Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Connect Directly
E-Mail vvv

5 Ways for Cybersecurity Teams to Work Smarter, Not Harder

Burnout is real and pervasive, but some common sense tools and techniques can help mitigate all that.

A career in cybersecurity is extremely rewarding. It also comes with its challenges, including last-minute fire drills, understaffed teams, and overworked employees — all while protecting the company's most valuable assets, its intellectual property, employee, and customer data. 

These factors can generate immense stress for cybersecurity professionals, causing them to quit their job or completely leave the field. In fact, a recent report by the Chartered Institute of Information Security (CIISec) found that more than half (54%) of IT security professionals have either left a security job due to overwork or burnout, or worked with someone who did. 

Related Content:

7 Ways to Keep Your Remote Workforce Safe

How CISOs Can Play a New Role in Defining the Future of Work

Making matters worse, security budgets are not keeping pace with the rising threat level brought on by COVID-19. Gartner predicts cybersecurity leaders should expect budget decreases over the next year. Hiring additional headcount to support cybersecurity teams is no longer a feasible option – but putting more people on a problem is rarely, if ever, the solution. CIISec also found that when security teams are stretched during busy periods, 64% said their businesses simply "hope to cope" with fewer resources, while 51% would let routine or non-critical tasks slip.

Solving the burnout problem requires a new way of examining the situation -- it's time to work smarter, not harder. Here's how.

Understand the Business
The current pandemic has demonstrated that businesses need to be able to transform and adapt quickly, whether in response to a crisis, customer demands, or technology. This need for speed is putting IT security front and center, to the point where cybersecurity is no longer a technology problem, it's a business problem.

Moving forward, organizations should make cybersecurity a part of the overall business strategy. This includes leading with a security first mindset to provide that security is engrained in organizational culture. 

Acknowledge Complexity
COVID-19 has created new, challenging factors for organizations to address, which only adds to the level of business complexity. This increased complexity has also impacted cybersecurity, causing organizations to closely monitor the following industry trends:

  • Accelerated digital and cloud transformation because of a suddenly remote workforce
  • Cybersecurity skills gap
  • A complex regulatory environment featuring various data handling protocols based on geography
  • Increased cybercrime and threats by determined adversaries

The need for organizations to manage these trends, and the associated complexity they bring, leads many to realize that fighting cybercrime is not the core competency of their business. And, if it's not their core business, it's often too complex to manage. The end goal for organizations should be to acknowledge the complexity brought on by the pandemic, innovate and invest in their core competencies, and know they are highly protected from cyber threats beyond their control -- requiring a more proactive, resilient approach to cybersecurity. 

Reassess Business Models
A natural side effect brought on by the pandemic is the reassessment of business models and practices. This analysis should also factor in how cybersecurity should be approached as the business moves forward.

During the reassessment, it's important to evaluate the current arsenal of cybersecurity tools. Are they all being put to good use? Do you have redundant tool sets? Is it just too many bells and whistles? Do you have the right staff with the right skills to take advantage of the tooling? Could the budget spent on legacy solutions be put towards outsourcing, expanding a short-staffed security team to provide complementary people, process and technology? Would managed security services alleviate the burden of the current team?

It's important to thoroughly examine an organization's cybersecurity tool box for a few essentials, such as continuous monitoring and up-to-date threat intelligence for proactive responses. If it doesn't have these factors, it's time for a change. 

Commit to Automation 
The silver lining for many security teams is the fact that there has been significant advancement in cybersecurity technologies in the past several years. However, many organizations have not fully committed to using automation as a way to achieve scale in cybersecurity. 

With the advent of 5G, more devices than ever will connect to the network. 5G is architected to provide more protection than any previous network, but an expanded attack surface still offers the possibility of new threats. Cybersecurity organizations relying on manual changes and processes will face challenges in keeping up. At a large scale, cybersecurity needs to be dynamic and automated in order to accommodate the scope and speeds of new network architectures.

Know the Adversary
The concept of "hope to cope" with cyber attacks that may occur outside of the traditional workday is what adversaries are indeed hoping for. However, this should not be the strategy of a business. Today's adversary is determined and understands the path of least resistance. If organizations take the approach of guarding digital assets during business hours only, adversaries will quickly figure this out.

Today's business is global, which means there is no down time for business or adversaries. The protection offered by cybersecurity is needed around the clock, regardless of the geographic location or time zone of the business. Understanding this 'round-the-clock' mentality will help allocate the right resources, at the right time, to bolster security across the organization.

It's time to acknowledge the immense workloads and stress on the shoulders of today's cybersecurity professionals. Together, with a security-first mindset and the right resources at hand, security teams can work smarter, not harder, and get some well-deserved peace of mind back in their lives. 

Theresa Lanowitz is a proven global influencer and speaks around the world on trends and emerging technology poised to help today's IT organizations flourish. Prior to joining AT&T Cybersecurity, she founded industry analyst firm voke, to highlight emerging technologies and ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
9/4/2020 | 10:16:19 AM
great article


That was a really insightful article.  We have policies and procedures in place, but haven't reviewed them recently.  Your article is triggering our inititative!



Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We are really excited about our new two tone authentication system!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-01
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.
PUBLISHED: 2020-12-01
HCL Domino is susceptible to a lockout policy bypass vulnerability in the LDAP service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the LDAP service. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later.
PUBLISHED: 2020-12-01
ManageOne versions,,,, ,, 8.0.0 and 8.0.1 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the plug-in component. Due to insufficient input validation of ...
PUBLISHED: 2020-12-01
Huawei FusionCompute versions 6.5.1 and 8.0.0 have a command injection vulnerability. An authenticated, remote attacker can craft specific request to exploit this vulnerability. Due to insufficient verification, this could be exploited to cause the attackers to obtain higher privilege.
PUBLISHED: 2020-11-30
Affected versions of Automation for Jira - Server allowed remote attackers to read and render files as mustache templates in files inside the WEB-INF/classes & <jira-installation>/jira/bin directories via a template injection vulnerability in Jira smart values using mustache partials. The ...