Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

9/3/2020
10:00 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

5 Ways for Cybersecurity Teams to Work Smarter, Not Harder

Burnout is real and pervasive, but some common sense tools and techniques can help mitigate all that.

A career in cybersecurity is extremely rewarding. It also comes with its challenges, including last-minute fire drills, understaffed teams, and overworked employees — all while protecting the company's most valuable assets, its intellectual property, employee, and customer data. 

These factors can generate immense stress for cybersecurity professionals, causing them to quit their job or completely leave the field. In fact, a recent report by the Chartered Institute of Information Security (CIISec) found that more than half (54%) of IT security professionals have either left a security job due to overwork or burnout, or worked with someone who did. 

Related Content:

7 Ways to Keep Your Remote Workforce Safe

How CISOs Can Play a New Role in Defining the Future of Work

Making matters worse, security budgets are not keeping pace with the rising threat level brought on by COVID-19. Gartner predicts cybersecurity leaders should expect budget decreases over the next year. Hiring additional headcount to support cybersecurity teams is no longer a feasible option – but putting more people on a problem is rarely, if ever, the solution. CIISec also found that when security teams are stretched during busy periods, 64% said their businesses simply "hope to cope" with fewer resources, while 51% would let routine or non-critical tasks slip.

Solving the burnout problem requires a new way of examining the situation -- it's time to work smarter, not harder. Here's how.

Understand the Business
The current pandemic has demonstrated that businesses need to be able to transform and adapt quickly, whether in response to a crisis, customer demands, or technology. This need for speed is putting IT security front and center, to the point where cybersecurity is no longer a technology problem, it's a business problem.

Moving forward, organizations should make cybersecurity a part of the overall business strategy. This includes leading with a security first mindset to provide that security is engrained in organizational culture. 

Acknowledge Complexity
COVID-19 has created new, challenging factors for organizations to address, which only adds to the level of business complexity. This increased complexity has also impacted cybersecurity, causing organizations to closely monitor the following industry trends:

  • Accelerated digital and cloud transformation because of a suddenly remote workforce
  • Cybersecurity skills gap
  • A complex regulatory environment featuring various data handling protocols based on geography
  • Increased cybercrime and threats by determined adversaries

The need for organizations to manage these trends, and the associated complexity they bring, leads many to realize that fighting cybercrime is not the core competency of their business. And, if it's not their core business, it's often too complex to manage. The end goal for organizations should be to acknowledge the complexity brought on by the pandemic, innovate and invest in their core competencies, and know they are highly protected from cyber threats beyond their control -- requiring a more proactive, resilient approach to cybersecurity. 

Reassess Business Models
A natural side effect brought on by the pandemic is the reassessment of business models and practices. This analysis should also factor in how cybersecurity should be approached as the business moves forward.

During the reassessment, it's important to evaluate the current arsenal of cybersecurity tools. Are they all being put to good use? Do you have redundant tool sets? Is it just too many bells and whistles? Do you have the right staff with the right skills to take advantage of the tooling? Could the budget spent on legacy solutions be put towards outsourcing, expanding a short-staffed security team to provide complementary people, process and technology? Would managed security services alleviate the burden of the current team?

It's important to thoroughly examine an organization's cybersecurity tool box for a few essentials, such as continuous monitoring and up-to-date threat intelligence for proactive responses. If it doesn't have these factors, it's time for a change. 

Commit to Automation 
The silver lining for many security teams is the fact that there has been significant advancement in cybersecurity technologies in the past several years. However, many organizations have not fully committed to using automation as a way to achieve scale in cybersecurity. 

With the advent of 5G, more devices than ever will connect to the network. 5G is architected to provide more protection than any previous network, but an expanded attack surface still offers the possibility of new threats. Cybersecurity organizations relying on manual changes and processes will face challenges in keeping up. At a large scale, cybersecurity needs to be dynamic and automated in order to accommodate the scope and speeds of new network architectures.

Know the Adversary
The concept of "hope to cope" with cyber attacks that may occur outside of the traditional workday is what adversaries are indeed hoping for. However, this should not be the strategy of a business. Today's adversary is determined and understands the path of least resistance. If organizations take the approach of guarding digital assets during business hours only, adversaries will quickly figure this out.

Today's business is global, which means there is no down time for business or adversaries. The protection offered by cybersecurity is needed around the clock, regardless of the geographic location or time zone of the business. Understanding this 'round-the-clock' mentality will help allocate the right resources, at the right time, to bolster security across the organization.

It's time to acknowledge the immense workloads and stress on the shoulders of today's cybersecurity professionals. Together, with a security-first mindset and the right resources at hand, security teams can work smarter, not harder, and get some well-deserved peace of mind back in their lives. 

Theresa Lanowitz is a proven global influencer and speaks around the world on trends and emerging technology poised to help today's IT organizations flourish. Prior to joining AT&T Cybersecurity, she founded industry analyst firm voke, to highlight emerging technologies and ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ANON1247075936778
100%
0%
ANON1247075936778,
User Rank: Apprentice
9/4/2020 | 10:16:19 AM
great article
Theresa,

 

That was a really insightful article.  We have policies and procedures in place, but haven't reviewed them recently.  Your article is triggering our inititative!

 

Regards,

Bill
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4590
PUBLISHED: 2020-09-21
IBM WebSphere Application Server Liberty 17.0.0.3 through 20.0.0.9 running oauth-2.0 or openidConnectServer-1.0 server features is vulnerable to a denial of service attack conducted by an authenticated client. IBM X-Force ID: 184650.
CVE-2020-4731
PUBLISHED: 2020-09-21
IBM Aspera Web Application 1.9.14 PL1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188055.
CVE-2020-4315
PUBLISHED: 2020-09-21
IBM Business Automation Content Analyzer on Cloud 1.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the i...
CVE-2020-4579
PUBLISHED: 2020-09-21
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a specially crafted HTTP/2 request with invalid characters. IBM X-Force ID: 184438.
CVE-2020-4580
PUBLISHED: 2020-09-21
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a specially crafted a JSON request with invalid characters. IBM X-Force ID: 184439.