Business Has Increased Cyber Security But Lacks Cyber Training

No online business, government institution, or industry is safe from the wrath of cyber criminals andthe  sooner a cyber threat is detected, the smaller the attack surface. With quick detection, defenders will be able to protect the computer systems, intellectual property, and the brand reputation in minimum time.

In its 2020 SANS Cyber Threat Intelligence Survey, the education and training provider received 1006 responses from a wide-ranging group of security professionals from various organisations. A lack of trained staff was cited by 57% of those polled, whilst 52% and 48% respectively said a lack of time to implement new processes and a lack of funding also played a part.

The survey also discovered that, in many cases, CTI has evolved from small, ad hoc tasks performed disparately across businesses to robust programs with dedicated staff, tools and processes. More than 84% of respondents said their organisation has at least some kind of resource focusing on CTI, with 44% reporting a formal process for gathering intelligence requirements, which makes intelligence processes more efficient, effective and measurable.

“In the past three years, we have seen an increase in the percentage of respondents choosing to have a dedicated team over a single individual responsible for the entire CTI program.... Collaboration within organisations is also on the rise,” he added, “with many respondents reporting that their CTI teams are part of a coordinated effort across the organisation.” saidSANS instructor Robert M Lee.

There are, however, issues  that hold some businesses back from implementing effective, the research showed. Far too often security is being overlooked in the rush to embrace digital innovation. As a result, as businesses rapidly adopt new technologies and computing platforms, they are also opening the door for cyber criminals who are looking to gain access to valuable data.

Cybersecurity needs to play a central role in all digital transformation efforts, a strategy known as security-driven networking.

Many of these same businesses are also facing the challenges of the growing cybersecurity skills shortage, which can lead to unfilled roles with traditional areas of responsibility, such as identifying, patching, and updating vulnerable systems.

Conclusion

The cybersecurity skills shortage can have a significant impact on organisations and their employees. Chief Information Security Officer (CISO)s are now responsible for bridging the gap between business operations and security, so it is fitting that these individuals should also be the ones to address this challenge.

By establishing a training, mentoring, and education program, CISOs can help their employees expand their knowledge of network security and the threat landscape and build upon existing skills to bridge the skills gap.

For more specific data about Cyber training please contact Cyber Security Intelligence for free Information.

SANS:      CSO Online:         eCouncil:           Infosecurity Magazine
 

You Might Also Read: 

Preparing Your Employees & Business Systems For A Cyber Attack:

 

 

 

 

« Iran's Cutting Edge Cyberwar Capabilities
Cybersecurity Job Listings »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

Quantum Security Services

Quantum Security Services

Quantum Security Services is a specialist information security firm providing a range of risk, compliance and technical security services.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.