Cloud

11/9/2017
08:50 PM
50%
50%

Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches

Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.

Organizations with understaffed IT security teams face a double-whammy – not enough employees to bear the workload and a greater potential they will be hit with a cyberattack or data breach, a new survey found.

The Life and Times of Cyber Security Professionals report, which surveyed 343 global infosec workers, found 22% of respondents cite their IT security team as understaffed and that the shortage of people contributed to a security event at their organization in the past two years.

"The shortage is creating massive problems for businesses," says Jon Oltsik, senior principal analyst with the Enterprise Strategy Group (ESG), which conducted the survey on behalf of the Information Systems Security Association (ISSA).

Indeed. A total of 70% of survey respondents say the cybersecurity skills shortage, which is expected to create a deficit of 1.8 million infosec jobs by 2022, has an impact on organization.

The impact these organizations are facing:  increased work among existing IT security staff (63%), the need to hire junior employees in the absence of enough available senior IT security workers (41%), and a work environment where infosec pros are constantly addressing high-alert threats, rather making long-range strategic security plans (41%).

Acute Shortage of Cybersecurity Skills

One-third of organizations say security analysis and investigations as well as application security both topped the list of IT security skills in acute shortage, followed by cloud security.

"I would focus on filling app security positions," says Candy Alexander, ISSA Cyber Security Career Lifecycle chief architect. "It's been an issue for a while and it isn't going away."

Security analysis investigation requires a special skillset, making it even more difficult to find such professionals in an already tight IT security market, she says.

In situations were certain job skills face an acute shortage, companies tend to poach another organization's IT security staff, or use an outsource service, Oltsik says.

Training 

Cybersecurity skills development is critical to keep team members sharp, 96% of survey participants agree. But 67% note that learning new skills is difficult to achieve given the heavy workload.

A lot of the headlines in the past decade have been about the cybersecurity staffing shortage, Alexander says, adding that there is not necessarily a staffing shortage but rather a problem of having a deficit of workers with the appropriate skills.

Businesses, she adds, tend to view training as sending employees to a class to listen to an instructor. But just-in-time training - where trainees get only they information they seek when they need it regarding risks they want to mitigate - is a better training method.

Just 38% of respondents say their employer provides the cybersecurity team with the right level of training to stay abreast of business and IT risks.

Job Satisfaction

The vast majority of IT security pros are very satisfied, 40%, with their current job, or at least somewhat satisfied, 48%, the survey found.

Financial compensation topped the list of job satisfaction drivers, according to 42% of survey respondents. That was followed by support and financial incentives to advance IT security careers, 38%, and business management expressing a commitment to strong cybersecurity, 37%.

These job satisfaction drivers may be important to note for retention efforts, given nearly half of the survey respondents have been approached by cybersecurity recruiters at least once a week, the survey notes.

"For businesses this is bad because it can lead to a high level of attrition and inflated salaries," Oltsik warns.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NoahData
50%
50%
NoahData,
User Rank: Apprentice
11/14/2017 | 4:27:32 AM
Cybersecurity Staffing Shortage

Real fact about the employee skills and the industries requirement seems to be a big gap in CyberSecurity.
vasukivasudav
50%
50%
vasukivasudav,
User Rank: Apprentice
11/13/2017 | 7:15:49 AM
Re: Pending Review
Great
Herve-FR
100%
0%
Herve-FR,
User Rank: Author
11/13/2017 | 3:46:02 AM
Cybersecurity Staffing Shortage
With GDPR to be live in May 2018 it is going to we worse as lot of organizations in Eruope are not really ready for !

 
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
CVE-2018-19829
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-16884
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
CVE-2018-17777
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
CVE-2018-18921
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.