Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

2/25/2020
02:00 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Wanted: Hands-On Cybersecurity Experience

Organizations lament a lack of qualified job candidates as they continue to struggle to hire and retain security teams, the new ISACA State of Cybersecurity 2020 report shows.

RSA CONFERENCE 2020 - San Francisco - Nearly 80% of organizations will need even more technical security staff - security engineers, security architects, analysts, incident responders, forensic analysts, for instance - in the next 12 months, according to new data from ISACA.

The data comes from a survey of mostly ISACA members as well as other organizations, more than half of whom say their security teams today are understaffed. Most are not satisfied with the qualifications of the job applicants they get: some 73% cite hands-on security experience as a key job qualification, followed by security credentials (35%), and hands-on training (25%). The study is based on data gathered from more than 2,000 respondents from more than 100 countries.

Greg Touhill, ISACA board director and president of Cyxtera Federal Group, says the evolution of security's defense-in-depth technology has helped lead to this conundrum: "We invested in a strategy of defense-in-depth, so we added another layer upon another layer, and all of these layers cost tremendous amounts of manpower - and [require] a lot of highly skilled" talent for each tool and platform that get added to those layers, he explains.

Interestingly, non-security skills are also high on employers' list: one-third of the respondents cite one of the main gaps they see in job candidates are soft skills - aka non-technical proficiencies such as communication, social, and leadership qualities - followed by IT knowledge and experience (30%).

ISACA Director Pam Nigro, who is also the senior director of information security in the GRC practice at Heath Care Service Corporation (HCSC), says even traditional security professionals need to be able to communicate the impact of a vulnerability to a business. "Leadership's eyes are going to glaze over" if you can't clearly articulate what that security flaw could mean for the organization, she says.

Nigro says HCSC runs a six-month rotation program for it security teams to help hone and expand skills. Red, blue, and purple teams, vulnerability scanning and firewall staff rotate into different teams to help brush up on skills or learn new ones. So red teamers can join the blue team to better understand how to defend against attacks they typically perform, and blue teams can sit in the red team seat and think like an attacker. "When you broaden horizons, you start to look at all the things that go into cybersecurity, and you start to be able to do really good critical thinking," Nigro says.

Meantime, organizations need to be more realistic about the qualifications they expect candidates to have for security positions, notes Touhill. "This drives a greater need for a workforce development plan ... and synchronization with the human resources folks" in the recruitment process, he says.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps."

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-21038
PUBLISHED: 2020-04-08
An issue was discovered on Samsung mobile devices with N(7.x) software. The Secure Folder app's startup logic allows authentication bypass. The Samsung ID is SVE-2018-11628 (December 2018).
CVE-2018-21039
PUBLISHED: 2020-04-08
An issue was discovered on Samsung mobile devices with N(7.0) software. With the Location permission for the compass feature in Quick Tools (aka QuickTools), an attacker can bypass the lockscreen. The Samsung ID is SVE-2018-12053 (December 2018).
CVE-2018-21040
PUBLISHED: 2020-04-08
An issue was discovered on Samsung mobile devices with O(8.x) and P(9.0) (Exynos 9810 chipsets) software. There is a race condition with a resultant use-after-free in the g2d driver. The Samsung ID is SVE-2018-12959 (December 2018).
CVE-2018-21041
PUBLISHED: 2020-04-08
An issue was discovered on Samsung mobile devices with O(8.x) software. Access to Gallery in the Secure Folder can occur without authentication. The Samsung ID is SVE-2018-13057 (December 2018).
CVE-2020-11000
PUBLISHED: 2020-04-08
GreenBrowser before version 1.2 has a vulnerability where apps that rely on URL Parsing to verify that a given URL is pointing to a trust server may be susceptible to many different ways to get URL parsing and verification wrong, which allows an attacker to circumvent the access control. This proble...