Cyber Security Teams Feel The Pressure 

More than 50% of European cyber security professionals say their team is understaffed and struggling to manage growing workloads and they feel restricted and constrained. These European IT security teams are overstressed, underfunded and suffering from major skills gaps and shortages of staff, according to ISACA.

Research from the leading professional association for information security professionals has found that 61% of security teams are dealing with staff shortages, while around half (52%) of cyber professionals believe their budgets are lower than required.

Notably, the study found that many respondents have experienced acute challenges in recruiting for open positions over the last year. Nearly one-in-five respondents said their organisation has unfilled and open entry-level positions available, while around half (48%) have unfilled positions which require experience, such as a university degree or other industry accredited qualifications.

These statistics from ISACA come amid a period of heightened cyber security threats for businesses globally, which the organisation said is being exacerbated by a lack of relevant skills.

  • Nearly half (41%) of respondents said they are experiencing more cyber attacks compared to the same period last year while 29% think they are experiencing the same volume of attacks.  
  • Over half (58%) said they anticipate their organisation will experience a cyber attack in the next year. This marks an increase compared to ISACA research from the year prior, underlining the need for greater investment and funding to drive recruitment.

To combat understaffing, ISACA’s research specifically highlighted the benefits of cultivating a workforce with a diverse range of skills and backgrounds. “ISACA's 2024 State of Cybersecurity report reveals that stress levels are on the rise for cyber security professionals, largely due to an increasingly challenging threat landscape. 

“The annual ISACA research also identifies key skills gaps in cyber security, how artificial intelligence is impacting the field, the role of risk assessments and cyber insurance in enterprises' security programs, and more,” says ISACA.

Read the full Report – State of Cybersecurity 2024 – HERE 

ISACA   |    ITPro   |   Infosecurity Magazine   |    Business Wire   |   Computer Weekly  

Image:  Unsplash

You Might Also Read: 

Cyber Security Staff Burnout Costs Firms $600m A Year:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« 2024 US Presidential Election Cyber Intrusion: Part 5 - Cybercrime Threats
Preparing IT Teams For The Next AI Wave »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.

EasySec Solutions

EasySec Solutions

EasySec Solutions provides a cyber-security platform, based on a combination of the zero trust model and the software-defined security management.

XeneX

XeneX

XeneX Cloud Security Services address enterprise-class security challenges by enabling DevOps and Security teams to access a shared source of truth.