Connect with us

Infosecurity

Cybersecurity Skills Gap 2017: What to Expect and How to Prepare

Published

on

Cybersecurity Skills Gap 2017: What to Expect and How to Prepare

As the calendar turns to a new year, the cybersecurity industry faces a persistent challenge: the cybersecurity skills gap. For years, organizations have struggled to find qualified professionals to fill critical roles. According to research from (ISC)², the global shortfall could reach 1.5 million unfilled positions by 2020. But what does 2017 hold for this ongoing crisis? Experts weigh in on the trends, obstacles, and potential solutions that could reshape the talent landscape.

Why the Cybersecurity Skills Gap Persists

The demand for security talent continues to outpace supply. Rapid technological advancements, evolving threats, and new regulations like the General Data Protection Regulation (GDPR) have created a need for specialized skills. However, the talent pool has not expanded quickly enough to meet these demands.

Adrian Davis, a senior figure at (ISC)², predicts another tough year. “We expect to see a greater emphasis on understanding and implementing resilience, incident management and business impact of cyber risk from all security professionals,” he explained. “There will be a continuing skills shortage, especially of individuals who can link business and security together, and of individuals who can build GDPR compliance.”

Similarly, Dr. Bob Nowill, chair of the Cyber Security Challenge UK, noted that short-term shortages will persist as new threats emerge. Yet both experts acknowledge that 2016 laid important groundwork for change.

Positive Steps Taken in 2016

Despite the grim outlook, the industry made notable progress last year. Initiatives such as the launch of the Extended Project Qualification (EPQ) in Cyber Security and the integration of cybersecurity into UK computing science degrees signal a shift toward long-term workforce development. The UK government’s commitment to making cyber a chartered profession also marks a significant milestone.

“The skills landscape will continue to evolve, shaped in part by the new National Cyber Security Strategy and NCSC and DCMS initiatives,” said Nowill. “2017 will be an exciting year particularly for new programs such as the new Cyber Security EPQ and via QUFARO as they start to have impact, while school curriculum changes in STEM and Computer Science will see more cybersecurity concepts being introduced at a younger age.”

How Companies Can Close the Skills Gap

While government and educational bodies play a role, organizations themselves hold the key to bridging the cybersecurity skills gap. Davis urged companies to rethink their hiring practices. “To improve our position, we need to stop over-specifying positions, recruit more junior staff and recruit from outside the ‘usual’, tech-oriented, pools,” he said. “We also need to stand up and tell people about what we do, why it is important and the opportunities open to bright, problem-oriented, communicative people.”

James Jardine, CEO of Jardine Software, echoed this sentiment. In his article on hiring application security talent, he outlined five common mistakes that hinder recruitment:

  • Not understanding your current needs
  • Ignoring existing resources
  • Not sharing the workload
  • Not defining the role
  • Overly broad job requirements

By avoiding these pitfalls, companies can attract and retain the right talent more effectively.

The Role of Education and Training

Building a robust pipeline of future professionals requires investment in education and training. Programs that introduce cybersecurity concepts at a younger age, such as those in STEM and computer science curricula, are essential. Additionally, professional development opportunities for existing staff can help close immediate gaps.

For more insights on building a cyber-aware workforce, check out our guide on cybersecurity training best practices. Organizations that prioritize continuous learning will be better positioned to adapt to evolving threats.

Looking Ahead: A Turning Point?

Although the cybersecurity skills gap remains a pressing issue, there is reason for optimism. The combination of educational reforms, government initiatives, and a shift in hiring strategies could make 2017 a year of tangible progress. As the industry continues to collaborate and innovate, the message is finally getting through: closing the talent deficit is not just a necessity—it is an achievable goal.

For further reading, explore our article on cybersecurity workforce development strategies to learn how organizations can build resilient teams in the face of ongoing challenges.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Infosecurity

On the 11th Day of Christmas, the Industry Predicted…Better Security Collaboration

Published

on

The holiday season is almost here, but before we dive into turkey and presents, there’s one more crucial prediction to unwrap: better security collaboration. For years, the cybersecurity industry has struggled with a lack of cooperation. However, 2017 might finally be the year when organisations start working together more effectively to combat cyber threats.

According to Juniper Networks‘ Scott Miles, senior director of cloud, enterprise and security portfolio marketing, the industry is slowly moving toward collaboration, but it remains in its infancy. “Beyond sharing basic data, we still lack the interoperability necessary to address the next generation of threats,” he explained. Yet, there is growing optimism that this is about to change.

Why Better Security Collaboration Is Finally on the Horizon

Raj Samani, CTO EMEA at Intel Security, predicts that threat intelligence sharing organisations will form among cloud service providers in 2017. These groups will improve the identification of and reaction time to attacks. “While some businesses and cloud service providers do not perceive the benefits of threat intelligence sharing today, this will shift within the next few years,” Samani said. He added that whether driven by legislation or the aggressiveness of attacks, we will see much more threat intelligence sharing among businesses and cloud providers, and the benefits will quickly become clear.

Although sharing information about failed and successful attacks can be embarrassing, Samani believes the advantages will outweigh the downsides. “Crowdsourced threat intelligence and collaborative analytics help form a more comprehensive picture of what is happening in the attack landscape,” he noted. This sentiment is echoed by David Mount, director of security solutions consulting EMEA at Micro Focus. Mount argues that businesses should collaborate more around early indicators of compromise to understand the known mitigation path.

Industrialised Attacks Demand Collaborative Defence

Cybercriminal gangs are industrialising their processes, searching for systems where they can replicate specific attacks. “This means the same tactics can be repeated hundreds of times,” Mount explained. As a result, the information security industry must work together and collaborate with law enforcement agencies to target these criminals. Samani added that further collaboration, particularly cyber threat intelligence sharing, will be necessary as the threat landscape evolves.

To gain the upper hand in cybersecurity, businesses must reject conventional defence paradigms in favour of radical new thinking. One key step is to be collaborative instead of hoarding information and to learn to prioritise cyber defence. On a large scale, this makes life harder for cybercriminals and ensures data remains more secure.

Real-World Examples of Successful Security Collaboration

Brian Honan, owner and CEO of BH Consulting, pointed to two powerful examples of how working together has already paid off. The arrests of the two suspects behind the DD4BC DDoS extortion group and the sharing of ransomware encryption keys through the No More Ransom initiative show what can be achieved when victims, industry, and law enforcement cooperate.

Honan quoted the Simon and Garfunkel song ‘I am a Rock’ to illustrate his point: “The line ‘I am a Rock, I am an Island’ is not feasible in today’s interconnected business environments.” He warned that companies that behave like islands will become isolated and easy prey for criminals. In the past, attacks have been more successful than they should have been simply because companies did not admit they were victims or share details of the attack. Thankfully, this trait is slowly changing, and Honan hopes it will accelerate in the future.

As we look ahead to 2017, the message is clear: better security collaboration is not just a nice idea—it is a necessity. For more insights on how to strengthen your cybersecurity posture, check out our guide on cybersecurity best practices and learn about threat intelligence sharing platforms.

Continue Reading

Infosecurity

Will a Major Cloud Vendor Be Breached in 2017? Cybersecurity Experts Say Yes

Published

on

Will a Major Cloud Vendor Be Breached in 2017? Cybersecurity Experts Say Yes

As 2016 winds down, cybersecurity experts are raising alarms about a looming threat: a cloud vendor breach that could shake the industry. According to predictions from leading threat researchers, the next year may finally see a major cloud provider suffer a significant security incident. This forecast comes amid growing reliance on cloud services for storing sensitive data, from healthcare records to corporate secrets.

But why now? And what does this mean for businesses that trust these platforms? Let’s dive into the expert opinions and the factors driving this unsettling prediction.

Why a Cloud Vendor Breach Is Inevitable in 2017

Experts argue that the cloud industry has been remarkably quiet on the breach front since the Aurora attacks on Google in 2009. Yet, data shows that 89% of healthcare organizations experienced a data breach in 2015. This disconnect suggests that cloud vendors may be underreporting or that attackers are simply waiting for the right moment.

Aaron Shelmire, senior threat researcher at Anomali, believes a major cloud vendor breach is almost certain. “People and businesses are relying upon cloud services more than ever,” he explains. “Cloud services are more convenient and often cheaper than alternatives. As people increase their dependence upon cloud services, the goals of malicious actors will follow the data and computing resources to the cloud.” This shift makes cloud platforms a prime target for cybercriminals.

Building on this, Alex Cruz-Farmer, VP of cloud at NSFOCUS, notes that cloud giants are already in a full-scale war with hackers. “If we look at the market today, there were several significant breaches this year and, unfortunately, I expect the trend to continue,” he warns. “Threat intelligence and technology as a whole is catching up, however we are repeatedly seeing some vendors following bad practices, which is leading to some of these breaches or attacks.”

The Growing Attack Surface: Automation and Complexity

One key driver of this cloud security risk is the increasing complexity of cloud infrastructure. As systems grow larger, companies often rely more on automation, which can introduce vulnerabilities. Cruz-Farmer points out, “What does bigger result in? More man power or more automation? More automation results in less human interaction, so one malfunction of any of these automated tools could be a goldmine for an attacker.” A single flaw in automated systems can cascade into a major breach.

For instance, a small security hole in one system could allow hackers to reverse-engineer similar methodologies used by other platform architects. This makes it “very straightforward to go deeper,” according to Cruz-Farmer. The interconnected nature of cloud services means that a cloud vendor compromise could have ripple effects across multiple clients and industries.

Silver Lining: Breaches Could Drive Better Security

However, not all is doom and gloom. Shelmire suggests that a high-profile breach might serve as the wake-up call the industry needs. “After this, cloud vendors will engage in technical advances to better protect their systems,” he predicts. “The cloud vendors will also engage marketing to use their security and survivability as differentiators.” In other words, a major incident could spur innovation and investment in stronger defenses.

This optimism aligns with broader cybersecurity predictions for 2017, which include increased collaboration and the rise of threat intelligence teams. Cruz-Farmer emphasizes, “The landscape is getting more and more aggressive, and threat intelligence teams are our real line of defense, infiltrating the networks and groups out there committing these acts.” These teams play a critical role in identifying and neutralizing threats before they escalate.

What Businesses Can Do to Mitigate Cloud Security Risks

While experts anticipate a cloud data breach 2017 may be inevitable, businesses can take proactive steps to protect themselves. Here are some recommendations:

  • Audit your cloud providers: Review their security certifications and incident response history. Look for providers that prioritize transparency.
  • Implement strong access controls: Use multi-factor authentication and limit permissions to reduce the impact of a breach.
  • Encrypt sensitive data: Ensure data is encrypted both in transit and at rest, so even if a breach occurs, the information remains unreadable.
  • Monitor for anomalies: Use threat intelligence tools to detect unusual activity in your cloud environment.

For more on enhancing your security posture, check out our guide on cloud security best practices and learn how to respond to a data breach effectively.

Conclusion: Preparing for a Cloud Vendor Breach

The consensus among experts is clear: a major cloud vendor breach is not just possible but probable in 2017. The growing reliance on cloud services, combined with the sophistication of attackers and the complexity of modern infrastructure, creates a perfect storm. Nonetheless, this challenge also presents an opportunity for the industry to strengthen its defenses and for businesses to take control of their security.

As we head into the new year, staying informed and vigilant will be key. By understanding the risks and implementing robust security measures, organizations can better protect their data—even if a cloud vendor is the next headline.

Continue Reading

Infosecurity

Deck the Halls With Security Awareness: A Holiday Guide to Data Protection

Published

on

Deck the Halls With Security Awareness: A Holiday Guide to Data Protection

The holiday season is a time of joy, generosity, and unfortunately, heightened cyber risk. As consumers rush to buy gifts and share personal data online, cybercriminals see a golden opportunity. This is where security awareness becomes your strongest defense. Whether you run a small business or manage a large enterprise, protecting customer data should top your Christmas list.

Why is this so critical? Because the stakes have never been higher. A single data breach can shatter trust, incur massive fines, and turn a festive season into a nightmare. But with the right mindset and practices, you can keep the grinches at bay.

Why Security Awareness Matters More During the Holidays

The holiday shopping frenzy creates a perfect storm for cyber attacks. Phishing emails spike, fake websites multiply, and social engineering attempts become more convincing. Without robust security awareness, employees and customers alike can fall for these traps.

Consider this: a well-trained team is your first line of defense. They can spot suspicious activity, avoid risky clicks, and report incidents quickly. In contrast, a lack of awareness leaves your organization vulnerable to devastating losses.

Common Holiday Cyber Threats to Watch For

  • Phishing scams: Emails that mimic trusted brands like Amazon or PayPal, asking for login details.
  • Fake charities: Fraudulent donation requests that steal credit card information.
  • E-commerce fraud: Stolen payment data used for unauthorized purchases.
  • Ransomware attacks: Malware that locks systems until a ransom is paid, often targeting retailers.

Each of these threats exploits human error. Therefore, investing in security awareness training is not optional—it is essential.

Practical Steps to Boost Security Awareness This Christmas

Building a culture of vigilance starts with clear policies and ongoing education. Here are actionable steps you can take today.

Update Your Policies and Processes

Review your data protection policies to ensure they reflect current risks. For example, enforce multi-factor authentication for all accounts. Additionally, limit access to sensitive data only to those who need it. A simple audit can reveal gaps that cybercriminals might exploit.

Train Your Team on Suspicious Activity

Conduct short, engaging training sessions that focus on real-world scenarios. Teach employees how to identify phishing emails, verify requests for data, and report incidents without fear. Explore our cyber awareness training resources for practical tips.

Monitor for Insider Threats

Not all risks come from outside. Disgruntled employees or careless insiders can cause significant damage. Implement monitoring tools that flag unusual behavior, such as mass data downloads or access after hours.

How to Respond If a Breach Occurs

Despite your best efforts, incidents can happen. The key is to act swiftly and transparently. Have an incident response plan in place that includes steps to contain the breach, notify affected customers, and work with law enforcement.

Moreover, communicate openly with stakeholders. Apologize, explain what happened, and outline the measures you are taking to prevent a recurrence. This builds trust even in difficult times.

Final Thoughts: Make Security a Holiday Tradition

This Christmas, let security awareness be part of your celebrations. By protecting customer data, you are not just avoiding disaster—you are building lasting loyalty. Remember, a little vigilance today can prevent a major crisis tomorrow.

For more guidance on fraud prevention and risk management, check out our fraud prevention strategies or read about cyber security best practices. Stay safe, and enjoy a happy, secure holiday season!

Continue Reading

Trending