A new report revealed that the majority of chief information security officers (CISOs) around the world are worried about the cybersecurity skills shortage.

According to a Bitdefender survey titled “CISOs’ Toughest Dilemma: Prevention Is Faulty, yet Investigation Is a Burden,” more than 60 percent of global security leaders said they are negatively affected by the skills shortage. In addition, 69 percent of respondents said their team was under-resourced, and 72 percent said their team had experienced “alert and agent fatigue.” This is particularly worrisome since more than half of security leaders in the U.K. (57 percent), U.S. (55 percent), France (58 percent) and Italy (53 percent) said they’d experienced a breach in the past year.

Poor EDR Tools Exacerbating Cybersecurity Skills Shortage

For CISOs trying to bridge the talent gap, this creates two pain points, according to the report: ineffective tools and investigations hampered by a lack of personnel. As noted by Harish Agastya, Bitdefender’s vice president of enterprise solutions, “The survey results show that today’s resource- and skill-constrained IT security teams need an endpoint detection and response (EDR) approach that allows for less human intervention and a higher level of fidelity in incident investigations.”

The cybersecurity skills shortage also makes sorting through EDR alerts more difficult — 43 percent of CISOs cited a lack of personnel as their biggest stumbling block in rapid incident detection and response. As a result, most companies require more than a day to detect advanced cyberattacks, and only 15 percent of those asked said they identified a breach in less than 24 hours.

Bridging the Gap

How can CISOs bridge the skills gap? As noted by the report, advanced detection solutions are critical since “EDR tools focus on the last 1 percent of threats, allowing for much greater fidelity in incident investigations.”

But the EDR label alone isn’t enough. Tools must have priority-based alert filtering mechanisms to limit the number of trivial reports and false alarms.

Of course, even best-case threat reporting won’t improve security if enterprises don’t have enough personnel to handle incoming data. As Security Boulevard reported, the U.S. Office of Personnel Management (OPM) recently drafted new guidelines for federal agencies that also have merit for private enterprises. The framework advised organizations to start by identifying security workforce gaps. Given the highly competitive nature of the cyber skills talent search, CISOs need to know exactly what they’re looking for before they start recruiting.

Adrian Davis of (ISC)2, as quoted by Infosecurity Magazine, noted that there’s also a need to recognize the cybersecurity skills shortage as more than just a supply-side problem. Companies must put effort into talent retention by ensuring that security professionals are given “a vital role to play and a stronger voice within the organization.”

More from

Most organizations want security vendor consolidation

4 min read - Cybersecurity is complicated, to say the least. Maintaining a strong security posture goes far beyond knowing about attack groups and their devious TTPs. Merely understanding, coordinating and unifying security tools can be challenging.We quickly passed through the “not if, but when” stage of cyberattacks. Now, it’s commonplace for companies to have experienced multiple breaches. Today, cybersecurity has taken a seat in core business strategy discussions as the risks and costs have risen dramatically.For this reason, 75% of organizations seek to…

How IBM secures the U.S. Open

2 min read - More than 15 million tennis fans around the world visited the US Open app and website this year, checking scores, poring over statistics and watching highlights from hundreds of matches over the two weeks of the tournament. To help develop this world-class digital experience, IBM Consulting worked closely with the USTA, developing powerful generative AI models that transform tennis data into insights and original content. Using IBM watsonx, a next-generation AI and data platform, the team built and managed the entire…

How the FBI Fights Back Against Worldwide Cyberattacks

5 min read - In the worldwide battle against malicious cyberattacks, there is no organization more central to the fight than the Federal Bureau of Investigation (FBI). And recent years have proven that the bureau still has some surprises up its sleeve. In early May, the U.S. Department of Justice announced the conclusion of a U.S. government operation called MEDUSA. The operation disrupted a global peer-to-peer network of computers compromised by malware called Snake. Attributed to a unit of the Russian government Security Service,…

How NIST Cybersecurity Framework 2.0 Tackles Risk Management

4 min read - The NIST Cybersecurity Framework 2.0 (CSF) is moving into its final stages before its 2024 implementation. After the public discussion period to inform decisions for the framework closed in May, it’s time to learn more about what to expect from the changes to the guidelines. The updated CSF is being aligned with the Biden Administration’s National Cybersecurity Strategy, according to Cherilyn Pascoe, senior technology policy advisor with NIST, at the 2023 RSA Conference. This sets up the new CSF to…