurity continues to become a central focal point in our lives, we will see growth and interest in career opportunities. In 2019, it will be business-critical for organizations to attract the right talent for positions that influence and manage cybersecurity strategies. Here are my top three recommendations for what we can do to solidify the approach and practices for cybersecurity talent acquisition in 2019: * **Retain great talent and expand the pipeline.** Great talent is connected to great work. Those who are inspired to do great work are deeply motivated by a security strategy that looks into the future and aims to make a profound impact on the company it serves. Take a deep look at your security strategy, ensure it aligns to building a security platform, and do the hard work to push the limits of what a great security program can be, which will keep your top talent engaged, challenged and energized -- the qualities the best talent show up for. Furthermore, the growing talent deficit in cybersecurity will continue to have a measurable impact. To ensure we have the people and skills needed to secure our ever-changing business environment and digital way of life, we must think of pipeline in a much broader way. Expand the parameters of the cybersecurity talent pipeline to include students who are just beginning their careers, skilled professionals exploring a job change, entrepreneurs wanting to discover the next trend, and others. Look for those who have a passion and curiosity for learning more about cybersecurity, even if they don't have a background or experience in cybersecurity yet. * **Interview for team and culture fit.** Cybersecurity is extremely complex and promises to become even more so. For teams to make an increasing impact, we can't rely on standard hiring practices. Hiring for cybersecurity is about the future. Move beyond purely testing for subject matter expertise, as doing so will merely show what they've done. As cybersecurity evolves, we need to better understand how they'll solve for the future. Test for complex problem-solving, test for how they'll fit into the team you're building, and create methods of engagement that will not only draw out the right outcomes but also show what engaging with the team you've built will be like. Some questions you might ask when hiring for cybersecurity are: * * What are you passionate about? * What are your problem-solving and innovation processes? * Describe the best team you've worked on. * How do you stay ahead of the bad guys? Remember, candidates are also assessing you, your organization and your company. Be prepared to share your story of how you got started in cybersecurity, the challenges you've faced, and how you overcame them. Furthermore, help them better understand the culture you have and will be developing. This will help candidates see the possible paths they can take. Share the [Cybersecurity Career Guide](https://www.paloaltonetworks.com/resources/ebooks/cybersecurity-career-guide?ts=markdown), which includes amazing stories of different jobs in cybersecurity and the individuals who work in this field. * **Actively build a strong cybersecurity culture.** A trend that will increase significantly in 2019 is the increase of CISOs on boards. This will elevate the prioritization of security talent acquisition and initiatives in the organization as well as bring added visibility and resources. Even for organizations that cannot achieve a certain percentage of the workforce dedicated to security, the reality is that anyone hired into any organization will need to have a baseline understanding of security risks -- from front-line employees to executives. Organizations relying solely on their Information Security teams to combat cyberthreats are at increased risk of losing the battle. A strong cybersecurity culture cannot be limited to only certain individuals or groups within an organization. It requires the active participation of everyone, having a security mindset and owning the responsibility of reducing risk in the organization. The most difficult challenges are the ones we don't know, and building a workforce that includes diverse perspectives, experiences and backgrounds will prepare us to solve tomorrow's problems. Within the organization, be willing to leverage cross-functional talent to strengthen the understanding of processes and procedures as well as share tips and best practices. As leaders and professionals in cybersecurity, we have a once-in-a-lifetime opportunity to increase the understanding of cybersecurity for everyone we interact with, whether that's at work, at home or in the community. The next generation of professionals is ready to join the cybersecurity workforce, and we must be prepared, in the coming year, to inspire and encourage them to continuously disrupt the status quo. *** ** * ** *** ## Related Blogs ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Cybersecurity Platformization](https://www.paloaltonetworks.com/blog/2024/04/cybersecurity-platformization/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) [#### Platforms in Action --- Three Companies That Supercharged Risk Posture](https://www.paloaltonetworks.com/blog/2024/01/three-companies-supercharged-risk-posture/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Navigating Cybersecurity in a Social-First Campaign](https://www.paloaltonetworks.com/blog/2023/10/navigating-cybersecurity-in-a-social-first-campaign/) ### [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown), [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future/?ts=markdown) [#### Information Security Governance](https://www.paloaltonetworks.com/blog/cloud-security/information-security-governance/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) [#### Interviewing Stephanie Hagopian --- Finding Your Place in Cybersecurity](https://www.paloaltonetworks.com/blog/2023/04/interviewing-stephanie-hagopian/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) [#### NEXT Secures the Mobile World Congress Barcelona](https://www.paloaltonetworks.com/blog/2022/02/next-secures-the-mwc-barcelona/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language