{"id":23690,"date":"2022-07-05T12:11:21","date_gmt":"2022-07-05T16:11:21","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=23690"},"modified":"2024-06-24T17:32:33","modified_gmt":"2024-06-24T21:32:33","slug":"find-cybersecurity-talent","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/","title":{"rendered":"Limited resources? How to find cybersecurity talent and grow your business in a labour crisis"},"content":{"rendered":"<p>Cybersecurity is inherently complicated. It\u2019s not an easy job, and it\u2019s a never-ending one as well. There\u2019s unfortunately no such thing as \u201ccompletely secure\u201d. There\u2019s \u201cmore secure\u201d and \u201cbehaving securely\u201d, but you\u2019ll never finish the game. Cybersecurity is a constant cycle of challenge and response.<\/p>\n<p>Many businesses can only make their <a href=\"https:\/\/www.sherweb.com\/security\/\">cybersecurity<\/a> as strong as their budget and human resources constraints allow. This can be frustrating for people working in the field. To us, it\u2019s obvious that we\u2014IT providers, security analysts, CSOs, etc.\u2014should do everything necessary to ensure our organizations are as secure as possible.<\/p>\n<p>At some point, however, we have to understand that the concept of \u201ceverything necessary\u201d is an endless pursuit. <a href=\"https:\/\/www.sherweb.com\/blog\/security\/building-your-security-offering\/\">You have to prioritize<\/a>. As security providers, we need to be able to choose which initiatives and investments will have the greatest return. This is true not only for the security protocols and procedures we put in place internally, but delivering <a href=\"https:\/\/www.sherweb.com\/blog\/security\/office-protect-alliance\/\">managed cybersecurity solutions<\/a> to customers as well.<\/p>\n<h2>Scaling your security business<\/h2>\n<p>It\u2019s no secret that demand for cybersecurity services is skyrocketing. Managed service providers (MSPs) and managed security service providers (MSSPs) are shooting themselves in the foot if they\u2019re not focused on growing in the current market. But it\u2019s also no secret that the <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/what-is-the-great-resignation\/\">labour market is tight<\/a>. Highly trained and educated cybersecurity workers are expensive, and even entry-level tech employees are <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/the-tech-worker-shortage\/\">hard to find and retain<\/a>.<\/p>\n<p>So for MSPs and MSSPs trying to grow their business, the options can seem limited. You can try to hire more people, which costs time and money, or you can try to become more efficient with the resources you have, which comes with its own set of challenges. Which is the better path?<\/p>\n<p>The answer is neither, and both ?.<\/p>\n<h2>Short-term solution: Make the most of what you have<\/h2>\n<p>People can&#8217;t have every skill set. This is something MSPs need to recognize when it comes to cybersecurity. Your people most likely wear a few different hats with regards to their roles and responsibilities. If your budget is strapped, think about how you can be efficient with the money you have. Can you be creative and <a href=\"https:\/\/www.sherweb.com\/blog\/security\/how-msps-can-add-value-to-their-offering-with-office-protect\/\">still provide a great return<\/a>?<\/p>\n<p>When I talk to MSPs and MSSPs, a lot of the conversation is around how to do more with the same amount of people. For a company that provides services, outsourcing and automation might seem like an oversimplified response, but we\u2019ve had a lot of success when we present this in a realistic and constructive way. We\u2019ll ask, &#8220;What roles are you having trouble staffing?&#8221; as well as &#8220;What do the people working for you now like most? Where are they more valuable?&#8221;<\/p>\n<p>The idea is: focus your attention, resources and manpower on your existing services that are profitable and appreciated by clients, and then find alternative solutions (be it <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/in-house-outsourced-helpdesk\/\">outsourcing or automation<\/a>) for other projects you want to accomplish. Hone in on the high-value, client-facing activities, and fill in the gaps for the less-exciting (but nevertheless important) stuff.<\/p>\n<h3>Standardize and automate where you can<\/h3>\n<p>Standardizing and automating as many operations as possible can help MSPs create a formulaic revenue model based on customer profiles with similar needs. Organizing the services you provide around specific verticals or target markets will also help implement a <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/identify-key-competitive-differentiators\/\">rinse-and-repeat strategy<\/a> for your business that will increase your <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/break-fix-to-managed-services\/\">monthly recurring revenue<\/a>.<\/p>\n<p>There are solutions out there that can help you deliver cybersecurity while maximizing your current staff capacity and continuing to add value for clients. Some Sherweb partners have been able to double the number of clients they could manage with the same number of staff. It\u2019s not magic, it\u2019s simply outsourcing time and labour-intensive activities like <a href=\"https:\/\/www.sherweb.com\/blog\/security\/office-protect-monitoring-alerts\/\">alert monitoring<\/a>, incident response management and SOC activities. This gives you more time to focus on new projects that <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/how-msps-can-avoid-revenue-loss\/\">make your MSP business more profitable<\/a>.<\/p>\n<p>Remember: you don\u2019t need to say yes to everything. Sherweb partners that have seen the most success in the cybersecurity realm are the ones that say no. That sounds crazy, saying you\u2019ll have more business by declining business, but we\u2019ve seen it over and over again. Building out a standardized stack for <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/microsoft-365-tenants\/\">security automation<\/a> as well as a standardized procedure by leveraging PSA or RMM will give you a dependable practice with consistent results.<\/p>\n<p>The MSPs and MSSPs we work with that grow the fastest are the ones who present a succinct offering. They say, \u201cI&#8217;m replacing your firewalls and router\u2014 your network equipment. Here&#8217;s my antivirus software. Here&#8217;s my EDR software.\u201d It has to be standard. Once you have that, you can go above and beyond with special projects to your heart\u2019s delight.<\/p>\n<p>Becoming more efficient with the resources available to us is a much more reliable path to success than trying to solve the labour crisis by ourselves. However, while automation, standardization and outsourcing will help address your capacity requirements and ability to scale, you\u2019ll never be able to ignore the <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/cost-of-hiring-employees\/\">HR side of things<\/a> completely.<\/p>\n<h3>Speaking of labour crisis\u2026<\/h3>\n<p>We know that the number of cyberthreats increase every day and <a href=\"https:\/\/fortune.com\/2022\/02\/17\/ransomware-attacks-surge-2021-report\/\">incidences of successful cybersecurity penetrations<\/a> continues to accelerate. The damage done per successful security breach is also increasing, despite the fact that we have more security tools at our disposal than ever before. And yet, fewer qualified humans are available to fill positions in the field. The cybersecurity talent supply is significantly lagging behind rapidly growing demand.<\/p>\n<p>If you\u2019re currently trying to find experienced cybersecurity talent with specific knowledge of the role you need filling, you\u2019re probably banging your head against a wall. These people do exist, they\u2019re highly educated and specialized, but you will struggle and compete to win them. If you succeed, they will be incredibly expensive, because supply.<\/p>\n<p>On the other hand, finding personnel willing to perform work such as <a href=\"https:\/\/www.sherweb.com\/blog\/security\/security-reporting-office-protect\/\">overnight security monitoring<\/a>, alert response and incident management is also a challenge in the current labour market. There\u2019s no simple fix for this. But that doesn\u2019t mean there aren\u2019t any solutions.<\/p>\n<p>One of the things we&#8217;ve done internally is <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/sharpen-solution-selling-with-partner-university\/\">train existing IT employees<\/a> to be cybersecurity specialists. We start by providing targeted training. Later, we assign them tasks assisted by automation and AI. Then, more high-level cybersecurity analysts provide further training on a number of standardized cybersecurity jobs.<\/p>\n<p>Hiring in IT isn\u2019t easy, but it&#8217;s still easier than hiring cybersecurity talent specifically.<\/p>\n<p>Another potential solution is grassroots and educational activities that drive people toward STEM subjects. If more people are exposed to the field of cybersecurity, it\u2019s only natural that more people will subsequently consider it as a career option.<\/p>\n<p>Sherweb works with academic institutions to create intern opportunities for students in cybersecurity programs. Collaborating with schools gives us an opportunity to create our own talent pipeline and influence the skills employees come with after they graduate. There\u2019s also the potential for these interns to return to us as full-time employees, bringing our efforts full circle.<\/p>\n<h2>Don\u2019t shy away from this opportunity<\/h2>\n<p>Now is the time to capitalize on cybersecurity demand. There\u2019s a lot of business out there for MSPs and MSSPs to take on. Even if you don\u2019t have the capacity right now, you can be more productive with the tools currently at your disposal by standardizing, automating and outsourcing processes wherever you can.<\/p>\n<p>You could also leverage a <a href=\"https:\/\/www.sherweb.com\/partners\/\">partner like Sherweb<\/a> to help you make it happen. By offloading menial tasks on our services, you can then reserve your best talent for where they matter most, on the front lines of your business with your customers. Sherweb provides services specifically designed to <a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\">fill gaps on MSP security teams<\/a>. Some of these roles are simply things nobody wants to do\u2014nobody wants to respond to an alert from a security system on a Sunday night\u2014 but that are crucial just the same. We can also assist with higher-level tasks and <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/partners\/resources-and-services\/\">business strategy,<\/a> empowering MSP partners to achieve their unique goals.<\/p>\n<p>A competitive labor market and talent deficit is something everyone in the tech business has to wrestle with, but it&#8217;s not the responsibility of individual MSPs and MSSPs to solve the crisis. Channel businesses can still offer security services and solutions despite a lack of cybersecurity talent. Empowering MSPs to do so is what Sherweb strives toward as a value-added cloud solutions partner. Take a look at our <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\">Partner Guide<\/a> to learn more, or reach out to us to start a conversation about how we can help your security business grow.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is inherently complicated. It\u2019s not an easy job, and it\u2019s a never-ending one as","protected":false},"author":84,"featured_media":23691,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[733,826,919],"class_list":["post-23690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-talent","tag-office-protect","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to find cybersecurity talent in a labour crisis | Sherweb<\/title>\n<meta name=\"description\" content=\"Finding highly trained and educated cybersecurity talent is expensive, and even entry-level tech employees are hard to find and retain.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to find cybersecurity talent in a labour crisis | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Finding highly trained and educated cybersecurity talent is expensive, and even entry-level tech employees are hard to find and retain.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-05T16:11:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-24T21:32:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/FindingCybersecurityTalent-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guillaume Boisvert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/GoGreenwood1\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guillaume Boisvert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/\"},\"author\":{\"name\":\"Guillaume Boisvert\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/9d7eaf664a5d618b082f0a8454c779f5\"},\"headline\":\"Limited resources? How to find cybersecurity talent and grow your business in a labour crisis\",\"datePublished\":\"2022-07-05T16:11:21+00:00\",\"dateModified\":\"2024-06-24T21:32:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/\"},\"wordCount\":1459,\"commentCount\":7,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/FindingCybersecurityTalent-1200x480-1.jpg\",\"keywords\":[\"Talent\",\"Office Protect\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/\",\"name\":\"How to find cybersecurity talent in a labour crisis | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/FindingCybersecurityTalent-1200x480-1.jpg\",\"datePublished\":\"2022-07-05T16:11:21+00:00\",\"dateModified\":\"2024-06-24T21:32:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/9d7eaf664a5d618b082f0a8454c779f5\"},\"description\":\"Finding highly trained and educated cybersecurity talent is expensive, and even entry-level tech employees are hard to find and retain.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/FindingCybersecurityTalent-1200x480-1.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/FindingCybersecurityTalent-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"Illustration of workers looking for cybersecurity talent\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/find-cybersecurity-talent\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Limited resources? How to find cybersecurity talent and grow your business in a labour crisis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/9d7eaf664a5d618b082f0a8454c779f5\",\"name\":\"Guillaume Boisvert\",\"description\":\"Guillaume identifies and evaluates new solutions and product features that help Sherweb and its partners grow and compete. Responsible for the growth and development of Office Protect, Sherweb\u2019s security add-on for Microsoft 365, Guillaume leads the team responsible for building and commercializing the company's in-house security offering. He has almost two decades of experience developing software-as-a-service (SaaS), both as a technical lead and as a product manager.\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/GoGreenwood1\"],\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/guillaumeboisvert\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to find cybersecurity talent in a labour crisis | Sherweb","description":"Finding highly trained and educated cybersecurity talent is expensive, and even entry-level tech employees are hard to find and retain.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/","og_locale":"en_US","og_type":"article","og_title":"How to find cybersecurity talent in a labour crisis | Sherweb","og_description":"Finding highly trained and educated cybersecurity talent is expensive, and even entry-level tech employees are hard to find and retain.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2022-07-05T16:11:21+00:00","article_modified_time":"2024-06-24T21:32:33+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/FindingCybersecurityTalent-1200x480-1.jpg","type":"image\/jpeg"}],"author":"Guillaume Boisvert","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/GoGreenwood1","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Guillaume Boisvert","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/"},"author":{"name":"Guillaume Boisvert","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/9d7eaf664a5d618b082f0a8454c779f5"},"headline":"Limited resources? How to find cybersecurity talent and grow your business in a labour crisis","datePublished":"2022-07-05T16:11:21+00:00","dateModified":"2024-06-24T21:32:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/"},"wordCount":1459,"commentCount":7,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/FindingCybersecurityTalent-1200x480-1.jpg","keywords":["Talent","Office Protect","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/","url":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/","name":"How to find cybersecurity talent in a labour crisis | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/FindingCybersecurityTalent-1200x480-1.jpg","datePublished":"2022-07-05T16:11:21+00:00","dateModified":"2024-06-24T21:32:33+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/9d7eaf664a5d618b082f0a8454c779f5"},"description":"Finding highly trained and educated cybersecurity talent is expensive, and even entry-level tech employees are hard to find and retain.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/#primaryimage","url":"\/blog\/wp-content\/uploads\/FindingCybersecurityTalent-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/FindingCybersecurityTalent-1200x480-1.jpg","width":2400,"height":920,"caption":"Illustration of workers looking for cybersecurity talent"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/find-cybersecurity-talent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Limited resources? How to find cybersecurity talent and grow your business in a labour crisis"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/9d7eaf664a5d618b082f0a8454c779f5","name":"Guillaume Boisvert","description":"Guillaume identifies and evaluates new solutions and product features that help Sherweb and its partners grow and compete. Responsible for the growth and development of Office Protect, Sherweb\u2019s security add-on for Microsoft 365, Guillaume leads the team responsible for building and commercializing the company's in-house security offering. He has almost two decades of experience developing software-as-a-service (SaaS), both as a technical lead and as a product manager.","sameAs":["https:\/\/x.com\/https:\/\/twitter.com\/GoGreenwood1"],"url":"https:\/\/www.sherweb.com\/blog\/author\/guillaumeboisvert\/"}]}},"tag_names":["Talent","Office Protect","Cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/23690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=23690"}],"version-history":[{"count":2,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/23690\/revisions"}],"predecessor-version":[{"id":24876,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/23690\/revisions\/24876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/23691"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=23690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=23690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=23690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}