{"id":226,"date":"2022-03-24T22:54:00","date_gmt":"2022-03-24T22:54:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=226"},"modified":"2024-01-22T08:58:14","modified_gmt":"2024-01-22T16:58:14","slug":"the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/","title":{"rendered":"The Great Resignation Isn&#8217;t Going Away. Here&#8217;s How to Retain Your Cybersecurity Employees."},"content":{"rendered":"\n<p>Demand for information security professionals is undoubtedly very high. Cyberattacks and ransomware seem to be in the news daily, and no one in the industry will soon forget (or escape) the consequences of the massive cleanup required by\u00a0<a href=\"\/blog\/apache-log4j-vulnerability-cve-2021-44228-aka-log4shell\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4Shell<\/a>. Despite the best efforts of automation and AI, we will always need people to prevent hackers from stealing data and wreaking havoc on computer networks essential for most businesses today. In essence, a domino effect over the last two years of Covid-19 has led to the \u201c<a href=\"https:\/\/fortune.com\/2022\/01\/04\/great-resignation-record-quit-rate-4-5-million\/\" target=\"_blank\" rel=\"noreferrer noopener\">Great Resignation<\/a>\u201d and the \u201cGreat Retirement.\u201d<\/p>\n\n\n\n<p>I recall first hearing of the Great Resignation in September 2021 as we saw a record surge in voluntary \u201cquits,\u201d especially in health care and services industries. I didn\u2019t think much about it until the&nbsp;<a href=\"https:\/\/www.bls.gov\/news.release\/pdf\/jolts.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">latest report<\/a>&nbsp;from the Bureau of Labor Statistics confirmed that the trend is likely continuing into 2022 as November 2021 showed&nbsp;<em>even more<\/em>&nbsp;record-breaking resignations than in September. What is the outlook in our little section of the economy called cybersecurity? Where did this trend of resignations come from? How do we stop it?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Domino 1 of 5: Work From Home<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"155\" height=\"189\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png\" alt=\"\" class=\"wp-image-232\"\/><\/figure><\/div>\n\n\n<p>Looking back to the beginning of 2020, we started the year with budgets and start of year kickoffs and face-to-face events like RSA in San Francisco. But by Mid-March, everything had changed. Kids couldn\u2019t go to school, work was 100% remote unless you were in services or healthcare, and&nbsp;<a href=\"https:\/\/www.cnbc.com\/2020\/05\/08\/these-industries-suffered-the-biggest-job-losses-in-april-2020.html\" target=\"_blank\" rel=\"noreferrer noopener\">companies downsized<\/a>. This set the context for what would come next for cybersecurity. The first domino fell.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Domino 2 of 5: Remote Access Surge<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"146\" height=\"159\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.48.17-PM.png\" alt=\"\" class=\"wp-image-231\"\/><\/figure><\/div>\n\n\n<p>For business to survive, enterprises large and small needed to launch unforeseen projects deploying VPNs, remote gateways, and access controls for employees and partners.&nbsp;<a href=\"https:\/\/www.cnet.com\/tech\/services-and-software\/vpn-use-surges-during-the-coronavirus-lockdown-but-so-do-security-risks\/\" target=\"_blank\" rel=\"noreferrer noopener\">VPN usage surged<\/a>&nbsp;as countries responded to the pandemic. And at CyCognito, we saw as much as 600% increase in these services from Feb 2020 to Feb 2021 throughout all monitored attack surfaces. In other words, in some cases an attack surface would have as few as 1:200 remote services increasing to 1:32 systems for remote access. The rush to deploy this vital infrastructure came with time pressure and limited resources. The old project mantra held true:&nbsp;<em>you can have it good, fast, and cheap, but you can only pick two.<\/em>&nbsp;As the&nbsp;<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa20-073a\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity &amp; Infrastructure Security Agency (CISA) noted<\/a>, constrained on fast and cheap, good security fell by the wayside as organizations struggled to keep the lights on. The second domino began its descent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Domino 3 of 5: High-Profile Breaches<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"188\" height=\"174\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.46.00-PM.png\" alt=\"\" class=\"wp-image-230\"\/><\/figure><\/div>\n\n\n<p>Cybercriminals and state actors \u2014 also working from home I imagine \u2014 took advantage of this rush to execute tremendously damaging and expensive cyber attacks. The SUNBURST SolarWinds <a href=\"\/blog\/creating-cyber-reconnaissance\/\" target=\"_blank\" rel=\"noreferrer noopener\">breach<\/a>\u00a0compromised companies via their supply chain; a vector previously assumed to be secure. Then\u00a0<a href=\"\/blog\/what-the-microsoft-exchange-zero-days-tell-us-about-the-attack-surface\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Exchange systems were targeted<\/a>\u00a0leading to cleanup that continues to this day. And we had\u00a0<a href=\"\/blog\/accellion-supply-chain-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">Accellion<\/a>,\u00a0<a href=\"\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Colonial Pipeline<\/a>, and finally to round out 2021 and beyond,\u00a0<a href=\"\/blog\/apache-log4j-vulnerability-cve-2021-44228-aka-log4shell\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4Shell<\/a>. These high profile breaches raised awareness of the threats and how supply chain risks affect everyone. More than ever, defenders are feeling the burden of their positions.The third domino took a hit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Domino 4 of 5: Demographics<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"161\" height=\"141\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.46.07-PM.png\" alt=\"\" class=\"wp-image-229\"\/><\/figure><\/div>\n\n\n<p>The fourth domino is demographics and it\u2019s teeter has been predictable for some time. It\u2019s been noted our workplaces seem to be a&nbsp;<a href=\"https:\/\/www.resource1.com\/baby-boomers-generation-x-and-generation-y-in-the-workplace-a-melting-pot-of-expertise\/\" target=\"_blank\" rel=\"noreferrer noopener\">melting pot of generations<\/a>&nbsp;and some stereotypes about attitudes and technology adoption write themselves. But with a surging stock market and incentives for voluntary layoffs several older workers opted to retire rather than continue slugging it out with hyber motivated, well-funded cyber-criminals and nation state actors. Additionally we saw&nbsp;<a href=\"https:\/\/www.npr.org\/2022\/01\/13\/1072529477\/more-than-1-million-fewer-students-are-in-college-the-lowest-enrollment-numbers-\" target=\"_blank\" rel=\"noreferrer noopener\">over 1 million fewer students in college<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Domino 5 of 5: Resignation to Demand<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"228\" height=\"156\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.46.12-PM.png\" alt=\"\" class=\"wp-image-228\" style=\"width:155px;height:auto\"\/><\/figure><\/div>\n\n\n<p>The Bureau of Labor Statistics (BLS) estimates the demand for&nbsp;<a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Information Security Analysts<\/a>&nbsp;will grow by 33% over the next ten years, much faster than the average for all industries of 8%. They further note that many of those openings result from needing replacements for workers transferring to different occupations or exiting the labor force, such as to retire.<\/p>\n\n\n\n<p>Another way to view this is through the lens of job openings. For example, if we look at Cyberseek\u2019s helpful interactive data on this subject, we see 597,767 job openings in cybersecurity out of a total employed workforce of 1,053,468. Put another way, 64% of the desired workforce is doing 100% of the work we need to do. And the problem is just getting worse.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1154\" height=\"624\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-23-at-7.50.43-PM.png\" alt=\"\" class=\"wp-image-227\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-23-at-7.50.43-PM.png 1154w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-23-at-7.50.43-PM-512x277.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-23-at-7.50.43-PM-768x415.png 768w\" sizes=\"auto, (max-width: 1154px) 100vw, 1154px\" \/><\/figure>\n\n\n\n<p><em>Figure 1 &#8211; Cyberseek CYBERSECURITY SUPPLY\/DEMAND HEAT MAP showing state-by-state job openings. Interactive map is at:&nbsp;<a href=\"https:\/\/www.cyberseek.org\/heatmap.html\">https:\/\/www.cyberseek.org\/heat&#8230;<\/a><\/em><\/p>\n\n\n\n<p>The ever increasing adoption of cloud services, expanding dynamic attack surfaces, and a rise in the number and sophistication of cybersecurity threats will increase demand for cybersecurity professionals in all industries reliant on technology for the coming decade. Financial institutions, discrete manufacturing, and other types of corporations will also need to increase their information security capabilities in the face of growing threats. In addition, as the healthcare industry relies more heavily on telehealth, ensuring patients\u2019 privacy and protecting personal data is essential because&nbsp;medical records are orders of magnitude more valuable&nbsp;than other data for sale on the darkweb. The final domino of shortage is poised to tumble.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Maintain Your IT Security Team<\/h2>\n\n\n\n<p>As these dominos fall, and cybersecurity staffing becomes harder (and it was already pretty darn hard), there are several things that I recommend to combat it:<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">1) Embrace Automation<\/h5>\n\n\n\n<p>Most jobs have a certain amount of tedious, rote work and cybersecurity is no exception. But for most of us, the less of this work we have to do, the more we enjoy our jobs. That\u2019s why it\u2019s necessary for organizations to automate every process they can, enabling their staff to focus on the things that require human intervention and ingenuity.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2) Find solutions to help prioritize the workload<\/h5>\n\n\n\n<p>Burnout is a real risk in many fields, including security. Often, burnout happens when team members are consistently overloaded with more work than they can reasonably do in any given day, month, week. Managers can help with this by being clear on priorities across their team, but another way, particular to security and vulnerability management in particular, is by finding solutions that can clearly and meaningfully prioritize which attack vectors to prioritize, in what order. That way, the team knows what to work on today and what can be pushed off to tomorrow.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">3) Recognize that hybrid work is here to stay<\/h5>\n\n\n\n<p>Yes, there are some teams, some industries, and some job functions that may well need to come into the office. However, for all others, in order to attract and retain the best talent, as the world opens up again after 2 years of lockdowns, it\u2019s important to recognize that people have gotten used to and now expect to be able to maintain some level of ability to work remotely. In the fight for the best talent, don\u2019t let this be the area that your team falls short.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">4) Make room for and prioritize career growth<\/h5>\n\n\n\n<p>Give them time to take continuing education, and push your HR team to formalize a mentorship\/career growth path.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">5) Foster psychological safety by being prepared<\/h5>\n\n\n\n<p>Security is the frontlines in this increasingly cyber-converged world we live in. Fighting the good fight against attackers is a day in and day out, 24\/365 job and stressor. This \u201c<a href=\"https:\/\/www.youtube.com\/watch?v=tQwVKr8rCYw\" target=\"_blank\" rel=\"noreferrer noopener\">Surface Pressure<\/a>\u201d (if you\u2019ve heard the song from Encanto) takes a toll on the wellbeing and mental health of the team. One way to help team members mitigate the stress, so they don\u2019t choose to join the Great Resignation, is to create a workplace environment where they don\u2019t feel that their jobs may well be on the lines if the company is breached. As we all know, \u201cit\u2019s not if, but when.\u201d First, focus on setting up a best-in-class set of solutions for proactive security to establish that strong wall keeping attackers out. Beyond that, do everything you can to be prepared to quickly and clearly answer when executives or the board ask about the organization\u2019s exposure to a high-profile incident like\u00a0<a href=\"\/blog\/two-cycognito-log4j2-testing-modules\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4j<\/a>\u00a0or\u00a0<a href=\"\/blog\/how-to-improve-security-posture\/\" target=\"_blank\" rel=\"noreferrer noopener\">SolarWinds<\/a>\u00a0with data. And if the worst should happen and you have been breached, be sure you already have a response plan in place with legal, the executive team, and all other stakeholders so you don\u2019t have to scramble at the 11th hour to work this out. See my\u00a0<a href=\"\/blog\/setup-your-log4j-response-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">response checklist<\/a>\u00a0and\u00a0<a href=\"\/blog\/5-parts-of-good-breach-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">tips on disclosure best practices<\/a>\u00a0to help get you started.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">6) Try CyCognito automation that virtually grows your team so they thrive<\/h5>\n\n\n\n<p><a href=\"\/platform\/\" target=\"_blank\" rel=\"noreferrer noopener\">CyCognito\u2019s platform<\/a>\u00a0is designed from the ground up to automate\u00a0<a href=\"\/external-attack-surface-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">external attack surface management\u00a0<\/a>and prioritize the riskiest security gaps which means more satisfying and valuable work for your cybersecurity workforce. We supplement existing efforts aimed at reducing enterprise risk with our automation and AI, then merge that intelligence with security workflows to help shut down attacks before they happen which gives your teams an edge in the battle against attackers. I\u2019m certainly biased, but give us a look to help your recruitment and retention efforts by taking some of the burden off of security and offloading it to our platform.<\/p>\n\n\n\n<p>If you\u2019d like to learn more check out our&nbsp;<a href=\"\/resources\/videos\/demo\/\">demo video<\/a>&nbsp;and&nbsp;<a href=\"\/customers\/\">customer<\/a>&nbsp;testimonials.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite the best efforts of automation and AI, we will always need people to prevent hackers from stealing data and wreaking havoc on computer networks essential for most businesses today. In essence, a domino effect over the last two years of Covid-19 has led to the \u201cGreat Resignation\u201d and the \u201cGreat Retirement.\u201d<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[37,93,92],"class_list":["post-226","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-automation","tag-cybersecurity-staffing","tag-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Great Resignation Isn&#039;t Going Away. Here&#039;s How to Retain Your Cybersecurity Employees. | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Great Resignation Isn&#039;t Going Away. Here&#039;s How to Retain Your Cybersecurity Employees. | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Despite the best efforts of automation and AI, we will always need people to prevent hackers from stealing data and wreaking havoc on computer networks essential for most businesses today. In essence, a domino effect over the last two years of Covid-19 has led to the \u201cGreat Resignation\u201d and the \u201cGreat Retirement.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-24T22:54:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-22T16:58:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png\" \/>\n<meta name=\"author\" content=\"Jim Wachhaus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Wachhaus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/\"},\"author\":{\"name\":\"Jim Wachhaus\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\"},\"headline\":\"The Great Resignation Isn&#8217;t Going Away. Here&#8217;s How to Retain Your Cybersecurity Employees.\",\"datePublished\":\"2022-03-24T22:54:00+00:00\",\"dateModified\":\"2024-01-22T16:58:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/\"},\"wordCount\":1555,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png\",\"keywords\":[\"Automation\",\"Cybersecurity Staffing\",\"IT Security\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/\",\"name\":\"The Great Resignation Isn't Going Away. Here's How to Retain Your Cybersecurity Employees. | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png\",\"datePublished\":\"2022-03-24T22:54:00+00:00\",\"dateModified\":\"2024-01-22T16:58:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png\",\"width\":155,\"height\":189},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Great Resignation Isn&#8217;t Going Away. Here&#8217;s How to Retain Your Cybersecurity Employees.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\",\"name\":\"Jim Wachhaus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"caption\":\"Jim Wachhaus\"},\"description\":\"Was Director of Technical Product Marketing at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Great Resignation Isn't Going Away. Here's How to Retain Your Cybersecurity Employees. | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/","og_locale":"en_US","og_type":"article","og_title":"The Great Resignation Isn't Going Away. Here's How to Retain Your Cybersecurity Employees. | CyCognito Blog","og_description":"Despite the best efforts of automation and AI, we will always need people to prevent hackers from stealing data and wreaking havoc on computer networks essential for most businesses today. In essence, a domino effect over the last two years of Covid-19 has led to the \u201cGreat Resignation\u201d and the \u201cGreat Retirement.\u201d","og_url":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/","og_site_name":"CyCognito Blog","article_published_time":"2022-03-24T22:54:00+00:00","article_modified_time":"2024-01-22T16:58:14+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png","type":"","width":"","height":""}],"author":"Jim Wachhaus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Wachhaus","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/"},"author":{"name":"Jim Wachhaus","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0"},"headline":"The Great Resignation Isn&#8217;t Going Away. Here&#8217;s How to Retain Your Cybersecurity Employees.","datePublished":"2022-03-24T22:54:00+00:00","dateModified":"2024-01-22T16:58:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/"},"wordCount":1555,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png","keywords":["Automation","Cybersecurity Staffing","IT Security"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/","url":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/","name":"The Great Resignation Isn't Going Away. Here's How to Retain Your Cybersecurity Employees. | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png","datePublished":"2022-03-24T22:54:00+00:00","dateModified":"2024-01-22T16:58:14+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-21-at-5.45.42-PM.png","width":155,"height":189},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Great Resignation Isn&#8217;t Going Away. Here&#8217;s How to Retain Your Cybersecurity Employees."}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0","name":"Jim Wachhaus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","caption":"Jim Wachhaus"},"description":"Was Director of Technical Product Marketing at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":4,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/226\/revisions"}],"predecessor-version":[{"id":686,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/226\/revisions\/686"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}