Business Has Increased Cyber Security But Lacks Cyber Training

No online business, government institution, or industry is safe from the wrath of cyber criminals andthe  sooner a cyber threat is detected, the smaller the attack surface. With quick detection, defenders will be able to protect the computer systems, intellectual property, and the brand reputation in minimum time.

In its 2020 SANS Cyber Threat Intelligence Survey, the education and training provider received 1006 responses from a wide-ranging group of security professionals from various organisations. A lack of trained staff was cited by 57% of those polled, whilst 52% and 48% respectively said a lack of time to implement new processes and a lack of funding also played a part.

The survey also discovered that, in many cases, CTI has evolved from small, ad hoc tasks performed disparately across businesses to robust programs with dedicated staff, tools and processes. More than 84% of respondents said their organisation has at least some kind of resource focusing on CTI, with 44% reporting a formal process for gathering intelligence requirements, which makes intelligence processes more efficient, effective and measurable.

“In the past three years, we have seen an increase in the percentage of respondents choosing to have a dedicated team over a single individual responsible for the entire CTI program.... Collaboration within organisations is also on the rise,” he added, “with many respondents reporting that their CTI teams are part of a coordinated effort across the organisation.” saidSANS instructor Robert M Lee.

There are, however, issues  that hold some businesses back from implementing effective, the research showed. Far too often security is being overlooked in the rush to embrace digital innovation. As a result, as businesses rapidly adopt new technologies and computing platforms, they are also opening the door for cyber criminals who are looking to gain access to valuable data.

Cybersecurity needs to play a central role in all digital transformation efforts, a strategy known as security-driven networking.

Many of these same businesses are also facing the challenges of the growing cybersecurity skills shortage, which can lead to unfilled roles with traditional areas of responsibility, such as identifying, patching, and updating vulnerable systems.

Conclusion

The cybersecurity skills shortage can have a significant impact on organisations and their employees. Chief Information Security Officer (CISO)s are now responsible for bridging the gap between business operations and security, so it is fitting that these individuals should also be the ones to address this challenge.

By establishing a training, mentoring, and education program, CISOs can help their employees expand their knowledge of network security and the threat landscape and build upon existing skills to bridge the skills gap.

For more specific data about Cyber training please contact Cyber Security Intelligence for free Information.

SANS:      CSO Online:         eCouncil:           Infosecurity Magazine
 

You Might Also Read: 

Preparing Your Employees & Business Systems For A Cyber Attack:

 

 

 

 

« Iran's Cutting Edge Cyberwar Capabilities
Top Cybersecurity Threats & Solutions To Empower Every Business »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

ImpactQA

ImpactQA

ImpactQA is a global leading software testing & QA consulting company. Ten years of excellence. Delivering unmatched services & digital transformation to SMEs & Fortune 500 companies.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.