Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/19/2016
08:01 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

'Kevin Durant Effect': What Skilled Cybersecurity Pros Want

For seasoned cybersecurity professionals, motivation for sticking with their current jobs doesn't mean big management promotions or higher salaries, a new Center for Strategic and International Studies (CSIS) report finds.

It's not just about the money: skilled cybersecurity professionals most value a position that includes challenging work with plenty of variety, training and career development, and where they work alongside similarly highly-skilled security pros.

Sure, a competitive salary is their threshold, but they're willing to stay with their employer if the organization provides them other perks including flexible hours, according to a new study by the Center for Strategic and International Studies (CSIS).

"Once their basic salary was met … to higher-level technical professionals, salary is not the most motivating factor," says Katrina Timlin, associate fellow with CSIS' Strategic Technologies Program. They value interesting work, the ability to hone their skills, and working with fellow seasoned pros.

"They seek companies where they can learn from their peers," she says.

It's what CSIS calls the "Kevin Durant Effect," named after NBA star Kevin Durant who this year left the Oklahoma City Thunder for the stronger Golden State Warriors team so he could play with other highly talented teammates and have a better shot at winning the NBA championship.

"We saw [cybersecurity] ninjas worried less about competitive pay — they know they could find [something else] with good pay — but other factors were more important. What I found most interesting was what we call the 'Kevin Durant Effect,' where they want to play with other high-end performers" at their organization, says Frank Reeder, co-founder and director of the Center for Internet Security and the National Board of Security Examiners, who co-authored the report with Timlin. "They want to be working with colleagues who can raise their game."

Most aren't interested in moving up the ladder to management either:  they prefer promotions that don't require their taking a management-level position (46%). They want to remain hands-on and stimulated in their craft, which includes coveted security skills such as threat analytics, advanced forensics, intrusion analysis, secure programming, and penetration testing.

Just what it takes to retain skilled cybersecurity pros — nicknamed "cyber ninjas" in the CSIS report — has become a burning question for employers today in what has become a seller's market for these employees. The gaping cybersecurity skills gap has left some 1 million cybersecurity job openings worldwide, and the most seasoned professionals are in hot demand, often leading to attrition problems for companies.

Nearly half of cybersecurity pros one or more times per week receive an email or phone call from a recruiter or other party about a job opening, according to recent Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) data. Only 41% say they are "very satisfied" with their current gigs, while 44% are "somewhat satisfied," and 15% are not satisfied at all, ESG and ISSA found.

The goal of the CSIS study, "Recruiting and Retaining Cybersecurity Ninjas," was to determine what drives seasoned cybersecurity professionals to pick one employer over another, and to identify what employers are doing to attract, and more importantly, retain them. The report took survey data from nearly 300 cybersecurity pros. CSIS then interviewed some of the respondents to gain more insight into their answers.

Some 72% of cybersecurity ninjas ranked as "very important" having engaging and challenging tasks and employer-paid training to keep their skills up-to-date; 67%, flexible hours; 58% competitive pay and benefits; and 46%, promotions that don't require moving into management positions. Non-ninja, or less skilled pros, diverged from ninjas when it came to the importance of flexible work schedules (52%); competitive pay and benefits (64%). Only 26% of non-ninjas say they prefer not becoming a manager in order to get promoted.

Cyber ninjas value a variety of tasks, Timlin says. "This is interesting for employers: if you want to have vibrant cybersecurity professionals, you have to offer them new experiences and they don't want to be solving the same problem over and over," Timlin says. "That's one of the key differentiators that set cyber ninjas apart" from non-ninja cyber pros, she says.

Training is also a must-have for ninjas: some 67% say a lack of funding by their employer for training would be an important factor in their leaving the organization.

The bad news there is that training is often low on the budget priority list. Candy Alexander, CISO of ISSA and chair of its cyber security career lifecycle program, says training is one of the first things that gets cut from the budget. "It always comes down to budget, and training is the first to be cut, or cutting back on resources," she said in a press briefing earlier this month.  

CSIS found that the ninja-level pros held the most industry certifications: one or more. The most common certification for ninjas and non-ninjas is the CISSP (Certified Information Systems Security Professional), with nearly 60% of non-ninjas holding one.

The CISSP also was most valued in the ESG-ISSA report, which found that some 56% of security pros hold a CISSP, and most say it was "valuable" both for getting hired (61%) and for on-the-job know-how (55%).

Reeder says the value of certs in cybersecurity is relatively unique. "This is materially different from other professions, where folks are compelled to maintain some level of currency by continuing education credits," Reeder says. "Cyber ninjas see certifications as being effective and in maintaining their currency."

The National Security Agency, Cisco, Citibank, and several federal laboratories got shout-outs in the CSIS report for their high marks from ninjas who work there.

Related Content:

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11565
PUBLISHED: 2020-04-06
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa.
CVE-2020-11558
PUBLISHED: 2020-04-05
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_m...
CVE-2020-11547
PUBLISHED: 2020-04-05
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
CVE-2020-11548
PUBLISHED: 2020-04-05
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
CVE-2020-11542
PUBLISHED: 2020-04-04
3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.