Cloud

Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches

Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.

Organizations with understaffed IT security teams face a double-whammy – not enough employees to bear the workload and a greater potential they will be hit with a cyberattack or data breach, a new survey found.

The Life and Times of Cyber Security Professionals report, which surveyed 343 global infosec workers, found 22% of respondents cite their IT security team as understaffed and that the shortage of people contributed to a security event at their organization in the past two years.

"The shortage is creating massive problems for businesses," says Jon Oltsik, senior principal analyst with the Enterprise Strategy Group (ESG), which conducted the survey on behalf of the Information Systems Security Association (ISSA).

Indeed. A total of 70% of survey respondents say the cybersecurity skills shortage, which is expected to create a deficit of 1.8 million infosec jobs by 2022, has an impact on organization.

The impact these organizations are facing:  increased work among existing IT security staff (63%), the need to hire junior employees in the absence of enough available senior IT security workers (41%), and a work environment where infosec pros are constantly addressing high-alert threats, rather making long-range strategic security plans (41%).

Acute Shortage of Cybersecurity Skills

One-third of organizations say security analysis and investigations as well as application security both topped the list of IT security skills in acute shortage, followed by cloud security.

"I would focus on filling app security positions," says Candy Alexander, ISSA Cyber Security Career Lifecycle chief architect. "It's been an issue for a while and it isn't going away."

Security analysis investigation requires a special skillset, making it even more difficult to find such professionals in an already tight IT security market, she says.

In situations were certain job skills face an acute shortage, companies tend to poach another organization's IT security staff, or use an outsource service, Oltsik says.

Training 

Cybersecurity skills development is critical to keep team members sharp, 96% of survey participants agree. But 67% note that learning new skills is difficult to achieve given the heavy workload.

A lot of the headlines in the past decade have been about the cybersecurity staffing shortage, Alexander says, adding that there is not necessarily a staffing shortage but rather a problem of having a deficit of workers with the appropriate skills.

Businesses, she adds, tend to view training as sending employees to a class to listen to an instructor. But just-in-time training - where trainees get only they information they seek when they need it regarding risks they want to mitigate - is a better training method.

Just 38% of respondents say their employer provides the cybersecurity team with the right level of training to stay abreast of business and IT risks.

Job Satisfaction

The vast majority of IT security pros are very satisfied, 40%, with their current job, or at least somewhat satisfied, 48%, the survey found.

Financial compensation topped the list of job satisfaction drivers, according to 42% of survey respondents. That was followed by support and financial incentives to advance IT security careers, 38%, and business management expressing a commitment to strong cybersecurity, 37%.

These job satisfaction drivers may be important to note for retention efforts, given nearly half of the survey respondents have been approached by cybersecurity recruiters at least once a week, the survey notes.

"For businesses this is bad because it can lead to a high level of attrition and inflated salaries," Oltsik warns.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NoahData
50%
50%
NoahData,
User Rank: Apprentice
11/14/2017 | 4:27:32 AM
Cybersecurity Staffing Shortage

Real fact about the employee skills and the industries requirement seems to be a big gap in CyberSecurity.
vasukivasudav
50%
50%
vasukivasudav,
User Rank: Apprentice
11/13/2017 | 7:15:49 AM
Re: Pending Review
Great
Herve-FR
100%
0%
Herve-FR,
User Rank: Author
11/13/2017 | 3:46:02 AM
Cybersecurity Staffing Shortage
With GDPR to be live in May 2018 it is going to we worse as lot of organizations in Eruope are not really ready for !

 
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-10739
PUBLISHED: 2019-01-21
In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possib...
CVE-2019-6499
PUBLISHED: 2019-01-21
Teradata Viewpoint before 14.0 and 16.20.00.02-b80 contains a hardcoded password of TDv1i2e3w4 for the viewpoint database account (in viewpoint-portal\conf\server.xml) that could potentially be exploited by malicious users to compromise the affected system.
CVE-2019-6500
PUBLISHED: 2019-01-21
In Axway File Transfer Direct 2.7.1, an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request with %2e instead of '.' characters, as demonstrated by an initial /h2hdocumentation//%2e%2e/ substring.
CVE-2019-6498
PUBLISHED: 2019-01-21
GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c because strncpy is misused.
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.