Business Has Increased Cyber Security But Lacks Cyber Training

No online business, government institution, or industry is safe from the wrath of cyber criminals andthe  sooner a cyber threat is detected, the smaller the attack surface. With quick detection, defenders will be able to protect the computer systems, intellectual property, and the brand reputation in minimum time.

In its 2020 SANS Cyber Threat Intelligence Survey, the education and training provider received 1006 responses from a wide-ranging group of security professionals from various organisations. A lack of trained staff was cited by 57% of those polled, whilst 52% and 48% respectively said a lack of time to implement new processes and a lack of funding also played a part.

The survey also discovered that, in many cases, CTI has evolved from small, ad hoc tasks performed disparately across businesses to robust programs with dedicated staff, tools and processes. More than 84% of respondents said their organisation has at least some kind of resource focusing on CTI, with 44% reporting a formal process for gathering intelligence requirements, which makes intelligence processes more efficient, effective and measurable.

“In the past three years, we have seen an increase in the percentage of respondents choosing to have a dedicated team over a single individual responsible for the entire CTI program.... Collaboration within organisations is also on the rise,” he added, “with many respondents reporting that their CTI teams are part of a coordinated effort across the organisation.” saidSANS instructor Robert M Lee.

There are, however, issues  that hold some businesses back from implementing effective, the research showed. Far too often security is being overlooked in the rush to embrace digital innovation. As a result, as businesses rapidly adopt new technologies and computing platforms, they are also opening the door for cyber criminals who are looking to gain access to valuable data.

Cybersecurity needs to play a central role in all digital transformation efforts, a strategy known as security-driven networking.

Many of these same businesses are also facing the challenges of the growing cybersecurity skills shortage, which can lead to unfilled roles with traditional areas of responsibility, such as identifying, patching, and updating vulnerable systems.

Conclusion

The cybersecurity skills shortage can have a significant impact on organisations and their employees. Chief Information Security Officer (CISO)s are now responsible for bridging the gap between business operations and security, so it is fitting that these individuals should also be the ones to address this challenge.

By establishing a training, mentoring, and education program, CISOs can help their employees expand their knowledge of network security and the threat landscape and build upon existing skills to bridge the skills gap.

For more specific data about Cyber training please contact Cyber Security Intelligence for free Information.

SANS:      CSO Online:         eCouncil:           Infosecurity Magazine
 

You Might Also Read: 

Preparing Your Employees & Business Systems For A Cyber Attack:

 

 

 

 

« Iran's Cutting Edge Cyberwar Capabilities
Top Cybersecurity Threats & Solutions To Empower Every Business »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Prismo Systems

Prismo Systems

Prismo provides a unified platform to secure software development across the entire SDLC and deployment on any cloud or on-premises infrastructure.

Seezo

Seezo

Seezo leverages Gen AI to make world-class AppSec accessible to every engineering team.