Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

5/16/2017
10:30 AM
Joshua Douglas
Joshua Douglas
Commentary
50%
50%

How Many People Does It Take to Defend a Network?

The question is hard to answer because there aren't enough cybersecurity pros to go around.

How many people does it take to defend a network? The short answer is: more than most organizations can afford. This means real danger as the number of attacks against our collective enterprises increases exponentially year after year.

To have full 24/7 capability of proactive cyber hunting and monitoring, midsize organizations need a team of at least 10 experienced cybersecurity experts, and that could easily increase to 25 for larger organizations in need of responding to and mitigating regular incidents. Although this seems to be a simple answer, it's not a practical one. Even if you could afford to hire 10 people, there aren't enough cybersecurity professionals to fill these roles, and talent retention comes at a steep cost.

[Check out the two-day Dark Reading Cybersecurity Crash Course at Interop ITX, May 15 & 16, where Dark Reading editors and some of the industry's top cybersecurity experts will share the latest data security trends and best practices.]

The global cybersecurity workforce will have 1 million to 2 million unfilled jobs by 2019, according to a survey conducted by research specialist Vanson Bourne, commissioned by Intel Security. In the US alone, about 209,000 cybersecurity jobs went unfilled in 2015, reports Peninsula Press, and the gap continues to expand. Those are some sobering statistics. Industry executives argue that even if you can hire staff, it takes five to six years to train a cybersecurity professional to perform at the level required to defend against current threats. No one can afford to wait five or six years to train an in-house staff because the tactics deployed by cyber adversaries evolve daily.

Advanced targeted attacks have led to a cyber arms race of sorts, one that prices most small and midsize enterprises out of the competition, while putting severe resource constraints on even the largest organizations. Add to this the significant cybersecurity talent gap in the workforce, and it appears unlikely that any organization can effectively out-hire the cyberthreat.

This is where we have to face the "make/buy" decision. Building your own cyberteam isn’t practical for many companies. To deal with the problem immediately, there is the option to outsource cybersecurity to capable threat hunters. This way organizations get the resources they need in both personnel and technology to shift the burden to the attackers to find a softer target.

Hunters use behavioral analysis to continually counter their evasive human adversaries. Of course, since successful threat hunting is predominately a human-based activity, it takes a highly skilled and experienced staff to implement an effective 24/7 program. 

Although some are quick to point to automation as the answer, even advanced automated systems can detect only so much, and cyber professionals are still required for the most sophisticated threats. Even though prevention, monitoring, and remediation tools alone are inadequate, threat hunting — assisted with security orchestration — has emerged as the most effective approach to cybersecurity, reducing dwell time and shifting the financial burden to the attackers. 

When it comes to cybersecurity, perhaps a better quantitative question for organizational leadership to consider than the one we began with would be, "How many attackers are already lurking on my networks, since I don't have a capable threat-hunting team in place?" The future of your organization might depend on the answer to this question.

Related Content:

 

Joshua Douglas has nearly two decades of experience in helping global enterprises and government agencies secure their most prized business/mission assets. During his 10+ years at Raytheon, he has served as the CTO for Forcepoint, overseen Raytheon's Cyber Security ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/22/2017 | 8:20:01 PM
Virtual "We're Closed" signs?
I wonder if the solution for a lot of small enterprises may eventually become a full shutdown of all system during non-peak hours.  Think of it like "Sorry, We're Closed" 2.0.

Obviously, this would only work in certain contexts, and bear with it its own costs, but at a certain point, those costs may be substantially smaller for some companies compared with the cost of risk mitigation and/or the actual risk of a breach.

Right now, though, usually it's the other way around, and the risk is cost-justified in the long run -- but that formula/those numbers could change for for smaller businesses.
LindsayCybSafe
50%
50%
LindsayCybSafe,
User Rank: Strategist
5/22/2017 | 4:44:28 AM
CISO? Sysadmins? EVERYONE is responsible for cyber security ...
Skills shortage is obviously a concern, but those skills might be closer than you think - dare I say, there may be diamonds in the rough sitting in your office right now. 

Regardless of sourcing specific cyber skills, and easy-win to creating basic breach detection skills can come thorugh education and up to date threat identification techniques. 

'Cybsafe' for those in the UK is certainly a good option, if you want GCHQ-accreditation and certification for the workforce.

Cheers Josh!
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...