Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:00 PM
Owanate Bestman
Owanate Bestman
Connect Directly
E-Mail vvv

Is COVID-19 Intensifying the Need for Security Staffing?

Overall, security practitioners should find themselves in a better working situation than many other professionals. However, we are not immune.

A global recession is almost a certainty — the impact on hiring is likely to be devastating, so where does this leave cybersecurity? Let's look at some of the factors that can help us make an educated prediction.

The Current Threat Landscape
Globally, there has been a significant increase in ransomware, fake COVID-19 apps, and targeted phishing scams. The current state of fear and uncertainty provides an ideal breeding ground for those with malicious intent. Working from home has become the new norm and an attractive proposition for opportunists. We have seen targeted hacking campaigns aimed at specific industries in both the public and private sectors, in turn leading to increased ransomware — in some cases, a 4,000% increase, as cited in the Canadian press.

Industry Alignment
Surprisingly, some industries are seeing growth while others are struggling, and their survival is questionable. Registered jobs on LinkedIn grew 6.9% year-on-year within the logistics and transportation sector. We have also seen growth in technology firms (hardware and networking) as well as healthcare. The list of industries suffering is vast and includes aviation, car manufacturing, and hospitality/events services.

Overall, security practitioners find themselves in a better working situation than many other professionals; however, we are not immune. Security is often industry-aligned, and as one CISO told me after his funding was slashed as a result of COVID-19, "Owanate, what's the point of spending on staffing security, if, in the end, we have nothing to secure?" This serves as a bleak reminder that the journey of a cybersecurity professional in the commercial aviation sector is far removed from a security professional in the healthcare sector. One size does not fit all.

Consultancies and managed service providers that have the versatility to change their industry sector may be best served to align with growth industries that are likely to increase hiring to fulfil demand.

Legislation & GDPR Governance
Companies are still obliged to meet regulatory and legislative requirements. However, for now, we have seen a more relaxed approach from the UK's Information Commissioner's Office (ICO) in line with GDPR regulations, which states: We won't penalize organizations that we know need to prioritize other areas or adapt their usual approach during this extraordinary period. "The ICO has even deferred fines for incidents that occurred in 2018: £183 million for British Airways and £99 million for Marriott International. Furthermore, we expect to see privacy laws in proposals around facial recognition, COVID-19 tracking apps, and other controversial initiatives relaxed. Additionally, a significant percentage of security hiring during 2018 and 2019 was in response to GDPR legislation, so it is logical to suspect that firms may take their foot off the gas, demoting data protection compliance in the knowledge that the authorizing body will take a more relaxed approach. 

Overall, I have seen relatively little uptake of furloughing staff within security. With cybercrime more profitable than the global illegal drug trade, firms have an incentive to pay accordingly for the best talent. Many governments are issuing caps on furlough pay. In most cases, the furlough cap would not come close to the salary levels for midlevel to senior security professionals.

  • UK: 80% of regular salary up to a monthly cap of £2,500 (US$3,113)
  • Denmark: 75% of regular salary up to a monthly cap of 23,00 Kr (US$3,368)
  • Australia: AUD$3,000 per four weeks (USD$1,925)

Cybersecurity Staffing Futures
Firms are facing demands to respond to the significantly increased threat landscape. There is also the ongoing obligation to meet industry standards and legislation, even with a relaxed GDPR approach. This increased pressure on security, as well as risk management departments, is likely to translate into an industry-aligned increase in head count. To enable firms to provide a rapid response, additional head count will take the form of contractors and consultants. Executives will expect a swift return on investment and are likely to turn to "hired guns" to fight the initial fires and implement new frameworks and policies where appropriate. They are also likely to prioritize this over hiring permanent personnel, particularly struggling firms that are still bombarded with threats. 

Professional businesses at this time must work remotely, for good reason. While not without its challenges, remote working is nothing new for cybersecurity professionals and policies are in place. However, even the staunchest business continuity policies are stress-tested at this time. In addition, you should expect more funding and emphasis on business continuity and operational resilience moving forward.

COVID-19 will prove a catalyst for those firms that have not implemented or formed a digital transformation initiative. This cannot be accomplished without cybersecurity staff — expect gradual growth in this area. A whole essay could be written on this topic alone. We can also assume that the need for robust, flexible, and efficient security protocols will be greater than ever. The current climate of confusion, uncertainty, and fear will continue to provide a breeding ground for exploiters. Hence, at a time when cost-cutting seems a prudent and logical step, prudence must be weighed against the risk associated with underfunding security. 

The bad news: I foresee a stagnation in security hiring for the time being. But with the ever-growing need to protect assets, the commercial requirement to move to digital and the increasing need for operational resilience, a rise in cybersecurity hiring is surely inevitable. 

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Owanate is a global recruiter who specializes in cybersecurity.  He is the founder of Bestman Solutions where he advises CISO's, security leaders and human resource departments on market trends and a variety of factors that may affect their hiring requirements.  ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.