Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/19/2016
08:01 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

'Kevin Durant Effect': What Skilled Cybersecurity Pros Want

For seasoned cybersecurity professionals, motivation for sticking with their current jobs doesn't mean big management promotions or higher salaries, a new Center for Strategic and International Studies (CSIS) report finds.

It's not just about the money: skilled cybersecurity professionals most value a position that includes challenging work with plenty of variety, training and career development, and where they work alongside similarly highly-skilled security pros.

Sure, a competitive salary is their threshold, but they're willing to stay with their employer if the organization provides them other perks including flexible hours, according to a new study by the Center for Strategic and International Studies (CSIS).

"Once their basic salary was met … to higher-level technical professionals, salary is not the most motivating factor," says Katrina Timlin, associate fellow with CSIS' Strategic Technologies Program. They value interesting work, the ability to hone their skills, and working with fellow seasoned pros.

"They seek companies where they can learn from their peers," she says.

It's what CSIS calls the "Kevin Durant Effect," named after NBA star Kevin Durant who this year left the Oklahoma City Thunder for the stronger Golden State Warriors team so he could play with other highly talented teammates and have a better shot at winning the NBA championship.

"We saw [cybersecurity] ninjas worried less about competitive pay — they know they could find [something else] with good pay — but other factors were more important. What I found most interesting was what we call the 'Kevin Durant Effect,' where they want to play with other high-end performers" at their organization, says Frank Reeder, co-founder and director of the Center for Internet Security and the National Board of Security Examiners, who co-authored the report with Timlin. "They want to be working with colleagues who can raise their game."

Most aren't interested in moving up the ladder to management either:  they prefer promotions that don't require their taking a management-level position (46%). They want to remain hands-on and stimulated in their craft, which includes coveted security skills such as threat analytics, advanced forensics, intrusion analysis, secure programming, and penetration testing.

Just what it takes to retain skilled cybersecurity pros — nicknamed "cyber ninjas" in the CSIS report — has become a burning question for employers today in what has become a seller's market for these employees. The gaping cybersecurity skills gap has left some 1 million cybersecurity job openings worldwide, and the most seasoned professionals are in hot demand, often leading to attrition problems for companies.

Nearly half of cybersecurity pros one or more times per week receive an email or phone call from a recruiter or other party about a job opening, according to recent Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) data. Only 41% say they are "very satisfied" with their current gigs, while 44% are "somewhat satisfied," and 15% are not satisfied at all, ESG and ISSA found.

The goal of the CSIS study, "Recruiting and Retaining Cybersecurity Ninjas," was to determine what drives seasoned cybersecurity professionals to pick one employer over another, and to identify what employers are doing to attract, and more importantly, retain them. The report took survey data from nearly 300 cybersecurity pros. CSIS then interviewed some of the respondents to gain more insight into their answers.

Some 72% of cybersecurity ninjas ranked as "very important" having engaging and challenging tasks and employer-paid training to keep their skills up-to-date; 67%, flexible hours; 58% competitive pay and benefits; and 46%, promotions that don't require moving into management positions. Non-ninja, or less skilled pros, diverged from ninjas when it came to the importance of flexible work schedules (52%); competitive pay and benefits (64%). Only 26% of non-ninjas say they prefer not becoming a manager in order to get promoted.

Cyber ninjas value a variety of tasks, Timlin says. "This is interesting for employers: if you want to have vibrant cybersecurity professionals, you have to offer them new experiences and they don't want to be solving the same problem over and over," Timlin says. "That's one of the key differentiators that set cyber ninjas apart" from non-ninja cyber pros, she says.

Training is also a must-have for ninjas: some 67% say a lack of funding by their employer for training would be an important factor in their leaving the organization.

The bad news there is that training is often low on the budget priority list. Candy Alexander, CISO of ISSA and chair of its cyber security career lifecycle program, says training is one of the first things that gets cut from the budget. "It always comes down to budget, and training is the first to be cut, or cutting back on resources," she said in a press briefing earlier this month.  

CSIS found that the ninja-level pros held the most industry certifications: one or more. The most common certification for ninjas and non-ninjas is the CISSP (Certified Information Systems Security Professional), with nearly 60% of non-ninjas holding one.

The CISSP also was most valued in the ESG-ISSA report, which found that some 56% of security pros hold a CISSP, and most say it was "valuable" both for getting hired (61%) and for on-the-job know-how (55%).

Reeder says the value of certs in cybersecurity is relatively unique. "This is materially different from other professions, where folks are compelled to maintain some level of currency by continuing education credits," Reeder says. "Cyber ninjas see certifications as being effective and in maintaining their currency."

The National Security Agency, Cisco, Citibank, and several federal laboratories got shout-outs in the CSIS report for their high marks from ninjas who work there.

Related Content:

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14832
PUBLISHED: 2019-10-15
A flaw was found in the Keycloak REST API before version 8.0.0 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.
CVE-2017-10022
PUBLISHED: 2019-10-15
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing ...
CVE-2019-10759
PUBLISHED: 2019-10-15
safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10760
PUBLISHED: 2019-10-15
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-17397
PUBLISHED: 2019-10-15
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.