Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches

Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.

Organizations with understaffed IT security teams face a double-whammy – not enough employees to bear the workload and a greater potential they will be hit with a cyberattack or data breach, a new survey found.

The Life and Times of Cyber Security Professionals report, which surveyed 343 global infosec workers, found 22% of respondents cite their IT security team as understaffed and that the shortage of people contributed to a security event at their organization in the past two years.

"The shortage is creating massive problems for businesses," says Jon Oltsik, senior principal analyst with the Enterprise Strategy Group (ESG), which conducted the survey on behalf of the Information Systems Security Association (ISSA).

Indeed. A total of 70% of survey respondents say the cybersecurity skills shortage, which is expected to create a deficit of 1.8 million infosec jobs by 2022, has an impact on organization.

The impact these organizations are facing:  increased work among existing IT security staff (63%), the need to hire junior employees in the absence of enough available senior IT security workers (41%), and a work environment where infosec pros are constantly addressing high-alert threats, rather making long-range strategic security plans (41%).

Acute Shortage of Cybersecurity Skills

One-third of organizations say security analysis and investigations as well as application security both topped the list of IT security skills in acute shortage, followed by cloud security.

"I would focus on filling app security positions," says Candy Alexander, ISSA Cyber Security Career Lifecycle chief architect. "It's been an issue for a while and it isn't going away."

Security analysis investigation requires a special skillset, making it even more difficult to find such professionals in an already tight IT security market, she says.

In situations were certain job skills face an acute shortage, companies tend to poach another organization's IT security staff, or use an outsource service, Oltsik says.

Training 

Cybersecurity skills development is critical to keep team members sharp, 96% of survey participants agree. But 67% note that learning new skills is difficult to achieve given the heavy workload.

A lot of the headlines in the past decade have been about the cybersecurity staffing shortage, Alexander says, adding that there is not necessarily a staffing shortage but rather a problem of having a deficit of workers with the appropriate skills.

Businesses, she adds, tend to view training as sending employees to a class to listen to an instructor. But just-in-time training - where trainees get only they information they seek when they need it regarding risks they want to mitigate - is a better training method.

Just 38% of respondents say their employer provides the cybersecurity team with the right level of training to stay abreast of business and IT risks.

Job Satisfaction

The vast majority of IT security pros are very satisfied, 40%, with their current job, or at least somewhat satisfied, 48%, the survey found.

Financial compensation topped the list of job satisfaction drivers, according to 42% of survey respondents. That was followed by support and financial incentives to advance IT security careers, 38%, and business management expressing a commitment to strong cybersecurity, 37%.

These job satisfaction drivers may be important to note for retention efforts, given nearly half of the survey respondents have been approached by cybersecurity recruiters at least once a week, the survey notes.

"For businesses this is bad because it can lead to a high level of attrition and inflated salaries," Oltsik warns.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NoahData
50%
50%
NoahData,
User Rank: Apprentice
11/14/2017 | 4:27:32 AM
Cybersecurity Staffing Shortage

Real fact about the employee skills and the industries requirement seems to be a big gap in CyberSecurity.
vasukivasudav
50%
50%
vasukivasudav,
User Rank: Apprentice
11/13/2017 | 7:15:49 AM
Re: Pending Review
Great
Herve-FR
100%
0%
Herve-FR,
User Rank: Author
11/13/2017 | 3:46:02 AM
Cybersecurity Staffing Shortage
With GDPR to be live in May 2018 it is going to we worse as lot of organizations in Eruope are not really ready for !

 
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We are really excited about our new two tone authentication system!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4126
PUBLISHED: 2020-12-01
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.
CVE-2020-4129
PUBLISHED: 2020-12-01
HCL Domino is susceptible to a lockout policy bypass vulnerability in the LDAP service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the LDAP service. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later.
CVE-2020-9115
PUBLISHED: 2020-12-01
ManageOne versions 6.5.1.1.B010, 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, ,6.5.1.1.B050, 8.0.0 and 8.0.1 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the plug-in component. Due to insufficient input validation of ...
CVE-2020-9116
PUBLISHED: 2020-12-01
Huawei FusionCompute versions 6.5.1 and 8.0.0 have a command injection vulnerability. An authenticated, remote attacker can craft specific request to exploit this vulnerability. Due to insufficient verification, this could be exploited to cause the attackers to obtain higher privilege.
CVE-2020-14193
PUBLISHED: 2020-11-30
Affected versions of Automation for Jira - Server allowed remote attackers to read and render files as mustache templates in files inside the WEB-INF/classes & <jira-installation>/jira/bin directories via a template injection vulnerability in Jira smart values using mustache partials. The ...