Cybersecurity Skills Shortage: A State of Emergency
|
|
|
- Roderick Baker
- 9 years ago
- Views:
Transcription
1 Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst, and Bill Lundell, Director of Research Abstract: ESG has been researching, writing about, and addressing the cybersecurity skills shortage for a number of years. Unfortunately, this situation continues to deteriorate. In a disquieting development, nearly half of organizations now claim to have a problematic shortage of cybersecurity skills. Additionally, a vast majority of organizations acknowledge that it is difficult to recruit and hire cybersecurity talent. ESG believes that this trend represents a national security risk demanding a comprehensive strategy from national governments. Overview ESG recently completed its annual IT spending intentions survey of 633 senior IT and cybersecurity professionals at midmarket (i.e., 100 to 999 employees) and enterprise (i.e., 1,000 or more employees) organizations across North America, Western Europe, and Asia Pacific. 1 As part of this research, ESG asks survey respondents where their organizations have a problematic shortage of specific IT skillsets. For the past four years, information security/cybersecurity topped the list of skills shortages and in 2015, 28% of organizations claimed to have a problematic shortage of cybersecurity skills. While ESG expected the cybersecurity skills shortage to continue, Figure 1 reveals this year s results to be especially distressing 46% of organizations now claim that they have a problematic shortage of cybersecurity skills, which is up significantly from last year when just more than one-quarter (28%) of respondents categorized their lack of cybersecurity skills as problematic. This is an especially alarming upsurge given more modest annual increases in the past (i.e., in 2013, 25% in 2014, and 28% in 2015). The cybersecurity skills shortage manifested itself in the form of an opportunity as well. Specifically, when these senior IT and cybersecurity professionals were asked to identify the areas in which skills development would be the most beneficial to their employees career paths, and ultimately to the organization as a whole, 44% pointed to cybersecurity (see Figure 2). To put this into perspective, this is nearly double the number of respondents who said big data analytics, which has been among the most talked and written about subjects in IT over the last several years. 1 Source: ESG Research Report, 2016 IT Spending Intentions Survey, to be published.
2 Brief: Cybersecurity Skills Shortage: A State of Emergency 2 FIGURE 1. Areas of IT Skills Shortage In which of the following areas do you believe your IT organization currently has a problematic shortage of existing skills? (Percent of respondents, N=627, multiple responses accepted) Cybersecurity Mobile application development Business intelligence/data analytics Social media/marketing technologies Enterprise mobility management Server virtualization/private cloud infrastructure Compliance management, monitoring and reporting Social enterprise/collaboration technologies IT architecture/planning Application development Data protection Database administration Help desk/service desk Storage administration Server administration Network administration We do not have any IT skills shortages Other Don t know 1% 2% 12% 37% 36% 34% 31% 31% 28% 27% 25% 24% 24% 22% 22% 46% Source: Enterprise Strategy Group, FIGURE 2. Where IT Managers See Career Growth Potential In which of the following functional areas do you believe skills development would be most beneficial to your employees (i.e., IT staff) in terms of their career path and benefit to your organization? (Percent of respondents, N=627) Application development and deployment, 12% Infrastructure management, 17% Cybersecurity (i.e., information security), 44% Big data analytics, 26% Source: Enterprise Strategy Group, 2016.
3 Brief: Cybersecurity Skills Shortage: A State of Emergency 3 Cybersecurity Skills Trends Nearly half of all organizations surveyed claim to have a problematic shortage of cybersecurity skills, but are these skills in any particular area? To some extent. As the ESG data illustrates, one-third of organizations say that their biggest cybersecurity skills need is for cloud security specialists (see Figure 3). This shouldn t be particularly surprising since many organizations are aggressively moving workloads to cloud-based environments and thus need to find employees who know how to protect and monitor this activity. Beyond cloud however, ESG is troubled by many of the other needs such as network security specialists, security analysts, and data security specialists. These are standard cybersecurity skills by any measure, so this data indicates that many organizations remain understaffed and under-skilled in core cybersecurity domains. FIGURE 3. Cybersecurity Areas with Biggest Skills Deficiency Which areas of cybersecurity would you say that your organization has the biggest skills deficiency? (Percent of respondents, N=299, three responses accepted) Cloud security specialists 33% Network security specialists Security analytics Data security specialists 26% 28% 27% Security engineering Security operations 20% Identity and access management Application security specialists Endpoint security specialists 15% 14% 14% We don t have any cybersecurity skills deficiencies 9% Source: Enterprise Strategy Group, ESG (and others) have been calling attention to the cybersecurity skills shortage for a number of years, but the data presented in this brief indicates that the situation continues to degrade. This point is further evidenced by the fact that 87% of survey respondents claim that it is very difficult, difficult, or somewhat difficult to recruit and hire cybersecurity professionals (see Figure 4). This is consistent with anecdotal stories in which CISOs claim that open requisitions go unfilled for months at a time while cybersecurity staff complains of being constantly overwhelmed by the amount of work at hand, as well as ahead. How can CISOs stand out from the crowd and attract cybersecurity talent? Competitive salaries are table stakes when it comes to being competitive in recruiting (see Figure 5). Beyond money, however, ESG data indicates that cybersecurity professionals are attracted to opportunities for personal growth such as the ability to work with leading security technologies and processes, side benefits related to training and skills development, and the ability to work in an organization and/or industry targeted by cyber-threats. Clearly, cybersecurity professionals want opportunities that challenge them, educate them, and support them.
4 Brief: Cybersecurity Skills Shortage: A State of Emergency 4 FIGURE 4. Difficulty in Recruiting and Hiring Cybersecurity Professionals In your opinion, how difficult is it for your organization to recruit and hire cybersecurity professionals? (Percent of respondents, N=299) Very difficult, 13% Very easy, 3% Easy, 10% Difficult, 29% Somewhat difficult, 44% Source: Enterprise Strategy Group, 2016 FIGURE 5. Factors Most Important to Potential New Cybersecurity Hires When your organization does recruit and hire cybersecurity professionals, which of the following factors do you believe are most attractive to potential candidates? (Percent of respondents, N=299, five responses accepted) Competitive salary 52% The ability for new employees to work with leading cybersecurity technologies and processes 40% Side benefits related to training and skills development 35% Cyber threats associated with your organization or industry The ability for new employees to work with seasoned cybersecurity professionals working at your organization The cybersecurity reputation of your organization The ability for new employees to participate in cybersecurity events The reputation of your CISO and/or other cybersecurity management 29% 27% 26% 24% Source: Enterprise Strategy Group, 2016
5 Brief: Cybersecurity Skills Shortage: A State of Emergency 5 Driven by continuing cybersecurity skills shortages, many organizations have no choice but to turn to managed and professional services organizations to supplement internal staff. As Figure 6 demonstrates, more than one-third (35%) of organizations engage these firms in preparation for regulatory compliance audits, while leverage these services to help with strategic cybersecurity planning and/or cybersecurity insurance underwriting, the latter of which is a relatively new services need. Additionally, of organizations will outsource some cybersecurity tasks to an MSSP. Given the pervasive cybersecurity skills shortage, this percentage will most likely grow in the future. FIGURE 6. Areas Organizations Will Engage a Third-party Services Firm for 2016 Cybersecurity Initiatives and Projects In which of the following areas do you believe your organization will likely engage a thirdparty services firm for consultation on 2016 cybersecurity initiatives and projects? (Percent of respondents, N=299, multiple responses accepted) We will engage a third party to help us prepare for an audit of our compliance with industry regulations, specifically the cybersecurity requirements We will engage a third party to help us with strategic cybersecurity planning with respect to internal policies and procedures We will engage a third party to help us prepare for a cybersecurity assessment as part of the underwriting process for a cybersecurity insurance policy 35% We will engage a third party to help us assess the large number of vendors who offer security solutions We will outsource some of our security management functions to a managed security services provider (MSSP) We will not engage a third-party services firm for consultation on 2016 cybersecurity initiatives 20% Source: Enterprise Strategy Group, 2016 The Bigger Truth ESG has been one of several organizations tracking the cybersecurity skills shortage and sounding the alarm for many years. While a few tactical programs have attempted to address this shortfall, ESG views them as lip service rather than a real solution. Alarmingly, the situation appears to be getting much worse so much so that ESG now believes that the growing cybersecurity skills shortage represents a national security risk. Simply stated, demand for trained and experienced cybersecurity professionals far exceeds supply. Lacking a comprehensive cybersecurity education and training strategy, large organizations will continue to battle highly sophisticated and well-organized cyber-adversaries with their own skeleton crew.
6 Brief: Cybersecurity Skills Shortage: A State of Emergency 6 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at Enterprise Strategy Group is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community by The Enterprise [email protected] Strategy Group, Inc. All Rights Reserved. P
Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%
Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According
White. Paper. Rethinking Endpoint Security. February 2015
White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed
Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices
Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts
Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts March 2015 4 Cloud Computing: Not a Question of If, but Rather
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Online File Sharing and Collaboration: Deployment Model Trends
Research Report Abstract: Online File Sharing and Collaboration: Deployment Model Trends By Terri McClure, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager
The Convergence of Big Data Processing and Integrated Infrastructure
Research Report Abstract: The Convergence of Big Data Processing and Integrated Infrastructure By Evan Quinn, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Brian Babineau, Vice
Data Protection-as-a-service (DPaaS) Trends
Research Report Abstract: Data Protection-as-a-service (DPaaS) Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager and Adam DeMattia,
The ESG Cybersecurity Maturity Model
ESG Brief The ESG Cybersecurity Maturity Model Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: As part of its research, ESG regularly uses a scoring system to divide survey populations
ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,
Compensating Security Controls for Windows Server 2003 Security
ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft
IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already
The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
Research Perspectives
Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed
White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014
White Paper EMC Isilon: A Scalable Storage Platform for Big Data By Nik Rouda, Senior Analyst and Terri McClure, Senior Analyst April 2014 This ESG White Paper was commissioned by EMC Isilon and is distributed
White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013
White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed
Trends in Private Cloud Infrastructure
Research Report Abstract: Trends in Private Cloud Infrastructure By Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
Research Report. Remote Office/Branch Office Technology Trends. July 2011
Research Report Remote Office/Branch Office Technology Trends By Bill Lundell, Jon Oltsik, and Lauren Whitehouse With John McKnight and Jenn Gahm July 2011 2011 Enterprise Strategy Group, Inc. All Rights
This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.
White Paper Network Encryption and its Impact on Enterprise Security By Jon Oltsik, Senior Principal Analyst February 2015 This ESG White Paper was commissioned by Blue Coat and is distributed under license
Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst
ESG Brief Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With the burgeoning workplace mobility
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst
Cloud Services Brief SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst Abstract: Long-time managed services and disaster recovery specialist SunGard is raising its
Research Report. Abstract: Social Enterprise Adoption Trends. June 2012
Research Report Abstract: Social Enterprise Adoption Trends By Tom Petrocelli, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jenn Gahm, Senior Project Manager June 2012 2012 Enterprise
ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
Cloud Computing Adoption Trends:
Research Report Abstract: Cloud Computing Adoption Trends: Software- and Infrastructure-as-a-Service Usage Among Enterprise and Midmarket Organizations By Bill Lundell With John McKnight and Jennifer Gahm
Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)
Solution Brief Check Point Capsule for Mobile Computing Security, Operations Efficiency, and Business Enablement Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research
The Challenge of Securing and Managing Data While Meeting Compliance
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
EMC Isilon: Data Lake 2.0
` ESG Solution Showcase EMC Isilon: Data Lake 2.0 Date: November 2015 Author: Scott Sinclair, Analyst Abstract: With the rise of new workloads such as big data analytics and the Internet of Things, data
Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011
Research Report Abstract: The Impact of Big Data on Data Analytics By Julie Lockner and Bill Lundell With Jennifer Gahm and John McKnight September 2011 2011 Enterprise Strategy Group, Inc. All Rights
HGST Object Storage for a New Generation of IT
Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE HGST Object Storage for a New Generation of IT Date: October 2015 Author: Scott Sinclair, Storage Analyst Abstract: Under increased
Platform-as-a-service Language Use Study
Research Report Abstract: Platform-as-a-service Language Use Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst & Jennifer Gahm, Senior Project Manager February
W H I T E P A P E R C l i m a t e C h a n g e : C l o u d ' s I m p a c t o n I T O r g a n i z a t i o n s a n d S t a f f i n g
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R C l i m a t e C h a n g e : C l o u d ' s I m p a c t o n I T O r g a n i z a
An Analytics-based Approach to Cybersecurity
ESG Solution Showcase An Analytics-based Approach to Cybersecurity Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Since the Google Aurora incident announced in 2010, large organizations
White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications
White Paper The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications By Bob Laliberte, Senior Analyst November 2013 This ESG White Paper
Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions
White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed
The Challenge. ESG Case Study
ESG Case Study Primatics Financial Delivers SaaS-based Solution Excellence Using EMC s XtremIO Date: March 2015 Authors: Mark Peters, Senior Analyst; Adam DeMattia, Market Research Analyst; and Monya Keane,
Direct Scale-out Flash Storage: Data Path Evolution for the Flash Storage Era
Enterprise Strategy Group Getting to the bigger truth. White Paper Direct Scale-out Flash Storage: Data Path Evolution for the Flash Storage Era Apeiron introduces NVMe-based storage innovation designed
AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst
ESG Lab Spotlight AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst Abstract: This ESG Lab Spotlight details ESG s hands-on testing of
Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters Date: June 2016 Author: Jack Poller, Senior
Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst
ESG Lab Review Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst Abstract: This ESG Lab review documents hands-on
Solution Brief. Introduction
Solution Brief A Checklist when Choosing a Backup Solution for SaaS-based Applications Date: January 2015 Authors: Jason Buffington, Senior Analyst; and Monya Keane, Research Analyst Abstract: What should
IT Workforce snapshot
2013 IT Workforce snapshot TEKsystems IT Workforce Snapshot is designed to provide a high-level view of trends impacting IT spending, IT employment, workforce supply and demand, compensation and geographical
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.
White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned
