In S.Africa The Cybersecurity Skills Gap Is A Chasm

The digital landscape has grown at a rapid pace over the past 10 years, says Vikas Kapoor, Practice head, Cybersecurity and GRC at In2IT Technologies.

The sheer scale of our connected, digital world means that the scope for cyber-crime has also broadened. As each new technology is unveiled, it introduces a new security risk.

South Africa 3rd most Cyber-Attacked Country
South Africa has seen a steady rise in cyber-crime, jumping to rank as the 3rd most cyber attacked country in the world out of 117 countries. The situation is dire, and not helped by their vast shortage of cyber security skills. Cyber security professionals are constantly having to play catch up, and the development of cyber security skills is simply not keeping pace with digital and technological expansion, a lack which cyber criminals are capitalising on.

Mind the Gap
This skills shortage is not confined to South African borders, and countries across the globe face similar challenges. The highly publicised global security breaches of this past year point to an increase in the prevalence of the likes of ransomware, a malware that keeps evolving to find new ways to penetrate and attack networks. As fast as cyber security measures improve to bridge current security gaps, so does cyber threats, resulting in a continuous shortfall of suitably skilled people capable of properly protecting networks from intrusion. Beyond the vast size of growing security concerns, another contributor to the dire shortage of skills in this critical sector is time. 

Becoming a knowledgeable expert in cyber security takes a considerable investment of time spent learning various technologies and systems, and understanding how they integrate. 

It takes time to build a pool of skilled resources, including time spent in the classroom, to time spent garnering experience protecting live networks. Unfortunately, the cyber security space is already on the back foot and time is of the essence. Cybersecurity experts require more than just the skills taught in a classroom. They also require a mindset that thirsts for knowledge on security threats. It's more than simply understanding how to protect a network but, also, what to protect it from.  The ability to navigate and understand the dark Web, or what new cyber security threats are emerging goes a long way towards a building proactive, security-centric mindset.

Fill the Gap
The challenge for businesses is that they do not necessarily have the right in house skills to cater to their growing cyber security needs. Furthermore, they may not have the right knowledge to hire people with the right skills either. There is a distinct gap in the market for recruitment agencies that specialise in the cyber security industry. Organisations that are tackling this recruitment process themselves, need to ensure they are opting for individuals who possess the full package: suitable cyber security certifications, experience with multiple environments and the security-centric mindset. 

However, such individuals are, for now, few and far between.

Organisations can look to co-sourced services to address their cyber security needs, partnering with experienced outsource partners to supplement their own teams, thus building on their skills while benefitting from the expertise of experts. From a national perspective, South Africa needs to begin addressing the skills gap before we can start to reduce our chances of cyber-attack. 

The United States of America have developed their NICE Cybersecurity Workforce Framework which details a framework around categorising, organising, and describing cybersecurity work into various roles and areas. 
South Africa, at a national level, should be looking to develop a similar initiative. Government led initiatives around building specific learning centres or training facilities for the development of cyber security skills would also go a long way padding skills development.

Additional encouragement of careers in this field can also be attained through offering tax breaks for students pursuing cyber security studies, or organisations who invest in programmes for cyber security development. 
Perhaps even encouraging the bringing in of talent from outside of our borders, in order to supplement our skills pool as well as increase our knowledge base.

It's a matter of time before South Africa feels the full brunt of being a cybercrime target. We need to act now to begin to address this gap before cyber-crime affects our economy and our reputation.

ITWeb

You Might Also Read: 

Three Most In-Demand Cybersecurity Jobs:

S. Africa’s Model For Cybesecurity:

South Africa: Serious About Cyberwarfare:

« Cyber Attacks Rank Alongside Natural Disasters
Drones: A Crowd-Management Solution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

Rocheston

Rocheston

Rocheston is an innovation company with cutting-edge research and development in emerging technologies such as Cybersecurity, Internet of Things, Big Data and automation.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

Rite-Solutions

Rite-Solutions

Rite-Solutions is an award-winning software development, systems engineering, and information technology firm.