April 13, 2018 By Douglas Bonderud 2 min read

A new report revealed that the majority of chief information security officers (CISOs) around the world are worried about the cybersecurity skills shortage.

According to a Bitdefender survey titled “CISOs’ Toughest Dilemma: Prevention Is Faulty, yet Investigation Is a Burden,” more than 60 percent of global security leaders said they are negatively affected by the skills shortage. In addition, 69 percent of respondents said their team was under-resourced, and 72 percent said their team had experienced “alert and agent fatigue.” This is particularly worrisome since more than half of security leaders in the U.K. (57 percent), U.S. (55 percent), France (58 percent) and Italy (53 percent) said they’d experienced a breach in the past year.

Poor EDR Tools Exacerbating Cybersecurity Skills Shortage

For CISOs trying to bridge the talent gap, this creates two pain points, according to the report: ineffective tools and investigations hampered by a lack of personnel. As noted by Harish Agastya, Bitdefender’s vice president of enterprise solutions, “The survey results show that today’s resource- and skill-constrained IT security teams need an endpoint detection and response (EDR) approach that allows for less human intervention and a higher level of fidelity in incident investigations.”

The cybersecurity skills shortage also makes sorting through EDR alerts more difficult — 43 percent of CISOs cited a lack of personnel as their biggest stumbling block in rapid incident detection and response. As a result, most companies require more than a day to detect advanced cyberattacks, and only 15 percent of those asked said they identified a breach in less than 24 hours.

Bridging the Gap

How can CISOs bridge the skills gap? As noted by the report, advanced detection solutions are critical since “EDR tools focus on the last 1 percent of threats, allowing for much greater fidelity in incident investigations.”

But the EDR label alone isn’t enough. Tools must have priority-based alert filtering mechanisms to limit the number of trivial reports and false alarms.

Of course, even best-case threat reporting won’t improve security if enterprises don’t have enough personnel to handle incoming data. As Security Boulevard reported, the U.S. Office of Personnel Management (OPM) recently drafted new guidelines for federal agencies that also have merit for private enterprises. The framework advised organizations to start by identifying security workforce gaps. Given the highly competitive nature of the cyber skills talent search, CISOs need to know exactly what they’re looking for before they start recruiting.

Adrian Davis of (ISC)2, as quoted by Infosecurity Magazine, noted that there’s also a need to recognize the cybersecurity skills shortage as more than just a supply-side problem. Companies must put effort into talent retention by ensuring that security professionals are given “a vital role to play and a stronger voice within the organization.”

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today