Crossing the chasm

Issue 7 2022 Editor's Choice, News & Events, Security Services & Risk Management, Training & Education

Not too long ago, I read an alarming piece on how our technology skills shortage has changed from a valley into a canyon. The conclusion was that those who have the skills have become as rare a commodity as rhodium and can ply their trade anywhere. That leaves South Africa in a tough position, as we are competing in a global market for people who are versed in niche technology disciplines such as cloud technology, artificial intelligence and augmented reality.


Kgomotso Lebele.

As odd as it sounds, my immediate thoughts turned to the famous US daredevil motorcyclist Evel Knievel, who built his brand by jumping long and high canyons. He said: “I love the feeling of the fresh air on my face and the wind blowing through my hair.” Now, I am not for one moment suggesting we all go out and buy motorcycles, but we should try and see this current shortage as a chasm that we can cross collectively, and embrace the process with a feeling of positive expectation and feel positive winds blowing in our faces as we get it right.

The best place to start is to look at the global picture. Industry reports suggest that in the next ten years, millions of jobs could go unfilled because there are simply not enough people to fill them. If the trend continues, billions worth of revenues could be lost yearly unless more high-tech workers can be found.

Similarly, the Accenture research suggests that the cost of inaction is staggering. Over the next decade, fourteen G20 countries could miss as much as US$11,5 trillion of cumulative growth promised by intelligent technologies if they cannot meet future skills demand. That equates to forgoing more than an entire percentage point from their annual average GDP growth rate every year.

The question is how serious our tech skills shortage in South Africa is. The comprehensive 2021 JCSE-IITPSA ICT Skills Survey says the top-priority skills listed by employers participating in the survey were cybersecurity, big data analytics, DevOps, artificial intelligence, application development, data management, test automation/performance testing, Internet of Things and connectivity. The upshot of this data is that as digital adoption accelerates against a welcome backdrop of the democratisation of IT, tomorrow is too late, and we need to move with more speed than we thought we were capable of.

Working closely with a stream of young people who we bring into our business, there is no question we have the talent and the aptitude to embrace tech skills with creativity and an enthusiasm that knows no bounds. I believe that with a cooperative and collegial industry-wide strategy, we could, in time, become a significant supplier of tech skills to the global market, with a focus on bringing insourced jobs into Africa instead of relying on outsourcing tech project work.

The starting point is like-minded leaders and setting a target at the start of what will be a long jump over the canyon. If we could create ten thousand jobs in the tech space in the next five years, we would be a long way to achieving a successful landing on both wheels. Some estimates say South Africa has around 500 000 ICT employees, with 50% employed within the ICT sector. The other 50% are employed elsewhere and they contribute around 8% to our GDP. More skills development therefore has a direct impact on national growth.

A recent study conducted by Accenture suggested there were three ways to get the motorcycle moving. Experiential learning needs to be speeded up because it is immersive and hands-on. Learners are active participants, not passive recipients of knowledge.

Then the focus needs to shift from institutions to individuals. A more learner-centred approach would be to design metrics and incentives that encourage the blending of skills in each person. Furthermore, education and corporate lifelong learning systems must be accessible to all to truly close the skills gap. Workers who are vulnerable to disruption from technological change must be identified for targeted interventions.

I believe we have about a year to seriously recalibrate our thinking when it comes to tech skills; to seed the conversation more deeply; and to produce more industry-wide collective thinking. Failure to do so simply relegates us lower in the global competitiveness tables and we risk falling and not making it to the other side of that very bridgeable canyon.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
The HR Trap
Security Services & Risk Management Training & Education
When human resources becomes a risk factor. Andre du Venage examines why your CCTV security and other technology risks are covered, but human resources are often overlooked.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Global Threat Intelligence Report for October 2025
Information Security News & Events
Africa was pipped to the post as the most attacked region by Latin America, which averaged 2966 attacks per organisation per week (+16% YoY). Africa followed with (2782, – 15%) and APAC (2703, – 8%).

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Workflow and asset management solutions
Asset Management News & Events
Zamatrack’s innovative workflow and asset management solutions feature the Worxit platform. This all-in-one solution allows businesses to streamline operations with real-time tracking, GPS data, and custom reports.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.