Business Has Increased Cyber Security But Lacks Cyber Training

No online business, government institution, or industry is safe from the wrath of cyber criminals andthe  sooner a cyber threat is detected, the smaller the attack surface. With quick detection, defenders will be able to protect the computer systems, intellectual property, and the brand reputation in minimum time.

In its 2020 SANS Cyber Threat Intelligence Survey, the education and training provider received 1006 responses from a wide-ranging group of security professionals from various organisations. A lack of trained staff was cited by 57% of those polled, whilst 52% and 48% respectively said a lack of time to implement new processes and a lack of funding also played a part.

The survey also discovered that, in many cases, CTI has evolved from small, ad hoc tasks performed disparately across businesses to robust programs with dedicated staff, tools and processes. More than 84% of respondents said their organisation has at least some kind of resource focusing on CTI, with 44% reporting a formal process for gathering intelligence requirements, which makes intelligence processes more efficient, effective and measurable.

“In the past three years, we have seen an increase in the percentage of respondents choosing to have a dedicated team over a single individual responsible for the entire CTI program.... Collaboration within organisations is also on the rise,” he added, “with many respondents reporting that their CTI teams are part of a coordinated effort across the organisation.” saidSANS instructor Robert M Lee.

There are, however, issues  that hold some businesses back from implementing effective, the research showed. Far too often security is being overlooked in the rush to embrace digital innovation. As a result, as businesses rapidly adopt new technologies and computing platforms, they are also opening the door for cyber criminals who are looking to gain access to valuable data.

Cybersecurity needs to play a central role in all digital transformation efforts, a strategy known as security-driven networking.

Many of these same businesses are also facing the challenges of the growing cybersecurity skills shortage, which can lead to unfilled roles with traditional areas of responsibility, such as identifying, patching, and updating vulnerable systems.

Conclusion

The cybersecurity skills shortage can have a significant impact on organisations and their employees. Chief Information Security Officer (CISO)s are now responsible for bridging the gap between business operations and security, so it is fitting that these individuals should also be the ones to address this challenge.

By establishing a training, mentoring, and education program, CISOs can help their employees expand their knowledge of network security and the threat landscape and build upon existing skills to bridge the skills gap.

For more specific data about Cyber training please contact Cyber Security Intelligence for free Information.

SANS:      CSO Online:         eCouncil:           Infosecurity Magazine
 

You Might Also Read: 

Preparing Your Employees & Business Systems For A Cyber Attack:

 

 

 

 

« Iran's Cutting Edge Cyberwar Capabilities
Top Cybersecurity Threats & Solutions To Empower Every Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Caldew Consulting

Caldew Consulting

Caldew specialise in providing information assurance and cyber security consultancy, covering the full spectrum of the security life cycle.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija is the national accreditation body for Slovenia. The directory of members provides details of organisations offering certification services for ISO 27001.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

AdviserCyber

AdviserCyber

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

Prowler

Prowler

Prowler is at the forefront of the Open Cloud Security movement, championing a new era of transparency, customizability, and community-driven security for cloud environments.

Blind Insight

Blind Insight

Field-level searchable encryption plus fine-grained programmable access controls. All wrapped neatly in developer-friendly APIs and SDKs. Data protection perfection.