April 13, 2018 By Douglas Bonderud 2 min read

A new report revealed that the majority of chief information security officers (CISOs) around the world are worried about the cybersecurity skills shortage.

According to a Bitdefender survey titled “CISOs’ Toughest Dilemma: Prevention Is Faulty, yet Investigation Is a Burden,” more than 60 percent of global security leaders said they are negatively affected by the skills shortage. In addition, 69 percent of respondents said their team was under-resourced, and 72 percent said their team had experienced “alert and agent fatigue.” This is particularly worrisome since more than half of security leaders in the U.K. (57 percent), U.S. (55 percent), France (58 percent) and Italy (53 percent) said they’d experienced a breach in the past year.

Poor EDR Tools Exacerbating Cybersecurity Skills Shortage

For CISOs trying to bridge the talent gap, this creates two pain points, according to the report: ineffective tools and investigations hampered by a lack of personnel. As noted by Harish Agastya, Bitdefender’s vice president of enterprise solutions, “The survey results show that today’s resource- and skill-constrained IT security teams need an endpoint detection and response (EDR) approach that allows for less human intervention and a higher level of fidelity in incident investigations.”

The cybersecurity skills shortage also makes sorting through EDR alerts more difficult — 43 percent of CISOs cited a lack of personnel as their biggest stumbling block in rapid incident detection and response. As a result, most companies require more than a day to detect advanced cyberattacks, and only 15 percent of those asked said they identified a breach in less than 24 hours.

Bridging the Gap

How can CISOs bridge the skills gap? As noted by the report, advanced detection solutions are critical since “EDR tools focus on the last 1 percent of threats, allowing for much greater fidelity in incident investigations.”

But the EDR label alone isn’t enough. Tools must have priority-based alert filtering mechanisms to limit the number of trivial reports and false alarms.

Of course, even best-case threat reporting won’t improve security if enterprises don’t have enough personnel to handle incoming data. As Security Boulevard reported, the U.S. Office of Personnel Management (OPM) recently drafted new guidelines for federal agencies that also have merit for private enterprises. The framework advised organizations to start by identifying security workforce gaps. Given the highly competitive nature of the cyber skills talent search, CISOs need to know exactly what they’re looking for before they start recruiting.

Adrian Davis of (ISC)2, as quoted by Infosecurity Magazine, noted that there’s also a need to recognize the cybersecurity skills shortage as more than just a supply-side problem. Companies must put effort into talent retention by ensuring that security professionals are given “a vital role to play and a stronger voice within the organization.”

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today