April 13, 2018 By Douglas Bonderud 2 min read

A new report revealed that the majority of chief information security officers (CISOs) around the world are worried about the cybersecurity skills shortage.

According to a Bitdefender survey titled “CISOs’ Toughest Dilemma: Prevention Is Faulty, yet Investigation Is a Burden,” more than 60 percent of global security leaders said they are negatively affected by the skills shortage. In addition, 69 percent of respondents said their team was under-resourced, and 72 percent said their team had experienced “alert and agent fatigue.” This is particularly worrisome since more than half of security leaders in the U.K. (57 percent), U.S. (55 percent), France (58 percent) and Italy (53 percent) said they’d experienced a breach in the past year.

Poor EDR Tools Exacerbating Cybersecurity Skills Shortage

For CISOs trying to bridge the talent gap, this creates two pain points, according to the report: ineffective tools and investigations hampered by a lack of personnel. As noted by Harish Agastya, Bitdefender’s vice president of enterprise solutions, “The survey results show that today’s resource- and skill-constrained IT security teams need an endpoint detection and response (EDR) approach that allows for less human intervention and a higher level of fidelity in incident investigations.”

The cybersecurity skills shortage also makes sorting through EDR alerts more difficult — 43 percent of CISOs cited a lack of personnel as their biggest stumbling block in rapid incident detection and response. As a result, most companies require more than a day to detect advanced cyberattacks, and only 15 percent of those asked said they identified a breach in less than 24 hours.

Bridging the Gap

How can CISOs bridge the skills gap? As noted by the report, advanced detection solutions are critical since “EDR tools focus on the last 1 percent of threats, allowing for much greater fidelity in incident investigations.”

But the EDR label alone isn’t enough. Tools must have priority-based alert filtering mechanisms to limit the number of trivial reports and false alarms.

Of course, even best-case threat reporting won’t improve security if enterprises don’t have enough personnel to handle incoming data. As Security Boulevard reported, the U.S. Office of Personnel Management (OPM) recently drafted new guidelines for federal agencies that also have merit for private enterprises. The framework advised organizations to start by identifying security workforce gaps. Given the highly competitive nature of the cyber skills talent search, CISOs need to know exactly what they’re looking for before they start recruiting.

Adrian Davis of (ISC)2, as quoted by Infosecurity Magazine, noted that there’s also a need to recognize the cybersecurity skills shortage as more than just a supply-side problem. Companies must put effort into talent retention by ensuring that security professionals are given “a vital role to play and a stronger voice within the organization.”

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today