Careers & People
5/16/2017
10:30 AM
Joshua Douglas
Joshua Douglas
Commentary
Connect Directly
Twitter
LinkedIn
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

How Many People Does It Take to Defend a Network?

The question is hard to answer because there aren't enough cybersecurity pros to go around.

How many people does it take to defend a network? The short answer is: more than most organizations can afford. This means real danger as the number of attacks against our collective enterprises increases exponentially year after year.

To have full 24/7 capability of proactive cyber hunting and monitoring, midsize organizations need a team of at least 10 experienced cybersecurity experts, and that could easily increase to 25 for larger organizations in need of responding to and mitigating regular incidents. Although this seems to be a simple answer, it's not a practical one. Even if you could afford to hire 10 people, there aren't enough cybersecurity professionals to fill these roles, and talent retention comes at a steep cost.

[Check out the two-day Dark Reading Cybersecurity Crash Course at Interop ITX, May 15 & 16, where Dark Reading editors and some of the industry's top cybersecurity experts will share the latest data security trends and best practices.]

The global cybersecurity workforce will have 1 million to 2 million unfilled jobs by 2019, according to a survey conducted by research specialist Vanson Bourne, commissioned by Intel Security. In the US alone, about 209,000 cybersecurity jobs went unfilled in 2015, reports Peninsula Press, and the gap continues to expand. Those are some sobering statistics. Industry executives argue that even if you can hire staff, it takes five to six years to train a cybersecurity professional to perform at the level required to defend against current threats. No one can afford to wait five or six years to train an in-house staff because the tactics deployed by cyber adversaries evolve daily.

Advanced targeted attacks have led to a cyber arms race of sorts, one that prices most small and midsize enterprises out of the competition, while putting severe resource constraints on even the largest organizations. Add to this the significant cybersecurity talent gap in the workforce, and it appears unlikely that any organization can effectively out-hire the cyberthreat.

This is where we have to face the "make/buy" decision. Building your own cyberteam isn’t practical for many companies. To deal with the problem immediately, there is the option to outsource cybersecurity to capable threat hunters. This way organizations get the resources they need in both personnel and technology to shift the burden to the attackers to find a softer target.

Hunters use behavioral analysis to continually counter their evasive human adversaries. Of course, since successful threat hunting is predominately a human-based activity, it takes a highly skilled and experienced staff to implement an effective 24/7 program. 

Although some are quick to point to automation as the answer, even advanced automated systems can detect only so much, and cyber professionals are still required for the most sophisticated threats. Even though prevention, monitoring, and remediation tools alone are inadequate, threat hunting — assisted with security orchestration — has emerged as the most effective approach to cybersecurity, reducing dwell time and shifting the financial burden to the attackers. 

When it comes to cybersecurity, perhaps a better quantitative question for organizational leadership to consider than the one we began with would be, "How many attackers are already lurking on my networks, since I don't have a capable threat-hunting team in place?" The future of your organization might depend on the answer to this question.

Related Content:

 

Joshua Douglas, Chief Strategy Officer for Raytheon Foreground Security, has nearly two decades of experience in helping global organizations secure their most prized business/mission assets. He helps produce forward-looking cybersecurity services and solutions that help ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/22/2017 | 8:20:01 PM
Virtual "We're Closed" signs?
I wonder if the solution for a lot of small enterprises may eventually become a full shutdown of all system during non-peak hours.  Think of it like "Sorry, We're Closed" 2.0.

Obviously, this would only work in certain contexts, and bear with it its own costs, but at a certain point, those costs may be substantially smaller for some companies compared with the cost of risk mitigation and/or the actual risk of a breach.

Right now, though, usually it's the other way around, and the risk is cost-justified in the long run -- but that formula/those numbers could change for for smaller businesses.
LindsayCybSafe
50%
50%
LindsayCybSafe,
User Rank: Strategist
5/22/2017 | 4:44:28 AM
CISO? Sysadmins? EVERYONE is responsible for cyber security ...
Skills shortage is obviously a concern, but those skills might be closer than you think - dare I say, there may be diamonds in the rough sitting in your office right now. 

Regardless of sourcing specific cyber skills, and easy-win to creating basic breach detection skills can come thorugh education and up to date threat identification techniques. 

'Cybsafe' for those in the UK is certainly a good option, if you want GCHQ-accreditation and certification for the workforce.

Cheers Josh!
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.