Finding The Right Security Professional

By 2019, there will be approximately two million cybersecurity jobs available around the world without enough talent to fill them. Demand for talented security professionals far outweighs supply.

Backed by a $19 trillion industry, cyber criminals are finding new and complex ways of compromising systems and are evading detection more than ever before. In fact, Cisco alone blocks more than 20 billion threats a day and 1.5 millions of these are unique malware samples.

With the media landscape dominated by high profile attacks, it is clear that no company is immune to cyber threats - to put it simply, it is not a case of if a company is hacked, but when. In order to survive and thrive in this landscape, companies need to have a cyber security strategy in place. That includes hiring the right staff with the right certification to keep up with evolving threats, while also putting in place the right security architecture to free them up to focus on innovation and creating business value.

However, demand for talented security professionals far outweighs supply. Cisco predicts that there will be a shortfall of 2 million by 2019. If businesses are to protect its customers, employees and importantly brand confidence against potential cyber-attacks, there is a vital need to increase the number of skilled security professionals in the cyber security sector.

In this digital era, a comprehensive and agile cyber security policy empowers organisations to not only protect themselves, enable trust, be more agile and ultimately to add value to the business and grow. However, with the volume and sophistication of cyber-attacks continuing to rise, it is essential that we readdress the balance and invest in talent to lessen the shortage.

Why the fuss?

The estimated annual cost of cyber-crime to the global economy is predicted to be anywhere between $375bn, to as much as $575bn. As such, significant cyber threats and ongoing attempts to breach network security and capture data are outpacing the ability for businesses to address these threats, leaving themselves vulnerable to attack.

By 2019, there will be approximately two million cyber security jobs available around the world without enough talent to fill them. The lack of trained personnel and the skills deficit of existing personnel represents one of the greatest barriers organisations face to securing and safeguarding their own and their customers’ information.

According to Cisco’s 2016 Annual Security Report, businesses are struggling to keep pace with the rapid advancements of attackers for three main reasons. The first is that a typical enterprise has 30-40 different security vendor products in its network due to the increasing complexity of the security landscape. 

Secondly, the changing nature of attacks – attacks are being generated, not just by individual hackers, but also by well-funded organisations with a lot of resource at their disposal. Thirdly, the internet of things – while the IoT has created a wealth of new opportunities, the increased number of devices connected to the network has given cyber criminals myriad access points to target systems.

The security talent shortage makes dealing with this problem very challenging. The reality is that we don’t live in a warm glow of effective cyber security, but under the dark shadow of cyber threat. In order to survive and thrive in this landscape, companies need to be able to keep up with evolving threats and invest in people with the right experience to pre-empt criminal activity.

Leaning on external experts can provide access to this necessary business intelligence in the absence of skilled professionals to hire directly into the business.

Cyber security – essential to digital success

Cyber security is essential to digital success; however, the ability for businesses to innovate is hampered by the inherent and very real security threat. One way to address the cyber security skills gap is to help retrain people already in the IT space.

Anyone from veterans to those early in their careers could be inspired to enter the cyber security profession. We need to take a look beyond just training those new to the workforce - which is still an important route to take to address this vast skills shortage and build the talent of the future.

Building an effective cyber security strategy needs to take a holistic approach and must include simplifying the security infrastructure. Businesses should aim to reduce fragmentation and compartmentalisation between IT and security while increasing visibility and accountability. They must also adopt an unrelenting approach to security efficacy particularly regarding processes and threat intelligence.

That said, these processes are only as strong as the talented security experts able to bring it all together. In the case of security, people are just as important as technology when mitigating the effects of a security breach.

ITProPortal:

 

« Delete/Never-Use Google Allo: Says Snowden
Cybercrime Inc. Hackers Model Themselves On Big Business »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

Zadara Storage

Zadara Storage

Zadara provide complete data backup and protection delivered as a fully-managed service.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

Cybermate

Cybermate

Cybermate is the first affordable, gamified ‘Psybersecurity’ awareness training platform that reduces behavioural risk and achieves compliance with Australian cybersecurity standards.