Careers & People

9/6/2017
03:21 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

81% of Infosec Pros Say Required Job Skills Have Changed

The change comes amid a skills gap the industry is facing.

Portland, OR - The digital security skills gap poses a challenge to organizations and their defense strategies in every economic sector. Even so, there’s little consensus on how enterprises should address this shortage of skilled security talent. Some say organizations place too little emphasis on the value of a classical engineering-focused education and that businesses can help close the skills gap by re-conceptualizing security “entry-level” roles. Others feel job seekers and hiring organizations should both do more to reconcile security with existing business needs.

These are all good ideas. But are organizations doing any of them? How are companies actually working to address the security skills gap?

To answer those questions, Tripwire commissioned Dimensional Research to survey 315 IT security professionals at U.S.-based companies with over 100 employees. Their responses reveal that the make-up of security teams is changing and that organizations are having to implement creative strategies to meet security needs.

Overall, Tripwire’s study found that 93% of information security professionals are concerned about the skills gap. This sentiment in part rests on an ever-evolving industry. More than three-quarters (81%) of respondents say the skills required to be a “great” security staff member have changed in the past few years. This development, among others, has helped shape the viewpoint shared by 72% of security professionals that it’s more difficult now to hire adequately skilled security personnel than it was two years ago.

Tim Erlin, vice president of product management and strategy at Tripwire, agrees with this framing of the skills gap:

“It’s evident that security teams are evolving and maturing with the rest of the cybersecurity industry, but the pool of skilled staff and training simply aren’t keeping up. For example, beyond their technical duties, security practitioners may now be expected to spend more time in boardrooms or in the CFO’s office to secure more budget. While the makeup of the cybersecurity workforce may be changing, the fundamentals of protecting an organization have not. It will be critical during this transition to ensure there’s a long-term strategy in place around maintaining the foundational security controls like the CIS CSC.”

Per Tripwire’s survey, organizations are indeed diversifying their security staff. Most companies are supplementing their teams by outsourcing for skills (91%) and are expecting non-security professionals to become more involved in their digital defense strategies (98%). One in five respondents said their organizations have already hired professionals with expertise not related to security over the past few years; about the same proportion of respondents (17%) expect to continue that practice through 2019.

But hiring is just the beginning. Erlin explains that businesses should then work to optimize these heterogeneous security workforces:

“The skills gap doesn’t have to be an operational gap. Security teams shouldn’t overburden themselves by trying to do everything on their own. They can partner with trusted vendors for managed services or subscribe to service plans where outside experts can act as an extension of the team. Organizations should also understand that security is a shared responsibility across different functions, so people from other parts of the business should be involved in the cybersecurity program. And, of course, automation can add value not only in reducing manual work, but also in ensuring that everything is up-to-date and working as it should in real time. Security teams may just need to work more creatively.”

It appears organizations are in agreement with Erlin. Eighty-eight percent of respondents think managed services would help to address the skills gap problem. Even more than that (96%) think automation will help address the digital security skills shortage in the future.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
The Browser Is the New Endpoint
Rajesh Ranganathan, Product Manager at ManageEngine,  10/23/2018
Good Times in Security Come When You Least Expect Them
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  10/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.