Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

10/20/2013
08:43 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Study Reveals Shortage Of IT Security Talent Equals Abundance Of Risk

Half of IT and business leaders surveyed believe shortage of qualified security talent is exposing their organizations to serious risk, according to TEKsystems

Hanover, Md. – October 16, 2013 – In recognition of the 10th anniversary of National Cyber Security Awareness Month, TEKsystems® Network Services practice surveyed IT and business leaders to gauge how well their organizations are currently addressing information security. National Cyber Security Awareness Month is sponsored by the Department of Homeland Security, National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center with the goal of empowering public and private sector stakeholders to create a safe, secure and resilient cyber environment.

Key findings of the study include:

There's a Pervasive Human Capital Crisis

Organizations attempting to tackle critical IT security initiatives suffer from the shortage of IT talent.

· Half of respondents believe the lack of qualified security talent is approaching a state of critical mass where their organizations are vulnerable to serious risk exposure.

· Only 15% of respondents are very confident that they have the security-related skill sets needed to meet evolving threat landscapes.

· Less than 20% are very confident their IT organization has an adequate allocation of information security resources in-house for security policy, identity and access management and information risk management skills. Further, more than half say it is difficult to find and source resources for these skill sets.

Security Complexities are Overwhelming

Information security is so complex that organizations cannot adequately assess their needs.

· More than 60% believe the growing scope and complexity of IT security make it difficult for their organization to effectively assess current security programs and develop comprehensive strategic planning efforts.

Organizations Struggle to Keep Up

It is essential that organizations continually evolve their security strategies to keep pace with the changing ecosystem, yet IT is too bogged down by tactical activities.

· The majority of the respondents indicate that their information security teams are too busy handling tactical, day-to-day work to spend the adequate amount of time on critical strategic information security initiatives.

About TEKsystems People are at the heart of every successful business initiative. At TEKsystems, we understand people. Every year we deploy over 80,000 IT professionals at 6,000 client sites across North America, Europe and Asia. Our deep insights into IT human capital management enable us to help our clients achieve their business goals–while optimizing their IT workforce strategies. We provide IT staffing solutions, IT talent management expertise and IT services to help our clients plan, build and run their critical business initiatives. Through our range of quality-focused delivery models, we meet our clients where they are, and take them where they want to go, the way they want to get there.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Peter Fretty
50%
50%
Peter Fretty,
User Rank: Moderator
10/30/2013 | 6:31:22 PM
re: Study Reveals Shortage Of IT Security Talent Equals Abundance Of Risk
Scary to think that another survey shows that only 18 percent of Millennials are encouraged to enter the field of web or network security. If the industry wants to stay ahead of attackers it needs to do a better job of painting the picture to demonstrate opportunity.

Peter Fretty, IDG blogger working on behalf of Sophos
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16632
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
CVE-2021-32073
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.