In S.Africa The Cybersecurity Skills Gap Is A Chasm

The digital landscape has grown at a rapid pace over the past 10 years, says Vikas Kapoor, Practice head, Cybersecurity and GRC at In2IT Technologies.

The sheer scale of our connected, digital world means that the scope for cyber-crime has also broadened. As each new technology is unveiled, it introduces a new security risk.

South Africa 3rd most Cyber-Attacked Country
South Africa has seen a steady rise in cyber-crime, jumping to rank as the 3rd most cyber attacked country in the world out of 117 countries. The situation is dire, and not helped by their vast shortage of cyber security skills. Cyber security professionals are constantly having to play catch up, and the development of cyber security skills is simply not keeping pace with digital and technological expansion, a lack which cyber criminals are capitalising on.

Mind the Gap
This skills shortage is not confined to South African borders, and countries across the globe face similar challenges. The highly publicised global security breaches of this past year point to an increase in the prevalence of the likes of ransomware, a malware that keeps evolving to find new ways to penetrate and attack networks. As fast as cyber security measures improve to bridge current security gaps, so does cyber threats, resulting in a continuous shortfall of suitably skilled people capable of properly protecting networks from intrusion. Beyond the vast size of growing security concerns, another contributor to the dire shortage of skills in this critical sector is time. 

Becoming a knowledgeable expert in cyber security takes a considerable investment of time spent learning various technologies and systems, and understanding how they integrate. 

It takes time to build a pool of skilled resources, including time spent in the classroom, to time spent garnering experience protecting live networks. Unfortunately, the cyber security space is already on the back foot and time is of the essence. Cybersecurity experts require more than just the skills taught in a classroom. They also require a mindset that thirsts for knowledge on security threats. It's more than simply understanding how to protect a network but, also, what to protect it from.  The ability to navigate and understand the dark Web, or what new cyber security threats are emerging goes a long way towards a building proactive, security-centric mindset.

Fill the Gap
The challenge for businesses is that they do not necessarily have the right in house skills to cater to their growing cyber security needs. Furthermore, they may not have the right knowledge to hire people with the right skills either. There is a distinct gap in the market for recruitment agencies that specialise in the cyber security industry. Organisations that are tackling this recruitment process themselves, need to ensure they are opting for individuals who possess the full package: suitable cyber security certifications, experience with multiple environments and the security-centric mindset. 

However, such individuals are, for now, few and far between.

Organisations can look to co-sourced services to address their cyber security needs, partnering with experienced outsource partners to supplement their own teams, thus building on their skills while benefitting from the expertise of experts. From a national perspective, South Africa needs to begin addressing the skills gap before we can start to reduce our chances of cyber-attack. 

The United States of America have developed their NICE Cybersecurity Workforce Framework which details a framework around categorising, organising, and describing cybersecurity work into various roles and areas. 
South Africa, at a national level, should be looking to develop a similar initiative. Government led initiatives around building specific learning centres or training facilities for the development of cyber security skills would also go a long way padding skills development.

Additional encouragement of careers in this field can also be attained through offering tax breaks for students pursuing cyber security studies, or organisations who invest in programmes for cyber security development. 
Perhaps even encouraging the bringing in of talent from outside of our borders, in order to supplement our skills pool as well as increase our knowledge base.

It's a matter of time before South Africa feels the full brunt of being a cybercrime target. We need to act now to begin to address this gap before cyber-crime affects our economy and our reputation.

ITWeb

You Might Also Read: 

Three Most In-Demand Cybersecurity Jobs:

S. Africa’s Model For Cybesecurity:

South Africa: Serious About Cyberwarfare:

« Cyber Attacks Rank Alongside Natural Disasters
Drones: A Crowd-Management Solution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

Catalyst Campus For Technology & Innovation

Catalyst Campus For Technology & Innovation

Catalyst Campus is a collaborative ecosystem to create community, spark innovation and stimulate business growth.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.