{"id":78334,"date":"2023-02-02T06:55:28","date_gmt":"2023-02-02T06:55:28","guid":{"rendered":"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/?p=77900"},"modified":"2026-03-11T21:22:27","modified_gmt":"2026-03-11T21:22:27","slug":"organizations-handling-cloud-security-skills-gap-2023","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/","title":{"rendered":"How Organizations Are Handling the Cloud Security Skills Gap in 2023"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78334\" class=\"elementor elementor-78334\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d703472 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d703472\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d5cb972\" data-id=\"d5cb972\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be292b7 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"be292b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Desktop.jpg\" class=\"attachment-full size-full wp-image-78508\" alt=\"How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Desktop\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Desktop.jpg 1024w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Desktop-300x153.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Desktop-768x391.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1185d3 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"f1185d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"521\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mob.jpg\" class=\"attachment-full size-full wp-image-78507\" alt=\"How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mob\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mob.jpg 521w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mob-300x300.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mob-150x150.jpg 150w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a242ff8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a242ff8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d47524\" data-id=\"7d47524\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebd3546 elementor-widget elementor-widget-heading\" data-id=\"ebd3546\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">How Organizations Are Handling the Cloud Security Skills Gap in 2023<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-971c440 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"971c440\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1dbc424\" data-id=\"1dbc424\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-690297b elementor-widget elementor-widget-post-info\" data-id=\"690297b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a4968b2 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>February 2, 2023<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-5dadb57 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"#author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tKimberly Mentzell\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45dc397 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"\/cybersecurity-exchange\/cloud-security\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tCloud Security\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98432b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98432b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6abf6b0\" data-id=\"6abf6b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6201be8 elementor-widget elementor-widget-text-editor\" data-id=\"6201be8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>EC-Council&#8217;s latest whitepaper, &#8220;How Organizations Are Handling the Cloud Security Skills Gap in 2023,&#8221; authored by Kimberly Mentzell, Cybersecurity Program Manager at the Maryland Department of Commerce, provides valuable insights into the current state of cloud security skills gap and how organizations are addressing this challenge.<\/p><p>The whitepaper highlights that cloud adoption has accelerated rapidly over the last few years, and organizations are now heavily relying on cloud service providers for their critical infrastructure and applications. However, the skills gap in cloud security has become a significant challenge for many organizations, with a shortage of experienced professionals in this field. The whitepaper explores organizations&#8217; various approaches to bridging the skills gap, including training and certification programs, outsourcing, and partnering with Managed Security Service Providers (MSSPs). While training and certification programs are beneficial, they require significant time and money. Outsourcing and partnering with MSSPs can effectively overcome the skills gap, but it can also increase the risk of data breaches and other security incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b49e27 elementor-widget elementor-widget-image\" data-id=\"4b49e27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"1500\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/top-5-tools-to-use-for-successful-cloud-migration-in-2023.jpg\" class=\"attachment-full size-full wp-image-78551\" alt=\"top 5 tools to use for successful cloud migration in 2023\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/top-5-tools-to-use-for-successful-cloud-migration-in-2023.jpg 1000w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/top-5-tools-to-use-for-successful-cloud-migration-in-2023-200x300.jpg 200w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/top-5-tools-to-use-for-successful-cloud-migration-in-2023-683x1024.jpg 683w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/top-5-tools-to-use-for-successful-cloud-migration-in-2023-768x1152.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1915435 elementor-widget elementor-widget-text-editor\" data-id=\"1915435\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe whitepaper also highlights the importance of adopting a risk-based approach to cloud security, which involves identifying the most critical assets and applying the appropriate security measures to protect them. This approach requires a deep understanding of the organization&#8217;s business processes, risk tolerance, and regulatory requirements. Overall, the whitepaper provides valuable insights for organizations seeking to bridge the cloud security skills gap. It emphasizes the need for a holistic cloud security approach involving people, processes, and technology. By adopting a risk-based approach and investing in training, certification, and partnering with MSSPs, organizations can ensure they have the necessary skills and expertise to protect their critical assets in the cloud.\nIn conclusion, EC-Council&#8217;s whitepaper on &#8220;How Organizations Are Handling the Cloud Security Skills Gap in 2023&#8221; provides valuable insights into the current state of the cloud security skills gap and how organizations are addressing this challenge. It emphasizes the need for a holistic cloud security approach involving people, processes, and technology. To learn more about how your organization can address the cloud security skills gap, download the whitepaper by submitting the details in the form below.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>EC-Council&#8217;s latest whitepaper, &#8220;How Organizations Are Handling the Cloud Security Skills Gap in 2023,&#8221; authored by Kimberly Mentzell, Cybersecurity Program Manager at the Maryland Department of Commerce, provides valuable insights into the current state of cloud security skills gap and how organizations are addressing this challenge. The whitepaper highlights that cloud adoption has accelerated rapidly&hellip;<\/p>\n","protected":false},"author":53,"featured_media":78378,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12228],"tags":[12313,12314,12315,12316,12282,12317,12318,12319,12320,12321,12268,12322,12323,12284,12324,12325,12326,12269,12327,199,12277,12261,12262,12328,12329,12330,12250,12331,12307,12332],"class_list":{"0":"post-78334","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-whitepaper","8":"tag-cloudadoption","9":"tag-cloudbestpractices","10":"tag-cloudchallenges","11":"tag-cloudcompliance","12":"tag-cloudcomputing","13":"tag-cloudgovernance","14":"tag-cloudinfrastructure","15":"tag-cloudmigration","16":"tag-cloudregulations","17":"tag-cloudrisk","18":"tag-cloudsecurity","19":"tag-cloudsecurityskillsgap","20":"tag-cloudskills","21":"tag-cloudsolutions","22":"tag-cloudstrategy","23":"tag-cloudtraining","24":"tag-cloudtransformation","25":"tag-cyberawareness","26":"tag-cyberhygiene","27":"tag-cybersecurity","28":"tag-datasecurity","29":"tag-digitalsecurity","30":"tag-informationsecurity","31":"tag-itinfrastructure","32":"tag-itleadership","33":"tag-itmanagement","34":"tag-itsecurity","35":"tag-ittraining","36":"tag-securityawareness","37":"tag-securitytraining"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Handling Cloud Security Skills Gap on Organizational level - CCSE<\/title>\n<meta name=\"description\" content=\"This Cyber security white paper discusses some of the key challenges associated with the cloud security skills gap and what organizations are doing to address this issue.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Handling Cloud Security Skills Gap on Organizational level - CCSE\" \/>\n<meta property=\"og:description\" content=\"This Cyber security white paper discusses some of the key challenges associated with the cloud security skills gap and what organizations are doing to address this issue.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-02T06:55:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T21:22:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kimberly Mentzell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Handling Cloud Security Skills Gap on Organizational level - CCSE\" \/>\n<meta name=\"twitter:description\" content=\"This Cyber security white paper discusses some of the key challenges associated with the cloud security skills gap and what organizations are doing to address this issue.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kimberly Mentzell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/\"},\"author\":{\"name\":\"Kimberly Mentzell\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/77f88c3276745e535d9e41ae233c0a3d\"},\"headline\":\"How Organizations Are Handling the Cloud Security Skills Gap in 2023\",\"datePublished\":\"2023-02-02T06:55:28+00:00\",\"dateModified\":\"2026-03-11T21:22:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/\"},\"wordCount\":359,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg\",\"keywords\":[\"CloudAdoption\",\"CloudBestPractices\",\"CloudChallenges\",\"CloudCompliance\",\"CloudComputing\",\"CloudGovernance\",\"CloudInfrastructure\",\"CloudMigration\",\"CloudRegulations\",\"CloudRisk\",\"CloudSecurity\",\"CloudSecuritySkillsGap\",\"CloudSkills\",\"CloudSolutions\",\"CloudStrategy\",\"CloudTraining\",\"CloudTransformation\",\"cyberawareness\",\"CyberHygiene\",\"cybersecurity\",\"datasecurity\",\"digitalsecurity\",\"InformationSecurity\",\"ITInfrastructure\",\"ITLeadership\",\"ITManagement\",\"ITSecurity\",\"ITTraining\",\"SecurityAwareness\",\"SecurityTraining\"],\"articleSection\":[\"Whitepaper\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/\",\"name\":\"Handling Cloud Security Skills Gap on Organizational level - CCSE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg\",\"datePublished\":\"2023-02-02T06:55:28+00:00\",\"dateModified\":\"2026-03-11T21:22:27+00:00\",\"description\":\"This Cyber security white paper discusses some of the key challenges associated with the cloud security skills gap and what organizations are doing to address this issue.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg\",\"width\":521,\"height\":521,\"caption\":\"How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/organizations-handling-cloud-security-skills-gap-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Whitepaper\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/whitepaper\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How Organizations Are Handling the Cloud Security Skills Gap in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/77f88c3276745e535d9e41ae233c0a3d\",\"name\":\"Kimberly Mentzell\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Handling Cloud Security Skills Gap on Organizational level - CCSE","description":"This Cyber security white paper discusses some of the key challenges associated with the cloud security skills gap and what organizations are doing to address this issue.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/","og_locale":"en_US","og_type":"article","og_title":"Handling Cloud Security Skills Gap on Organizational level - CCSE","og_description":"This Cyber security white paper discusses some of the key challenges associated with the cloud security skills gap and what organizations are doing to address this issue.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-02-02T06:55:28+00:00","article_modified_time":"2026-03-11T21:22:27+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg","type":"image\/jpeg"}],"author":"Kimberly Mentzell","twitter_card":"summary_large_image","twitter_title":"Handling Cloud Security Skills Gap on Organizational level - CCSE","twitter_description":"This Cyber security white paper discusses some of the key challenges associated with the cloud security skills gap and what organizations are doing to address this issue.","twitter_misc":{"Written by":"Kimberly Mentzell","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/"},"author":{"name":"Kimberly Mentzell","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/77f88c3276745e535d9e41ae233c0a3d"},"headline":"How Organizations Are Handling the Cloud Security Skills Gap in 2023","datePublished":"2023-02-02T06:55:28+00:00","dateModified":"2026-03-11T21:22:27+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/"},"wordCount":359,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg","keywords":["CloudAdoption","CloudBestPractices","CloudChallenges","CloudCompliance","CloudComputing","CloudGovernance","CloudInfrastructure","CloudMigration","CloudRegulations","CloudRisk","CloudSecurity","CloudSecuritySkillsGap","CloudSkills","CloudSolutions","CloudStrategy","CloudTraining","CloudTransformation","cyberawareness","CyberHygiene","cybersecurity","datasecurity","digitalsecurity","InformationSecurity","ITInfrastructure","ITLeadership","ITManagement","ITSecurity","ITTraining","SecurityAwareness","SecurityTraining"],"articleSection":["Whitepaper"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/","name":"Handling Cloud Security Skills Gap on Organizational level - CCSE","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg","datePublished":"2023-02-02T06:55:28+00:00","dateModified":"2026-03-11T21:22:27+00:00","description":"This Cyber security white paper discusses some of the key challenges associated with the cloud security skills gap and what organizations are doing to address this issue.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile.jpg","width":521,"height":521,"caption":"How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile"},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/organizations-handling-cloud-security-skills-gap-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Whitepaper","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/whitepaper\/"},{"@type":"ListItem","position":4,"name":"How Organizations Are Handling the Cloud Security Skills Gap in 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/77f88c3276745e535d9e41ae233c0a3d","name":"Kimberly Mentzell"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=78334"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78334\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/78378"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=78334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=78334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=78334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}