Archives October 2025

Why the Cyber Skills Gap Is Slowing Government’s Cyber Maturity

by Tim Eichmann


When I talk to CISOs and technology leaders in government, one recurring frustration is — knowing what “good” looks like is no longer the real problem. Many agencies have maturity models, policies, even roadmaps — but turning those into real, resilient security is where the rubber meets the road. And that’s where the skills gap for attracting and retaining cyber skills for government organisations becomes a real problem.

What do we mean by “cyber maturity”?

In Australia, one visible benchmark is the Essential Eight maturity model defined by the Australian Signals Directorate (ASD).

As an overview, you aim for one of four maturity levels:

  • Maturity Level 0 — you’re not aligned with the intent
  • Level 1 — partial implementation
  • Level 2 — mostly aligned
  • Level 3 — full alignment, with robustness against advanced threats

Beyond the technical controls of the Essential Eight, maturity also includes organisational elements — incident response, leadership, threat intelligence capability, governance, and security culture. The full “cyber posture” of an agency is more than ticking boxes (or should be!!).


Where is the government now?

Having worked in a number of government organisations, both at the federal level and the QLD state level, I can honestly say the picture isn’t great. Staff tend to “massage” numbers to lessen the extent of the problem — no one wants to be seen as the problem in a skills-constrained environment. Managers then “shine” the numbers further up the chain… by the time it gets to board level, things can look far rosier than reality.

Public reporting also paints a sobering picture:

  • According to the Commonwealth Cyber Security Posture 2024 report, only 15% of all government entities achieved overall Maturity Level 2 across the Essential Eight in 2024 — down from 25% in 2023.
  • Many agencies cited legacy IT systems as a roadblock — 71% said legacy systems hindered implementing the Essential Eight (up from 52% a year earlier).
  • Only about 32% of agencies reported half or more of observed security incidents to ASD.
  • On the recruiting front, the Australian Public Service (APS) already flags difficulty attracting mid/experienced cyber/digital staff across agencies as an emerging risk.
  • Projections suggest Australia may face a shortage of approximately 3,000 cyber security professionals by 2026.

Under-reporting of security incidents is telling — people don’t want to report risks or issues up the chain. Reporting is seen as failure rather than a red flag to get help. These figures tell us: government is not just behind; in some metrics, it’s slipping. The maturity floor is too low, and for many agencies, the climb is steep.


Why is increasing maturity especially hard in the public sector?

Government bodies face unique structural and institutional constraints that make maturity uplift more challenging:

  1. Legacy systems and technical debt
    Decades-old systems, insecure platforms, unsupported software — many public agencies can’t easily redefine or replace core infrastructure. Aligning to modern security controls is hugely complex. (This 2024 reporting confirms this as a top obstacle.)
  2. Procurement, budgeting cycles, and bureaucratic inertia
    Security work is often underfunded in multi-year plans. Even when funding exists, procurement rules slow the adoption of newer tools, lock you into vendors, or discourage experimentation.
    In QLD government, 12-month funding cycles make it near impossible to fund initiatives like Identity Management that take 2–3 years. Without funding model changes, uplift stalls.
  3. Siloed governance, risk aversion, and stakeholder constraints
    Risk committees, ministerial oversight, and cross-agency coordination slow decisions. Security may see a vulnerability but lack the authority or speed to act. Cyber reports a risk; another silo must fix the root cause (patching is a classic example).
  4. Scale, complexity, interconnectedness
    Broad dependencies across third parties, legacy vendors, and shared platforms raise the bar for change. Large agencies in Queensland illustrate this — legacy and connected systems are hard to evolve when coordination is challenging within and between departments.

Given these constraints, simply “telling” agencies to lift maturity doesn’t work — they must be enabled, resourced, and structurally supported. If government sets objectives, there must be budget and accountable roles to deliver success.


The skills gap: a centre-of-gravity issue

Let’s dive deeper into why the talent shortage is a principal throttle on maturity.

Demand vs supply — the numbers

  • The APS workforce reports difficulty attracting experienced and mid-level staff in cyber, data, and digital roles.
  • AustCyber and others warn of a national shortfall of thousands of cyber professionals as early as 2026.
  • Industry commentary points to weak pathways from education to employment, especially in cybersecurity specialisation.
  • There is underrepresentation of women, Indigenous Australians, and other cohorts, narrowing the talent pool.

In short: there are more required roles than qualified candidates, and government competes with private sector pay and flexibility. Also, AI won’t fix this — automation still requires people to design, tune, and operate systems.

Government-unique barriers

  • Security clearances / vetting — delays deter candidates.
  • Location constraints — many roles sit in capitals (e.g., Canberra); candidates prefer where they live (e.g., Brisbane).
  • Rigid classification / HR frameworks — less flexibility than private sector to recruit or reward niche talent.
  • Long recruitment cycles — the APS notes slow hiring loses candidates (link). From my experience, interview-to-contract often exceeds a month; good people move on.
  • Contracting/consultant dependency — heavy reliance can hinder continuity and internal capability. Building a Vulnerability Management practice, for example, took ~14 months to set standards, procedures, and recruit A07 staff.

How the skills shortage slows maturity lift — real impacts

Here’s how the talent deficit manifests as delays or failures:

  1. Under-resourced implementation of controls
    Targets are set, but there aren’t enough engineers to design, deploy, and test advanced controls (threat hunting, application control, PAM). Partial deployments leave gaps.
  2. Slow audit, testing, verification, continuous improvement
    Maturity isn’t “set and forget.” Controls need monitoring, pen testing, red teaming, assurance, and drift correction. Without staff, agencies fall behind year after year.
  3. Overreliance on external consultants / vendor lock-in
    Outsourced critical controls (e.g., ISO 27001) can create dependency, weak knowledge transfer, and higher costs. Internal audit capability is essential for lasting compliance.
  4. Poor prioritisation & tactical drift
    Too few staff leads to “easy wins” over foundational work (e.g., patching vs. threat modelling), creating uneven maturity.
  5. Delayed incident response & threat intelligence
    Without analysts and red teamers, prevention, detection, and response remain superficial.
  6. Resistance to change & capacity burnout
    Overwork drives burnout and attrition, further widening the gap.

What government must do (and early signs of good practice)

If government wants to raise maturity at scale, bridging the skills gap must be a front-line priority:

  1. Grow internal pipelines & rotational programs
    • Graduate programs, cadetships, ICT/cyber rotations
    • Internships and bridging for non-traditional candidates
    • Clear cyber career pathways with structured progression
  2. Use role-based training / micro-certification
    Focused upskilling for AppSec, cloud, monitoring; partner with providers and industry.
  3. Flexible hiring / attract private sector talent
    • Streamline recruitment timelines
    • Use contractors to bridge until FTEs arrive, with planned handover
    • Pay flexibility, retention bonuses, secondments
    • Remote/hybrid roles to access wider talent
  4. Mandate knowledge transfer in consultancy/outsourcing
    Require documentation, training, and embedded handover. Hold vendors to this as a standard.
  5. Create cross-agency centres of excellence
    Share specialist resources (threat intel labs, red teams) so smaller agencies benefit.
    QLD Gov’s Technical Community of Practice via GovTeams is a great model; the federal level also uses GovTeams — tap into it.
  6. Leverage automation to stretch limited people
    Use SOAR, orchestration, and AI-assisted detection to reduce manual load — but retain skilled oversight.
  7. Benchmark, monitor, incentivise progress
    Use measurement (e.g., Victoria’s Cyber Maturity Benchmark). Align to the ASD ISM — don’t invent custom control sets. Don’t mark your own homework.
  8. Legislative/policy support & funding frameworks
    Targeted funding for lagging agencies; mandate minimum standards and regular assessments. Leaders must be honest about maturity and ask for help.

Some of this is already in motion: the Cyber Uplift Remediation Program (CURP) supports priority entities with skilled assistance. But too many departments aren’t telling their C-suite the full truth. Cyber security starts with transparency.


What next?

Raising cyber maturity across government isn’t a checkbox exercise. It’s a long climb — and without the right people, it stalls. The skills gap isn’t a “fix later” problem; it decides whether maturity goals are ever realised.

If I were advising a government today, I’d start with talent, training, and retention — not just more tools. Without the human capability to plan, execute, audit, and evolve, even the best-designed maturity model is just theory on paper.

Tools do play a part. Turn on built-in patching for Windows, Office, and browsers. Use what’s built into Windows, Edge, and Chrome. Then use affordable third-party tools to lift endpoint application patching above 90%. Once endpoints (OS and apps) are above 90%, move to the server estate — and tackle the “legacy” lumps under the rug that everyone avoids.


What’s October got ahead for us


Rising Storm: Why October 2025 Is a Wake-Up Call for Cyber Resilience…

The current pulse

  • October is Cybersecurity Awareness Month — a timely reminder that security vigilance can’t pause. (SecurityWeek)
  • Recent high-profile alerts are flashing in red: Cisco firewalls (≈ 50,000 units) exposed by critical vulnerabilities are being actively targeted. (TechRadar)
  • Oracle customers are reportedly receiving extortion emails tied to exposed E-Business Suite installations, with demands reaching tens of millions. (Reuters)
  • Meanwhile, a survey shows nearly a third of business leaders have seen increased cyberattacks on their supply chains in the past six months. (The Guardian)
  • Domestically in Australia, more than half of organisations remain below maturity Level 2 in implementing the Essential Eight, even as AI programs surge without proper security oversight. (ADAPT)

These signals underscore a theme: attackers are getting bolder, exploit windows are shrinking, and foundational controls are slipping in many organisations.


Key Themes & Implications

1. Patch urgency is no longer optional

That Cisco situation is a textbook example. Unpatched critical vulnerabilities (buffer overflows, authorization bypasses) now translate directly into exploited systems in the wild. (TechRadar)

For many organisations, patch cycles remain slow. But adversaries no longer wait. The lesson: critical updates must be prioritized to the top of the queue — especially for firewall, VPN, and core network devices.

2. Ransomware / extortion is evolving into a business strategy

The Oracle / Cl0p scenario highlights the shift from break-in → ransom, to break-in → extort, even if no data was exfiltrated, or the attacker cannot prove it was. (Reuters)

It’s no longer “if they get in, they encrypt” — it’s “if they get in, they’ll demand money anyway.” The optics of leaks, reputational impact, and fear of data exposure now amplify damage even when encryption isn’t deployed.

3. Supply chain attack risks are expanding

As organisations outsource and interconnect deeply with suppliers, cybersecurity hygiene upstream becomes a de facto requirement downstream. Nearly a third of executives already report supply-chain attacks rising. (The Guardian)

Weak links in third-party software, service providers, or components are being weaponized. The MOVEit / Cl0p saga from prior years remains a cautionary backdrop. (Wikipedia)

4. Australia is playing catch-up — especially in maturity and AI governance

The ADAPT CISO survey suggests many Australian entities remain low on maturity scales, even as AI gets rapidly adopted — with limited oversight or security controls in place. (ADAPT)

Given shifting regulatory frameworks and heightened expectations from customers and partners, lagging maturity and oversight risks becoming a liability.

5. Threat actors are leveraging AI, automation & stealth

AI is becoming a two-edged sword. Defenders use it to flag anomalies, but attackers use it to craft more convincing phishing, orchestrate automation of attacks, and avoid signature detection. (World Economic Forum)

At the same time, “fileless,” living-off-the-land, and zero-malware techniques (or malwareless intrusion) are gaining traction. (CrowdStrike)


What Should Organisations Do — Now

Here’s a tactical playbook to use while the heat is on… let’s see how many people can try and get ahead of in October:

PriorityActionsWhy It Matters
Immediate patch postureIdentify all internet-exposed firewalls, VPNs, edge devices, ICS/OT, critical servers. Apply vendor patches urgently, or isolate/shutdown vulnerable services temporarily.Attackers are exploiting known flaws in the wild (e.g. Cisco ASA/FTD). (TechRadar)
Zero trust / identity protectionEnsure strong multi-factor Authentication (MFA), least privilege, session monitoring, microsegmentation, continuous verification.Breaches often occur by compromising credentials or lateral escalation.
Proactive threat hunting & loggingLook for anomalous behavior, internal recon, data staging, privilege escalation. Retain and analyze logs in a SIEM or EDR.Many compromises persist for weeks or months before discovery.
Supply chain / third-party assurancesAudit and test vendor security practices. Require SLAs, security attestations, limits of liability.An attacker might first target a partner or supplier to pivot in.
Incident response readinessRehearse playbooks, ensure communication plans, legal/privacy contacts, backup integrity, ransom negotiation stance.When a breach comes, response speed and clarity matter as much as prevention.
Governance for AI / emerging techEstablish oversight on AI deployments, data access, model security, API risks. Conduct risk reviews before adoption.AI tools present new attack surfaces that many orgs undervalue.
Security awareness & cultureRun targeted campaigns, phishing simulations, empower staff to spot and report anomalies.The “human element” remains a leading source of breach vectors. (We Live Security)

Looking Ahead…

  • Quantum readiness: Some enterprises are beginning to plan for migrating cryptography to quantum-resistant algorithms. The “harvest now, decrypt later” threat looms. (arXiv)
  • Regulatory enforcement & legal risk: Australia’s evolving cybersecurity strategy and global privacy regimes will push more organizations into compliance scrutiny. (Global Practice Guides)
  • Shared defense & intel sharing: The expiration of laws like the U.S. CISA sharing protections underscores how fragile collective defense is. (The Washington Post)
  • AI-powered defense automation: More tools will incorporate adaptive, behavior-based, autonomous responses to threats — but they’ll also introduce new complexity and risk.