CISO's Cant Find The Right People

A recent study by the upscale human talent acquisition agency Stott and May, featuring a panel of 55 security leaders from around the globe, has found that access to cyber security skills remains the number one barrier to strategy execution. 39% of the sample stated that a lack of internal security skills was their number one challenge with budget (30%), board level buy-in (22%) and technology (9%) called out as other notable hurdles.
 
Other key findings in the report include:
 
  •  Most respondents (76%) believe there is a shortage of cyber security skills in their company, however, the problem still seems more potent for mid-market and large enterprise businesses.
  •  Organisations are still struggling to source cyber security talent (72%) with no material improvement around time-to-hire from 2019. 
  • The business perception of cyber security is moving away from unnecessary expense (15%) towards strategic priority (54%) in the wake of well publicised breaches resulting in fines and reputational damage.
  • Customers are becoming more educated and demanding around the issue of cyber security, driving most respondents (69%) to conclude that their business feels that functions can add value to their companies’ overall proposition. 
  •  As more business move towards the cloud 54% of cyber leaders believe we will see an increase in incidents. 
  •  30% of security leaders are also looking internally for transferable skills first before going to the open market.
CISO’s are being forced to become more creative about how they leverage their finite resources with 46% of the sample stating that they believed that AI and Machine Learning could offer part of the solution in terms of automating more workloads.
 
Jim Rutt, CISO at the medical research organisation, he Dana Foundation, one of the participants in the research stated; “the first thing that most CISO’s are going to gravitate towards is trying to leverage some form of artificial intelligence or automation. There’s upside here in terms of making teams work a lot smarter and reducing the volume of manual tasks.”
 
Rutt did, however, explain that CISO’s need to be more hands on if automation projects are to realise their intended benefits. “Often the challenge is the burden on building these initiatives falls on the SOC team rather than the architectural or leadership teams. These individuals are less likely to understand, from an enterprise perspective, what they should be automating and where the priorities sit.” 
 
He continued; “CISO’s need to be looking at solutions that reduce manual work, but they need to really have skin in the game from a technical and process perspective about what’s going on and what is going to be viable.”
 
The report also touches upon the key challenges that sit in front of CISO’s in 2020. Outside of getting a better handle on the recent influx of remote workers and the aforementioned need for more automation, key themes also included; improving maturity around risk measurement and metrics, insider threat, asset management and API security.
 
 
The Stott and May Cyber Security in Focus Survey examines the key issues that have made an impact on the market over the course of this year. Respondents were asked to share their views across a wide range of issues including, but not limited to, the skills shortage, the boardroom perception of cyber security, talent attraction and the challenges associated with securing business in the cloud. You can access the full report here.
 
You Might Also Read: 
 
How Can Boardrooms Effectively Manage Cyber Risk?:
 
 
 
 
« Beware The Latest Malware
Coronavirus Phishing Scams »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

Findcourses.co.uk

Findcourses.co.uk

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

360 Advanced

360 Advanced

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs.