Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

10/20/2013
08:43 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Study Reveals Shortage Of IT Security Talent Equals Abundance Of Risk

Half of IT and business leaders surveyed believe shortage of qualified security talent is exposing their organizations to serious risk, according to TEKsystems

Hanover, Md. – October 16, 2013 – In recognition of the 10th anniversary of National Cyber Security Awareness Month, TEKsystems® Network Services practice surveyed IT and business leaders to gauge how well their organizations are currently addressing information security. National Cyber Security Awareness Month is sponsored by the Department of Homeland Security, National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center with the goal of empowering public and private sector stakeholders to create a safe, secure and resilient cyber environment.

Key findings of the study include:

There's a Pervasive Human Capital Crisis

Organizations attempting to tackle critical IT security initiatives suffer from the shortage of IT talent.

· Half of respondents believe the lack of qualified security talent is approaching a state of critical mass where their organizations are vulnerable to serious risk exposure.

· Only 15% of respondents are very confident that they have the security-related skill sets needed to meet evolving threat landscapes.

· Less than 20% are very confident their IT organization has an adequate allocation of information security resources in-house for security policy, identity and access management and information risk management skills. Further, more than half say it is difficult to find and source resources for these skill sets.

Security Complexities are Overwhelming

Information security is so complex that organizations cannot adequately assess their needs.

· More than 60% believe the growing scope and complexity of IT security make it difficult for their organization to effectively assess current security programs and develop comprehensive strategic planning efforts.

Organizations Struggle to Keep Up

It is essential that organizations continually evolve their security strategies to keep pace with the changing ecosystem, yet IT is too bogged down by tactical activities.

· The majority of the respondents indicate that their information security teams are too busy handling tactical, day-to-day work to spend the adequate amount of time on critical strategic information security initiatives.

About TEKsystems People are at the heart of every successful business initiative. At TEKsystems, we understand people. Every year we deploy over 80,000 IT professionals at 6,000 client sites across North America, Europe and Asia. Our deep insights into IT human capital management enable us to help our clients achieve their business goals–while optimizing their IT workforce strategies. We provide IT staffing solutions, IT talent management expertise and IT services to help our clients plan, build and run their critical business initiatives. Through our range of quality-focused delivery models, we meet our clients where they are, and take them where they want to go, the way they want to get there.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Peter Fretty
50%
50%
Peter Fretty,
User Rank: Moderator
10/30/2013 | 6:31:22 PM
re: Study Reveals Shortage Of IT Security Talent Equals Abundance Of Risk
Scary to think that another survey shows that only 18 percent of Millennials are encouraged to enter the field of web or network security. If the industry wants to stay ahead of attackers it needs to do a better job of painting the picture to demonstrate opportunity.

Peter Fretty, IDG blogger working on behalf of Sophos
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's too shy to invite me out face to face!"
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-9405
PUBLISHED: 2019-09-20
The wp-piwik plugin before 1.0.5 for WordPress has XSS.
CVE-2015-9407
PUBLISHED: 2019-09-20
The xpinner-lite plugin through 2.2 for WordPress has xpinner-lite.php XSS.
CVE-2015-9408
PUBLISHED: 2019-09-20
The xpinner-lite plugin through 2.2 for WordPress has wp-admin/options-general.php CSRF with resultant XSS.
CVE-2019-16533
PUBLISHED: 2019-09-20
On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product.
CVE-2019-16534
PUBLISHED: 2019-09-20
On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product.