{"id":22115,"date":"2023-12-22T14:35:02","date_gmt":"2023-12-22T13:35:02","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=22115"},"modified":"2023-12-22T14:35:03","modified_gmt":"2023-12-22T13:35:03","slug":"the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/","title":{"rendered":"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them"},"content":{"rendered":"\n<p style=\"text-align: justify;\">\u201cTalent shortage\u201d, \u201cskills gap\u201d, \u201cemployee burnout in cybersecurity\u201d, \u201chigh turnover rate\u201d \u2013 as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.<\/p>\n<p style=\"text-align: justify;\">You may have seen the big headlines pointing out talent shortage issues in the latest news &#8211; that is sadly not a fake news. The talent war really exists in the cybersecurity market. Over the past months, we read numerous articles, academic papers, reports on this emerging subject; we discussed with CISO and Talent Managers (a real full-time job!) and the 3 main challenges remain the same: <strong>how to recruit, manage and nurture our talents?<\/strong><\/p>\n<p style=\"text-align: justify;\">In this article, we have compiled the different situations, our observations, and the initial lessons we can draw from the actions put in place to meet these challenges.<\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><\/p>\n<h2 style=\"text-align: justify;\"><strong>Take a moment to analyse the strengths and weaknesses of your team to identify the complementary skills and competencies you need to look for\u2026<\/strong><\/h2>\n<p style=\"text-align: justify;\">Beyond just filling the roles, it is essential to gain a strategic vision of the skills to draw up a sustained cyber division. Your mantra for this stage must be: \u201cGetting the right people for today\u2026 and tomorrow!\u201d.<\/p>\n<p style=\"text-align: justify;\"><strong>When people\u2019 skills match their roles, tasks are performed efficiently, with everyone contributing to a more (cyber)secure organization.<\/strong> I doubt anyone will contradict me here, but it&#8217;s often easier said than done.<\/p>\n<p style=\"text-align: justify;\">Here are the first questions you can ask yourself to get moving in the right direction\u2026<\/p>\n<p style=\"text-align: justify;\">Do you know what you need? Have you defined all the cyber activities you need to run? Have you defined your \u201cmake or buy\u201d (internalization vs outsourcing) strategy? Have you identified the skills and the people needed to run these activities?<\/p>\n<p style=\"text-align: justify;\">This is a non-exhaustive list of questions that as an organisation you should ask yourself to better capture your need and know your people before launching a roadmap of actions.<\/p>\n<p style=\"text-align: justify;\">Knowing your need and team is important as it: (1) <strong>helps for task allocation: <\/strong>before, cyber teams were smaller, therefore, versatility was crucial. Nowadays, bigger cyber teams make specialization possible and facilitate the optimization of complementary skills (2) <strong>helps to<\/strong> <strong>target training and development<\/strong>: having a clear vision on your team and its activities helps you identify skill gaps and provide the appropriate training and development opportunities to the people who need it the most. With the identified missing skills in one hand, and the identified needs in another hand, you can start seeking for your ideal candidates thanks to a job offer that speaks volumes (but don\u2019t look for purple squirrels, they don\u2019t exist)!<\/p>\n<p style=\"text-align: justify;\">Keep an eye on the upcoming insights and focus on the cyber job descriptions topic! &#x1f609;<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\"><strong>Fueling Team Today, Attracting Tomorrow: The recipe for Sustained Cyber Teams<\/strong><\/h2>\n<p style=\"text-align: justify;\">That is to concretely explain what cyber is and what its activities are. #transparency<\/p>\n<p style=\"text-align: justify;\">Based on the discussions with CISO and Talent Managers, being transparent on the job description works and gives people a sense of belonging and purpose, which in turns promotes a better teamwork.<\/p>\n<p style=\"text-align: justify;\">Let us share some concrete and easy actions that you can do to get things moving:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Promote internally the cyber jobs and the <em>people<\/em> behind the jobs:<\/strong> by explaining concretely what working in cybersecurity means, what the positions available are, and what the people really do, you can inspire people to join your team, increase internal mobilities, strengthen the sense of belonging to the cyber division, and give perspective to your team.<\/li>\n<li><strong>Promote externally your cybersecurity activities:<\/strong> make yourself visible by participating to cyber associations and key conferences (school events, collaborations with universities, research institutions, or organisations, etc.).\n<ul>\n<li>Organise\/participate to upskilling\/reskilling workshops (transferable skills).<\/li>\n<\/ul>\n<\/li>\n<li>Include inspiring people in your recruitment process and branding (such as CISO, team lead, etc.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Cybersecurity is still an obscure topic for those outside the cyber world. To fix that, everyone needs to start explaining what they do.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\"><strong>Mastering the art of taking care of your people<\/strong><\/h2>\n<p style=\"text-align: justify;\">By now, you must know that it\u2019s a great asset to know who your team is, who your people are, who you really need to run the cyber activities, to have a great branding to attract people. But what will make the difference in the long run is to take good care of your people by offering a safe work environment and giving perspectives of evolution. When what is coming next is clear, it is easier for the people to project themselves in the company in the years to come.<\/p>\n<p style=\"text-align: justify;\">And before taking care of their people, CISOs also need to take care of themselves. 40% of the CISOs say that they experience \u201chigh-stress\u201d on a daily basis and 28% of them are close to burn-out (Cyber Workforce Study, ISC\u00b2). Tough to take care of people if you don\u2019t take care of yourself first\u2026<\/p>\n<p style=\"text-align: justify;\">To avoid this, CISOs need to build a trusted relationship with their top management in order to be able to define the strategic objectives, prioritize the activities, obtain the resources, etc. And it is essential to know how to surround themselves with reliable individuals to delegate tasks and create an effective operational strategy.<\/p>\n<p style=\"text-align: justify;\"><strong>Recruiting is just the beginning of the journey; nurturing is the ultimate goal.<\/strong> Nevertheless, organisations tend to forget (<em>neglect<\/em>) this last, but perhaps most important point. It\u2019s like getting an ISO 27001 certification, quite easy (of course, it requires work!) but maintaining it, is the real deal.<\/p>\n<p style=\"text-align: justify;\">In order to provide perspectives for team members, we need to establish career paths with their \u201cpathways\u201d and the means available to evolve on these paths: skills required per job and key milestones, training catalogue, internal mobilities, personalized evaluation process, etc.<\/p>\n<p style=\"text-align: justify;\">Nurturing your talents means helping them to develop and strengthen their skills\/capabilities through <strong>trainings<\/strong>, teamwork with colleagues or with cyber associations, giving them <strong>perspective<\/strong> of evolution\/growth within your company. As a human-being, we need to know where we stand and where we are going, we need a vision to get us moving (in our life #existentialcrises).<\/p>\n<p style=\"text-align: justify;\">If we take the example of the Maslow\u2019s hierarchy of needs, people need to have a sense of belonging and feel that they are useful. Thus, part of nurturing talents also means <strong>creating a \u201cteam spirit\u201d<\/strong> via rituals. It is not a secret that a friendly work environment\/atmosphere is a crucial criterion when choosing a job and can increase people\u2019 productivity by 12% (University of Warwick, UK), especially for young people nowadays.<\/p>\n<p style=\"text-align: justify;\">Giving perspective of growth\/evolution is essential, especially for experts. Many organizations still view management as the only path to success, but in certain sectors like industry, we can observe a shift. Expertise is increasingly valued as an alternative success route to management; some may combine both, but it is not a necessity. Therefore, expertise circles are key to give recognition to experts in and outside of their organisations &#8211; give them the opportunity to attend specific cyber events that can also enables them to grow their network and acquire more skills.<\/p>\n<p style=\"text-align: justify;\">In a nutshell, attracting and nurturing talents take time, and talent recruitment emerges as a pivotal element in corporate strategies. By embracing diversity and promoting gender convergence, we venture into new dimensions to build robust, thoughtful, and resilient teams.<\/p>\n<p style=\"text-align: justify;\">We aim to open the cyber field to those unfamiliar, fostering diversity, and creating vocations. Let&#8217;s reach out to people; and let&#8217;s not wait for them to come to us.<\/p>\n<p style=\"text-align: justify;\"><strong><em>\u00a0<\/em><\/strong><\/p>\n<p style=\"text-align: justify;\">We have created a benchmark tool to explore this multi-faceted topic (along with the ongoing research) and assess organisation\u2019s maturity. Reach out to us if you would like to be part of it! We would be very delighted to share with you the good ideas we have collected on the market\u2026 and the traps to avoid.<\/p>\n<p style=\"text-align: justify;\"><strong>Unicorns <\/strong>(don\u2019t misunderstand me, I am not talking about start-ups),<strong> Purple Squirrels, Ninja, Rockstars, don\u2019t exist but if we combine diverse profiles, we can get this highly qualified team! <\/strong><strong>&#x1f60e;<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cTalent shortage\u201d, \u201cskills gap\u201d, \u201cemployee burnout in cybersecurity\u201d, \u201chigh turnover rate\u201d \u2013 as a cybersecurity professional, you must be familiar with these expressions, for better or for worse. You may have seen the big headlines pointing out talent shortage issues&#8230;<\/p>\n","protected":false},"author":1368,"featured_media":22110,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,3977],"tags":[4331],"coauthors":[3505,4330],"class_list":["post-22115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-focus","tag-talent-management-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them - RiskInsight<\/title>\n<meta name=\"description\" content=\"\u201cTalent shortage\u201d, \u201cskills gap\u201d, \u201cemployee burnout in cybersecurity\u201d, \u201chigh turnover rate\u201d \u2013 as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"\u201cTalent shortage\u201d, \u201cskills gap\u201d, \u201cemployee burnout in cybersecurity\u201d, \u201chigh turnover rate\u201d \u2013 as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-22T13:35:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-22T13:35:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"No\u00ebmie Honor\u00e9, Val\u00e9rie Tong\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"No\u00ebmie Honor\u00e9, Val\u00e9rie Tong\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/\"},\"author\":{\"name\":\"No\u00ebmie Honor\u00e9\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/770c3b6033b52b37512a70d681a8440d\"},\"headline\":\"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them\",\"datePublished\":\"2023-12-22T13:35:02+00:00\",\"dateModified\":\"2023-12-22T13:35:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/\"},\"wordCount\":1337,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg\",\"keywords\":[\"talent management\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/\",\"name\":\"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg\",\"datePublished\":\"2023-12-22T13:35:02+00:00\",\"dateModified\":\"2023-12-22T13:35:03+00:00\",\"description\":\"\u201cTalent shortage\u201d, \u201cskills gap\u201d, \u201cemployee burnout in cybersecurity\u201d, \u201chigh turnover rate\u201d \u2013 as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/770c3b6033b52b37512a70d681a8440d\",\"name\":\"No\u00ebmie Honor\u00e9\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/noemie-honore\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them - RiskInsight","description":"\u201cTalent shortage\u201d, \u201cskills gap\u201d, \u201cemployee burnout in cybersecurity\u201d, \u201chigh turnover rate\u201d \u2013 as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/","og_locale":"en_US","og_type":"article","og_title":"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them - RiskInsight","og_description":"\u201cTalent shortage\u201d, \u201cskills gap\u201d, \u201cemployee burnout in cybersecurity\u201d, \u201chigh turnover rate\u201d \u2013 as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/","og_site_name":"RiskInsight","article_published_time":"2023-12-22T13:35:02+00:00","article_modified_time":"2023-12-22T13:35:03+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg","type":"image\/jpeg"}],"author":"No\u00ebmie Honor\u00e9, Val\u00e9rie Tong","twitter_misc":{"Written by":"No\u00ebmie Honor\u00e9, Val\u00e9rie Tong"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/"},"author":{"name":"No\u00ebmie Honor\u00e9","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/770c3b6033b52b37512a70d681a8440d"},"headline":"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them","datePublished":"2023-12-22T13:35:02+00:00","dateModified":"2023-12-22T13:35:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/"},"wordCount":1337,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg","keywords":["talent management"],"articleSection":["Cyberrisk Management &amp; Strategy","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/","name":"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg","datePublished":"2023-12-22T13:35:02+00:00","dateModified":"2023-12-22T13:35:03+00:00","description":"\u201cTalent shortage\u201d, \u201cskills gap\u201d, \u201cemployee burnout in cybersecurity\u201d, \u201chigh turnover rate\u201d \u2013 as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/Cyber-Purple-Squirrel.jpg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"The Quest for Cybersecurity\u2019s Purple Squirrels: How to Find and Keep Them"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/770c3b6033b52b37512a70d681a8440d","name":"No\u00ebmie Honor\u00e9","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/noemie-honore\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1368"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=22115"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22115\/revisions"}],"predecessor-version":[{"id":22119,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22115\/revisions\/22119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/22110"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=22115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=22115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=22115"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=22115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}