Cybersecurity Skill Shortage Has Industry Worried

After years of massive hacker attacks on industry and government, the realization that the bad guys are winning has led to a surge in cybersecurity jobs that has outpaced the supply of people to fill them.

Recently at the RSA 2016 security conference, the issue bubbled up in keynotes and seminars with discussions of how to get young people interested in tech careers to consider the field.

"The volume of threats has changed dramatically," said Christopher Young, vice president of Intel's Security Group. Years before Intel acquired it, McAfee Labs saw 25 threats a day, he said. "Today, we see about 500,000 threats a day."

But the professionals to counter those threats are small in number, he said in an interview.

"We just have to get after this problem," he said. "Students will tell you that even if you're a technical major in college, cybersecurity isn't a core part of the curriculum." Young called on the industry to reach out to colleges, universities and even high schools to raise awareness and launch educational programs.

A Stanford University study estimates there are 200,000 unfilled cybersecurity jobs this year. Cisco Systems says some estimates point to more than 1 million unfilled security jobs worldwide

The Boston-based consulting firm Burning Glass reported last year that the demand for cybersecurity jobs is twice that of all information technology jobs, with cybersecurity commanding a 9 percent salary premium over other IT categories. The jobs require years of training and experience, making them hard to fill.

Indiana is tackling the problem with a new Security Operations Center where Purdue University students work next to state government security personnel to identify threats to state networks. It's hoped that the center, announced in October, will encourage students to consider careers in cybersecurity.

At the end of his keynote talk, Young introduced Morgan Mayernik, a Purdue freshman majoring in materials science engineering and minoring in biometrics, who said students are often unaware of opportunities in cybersecurity.

"We're interested," Mayernik told the audience. "This is a problem that's dear to our hearts. We live in a technical world, but students aren't being told this is an option for them. And they need to be told this and they need to be given these problems, because given the opportunities, we will take them. We want to delve into these issues."

Beyond recruiting, the industry needs to automate to help cope with the labor gap, according Justin Somaini, chief security officer of SAP, the German software giant.

"We need to have really skilled individuals; you'll never get around that," Somaini said. "My stance is I might never find enough really good security people in the job market because it's challenging. We need to take a multifaceted approach to deal with the labor gap, focusing attention on how we innovate," he said.

"There is a natural evolution we're seeing into advanced machine learning. Artificial intelligence is one of these research areas we need to focus on," Somaini said. "Not true AI, but learning algorithms and how they can identify attacks."

The White House is tackling the issue with a proposed initiative to "develop a technologically-skilled and cyber-savvy workforce," according to the budget message.

MercuryNews: http://bayareane.ws/1pBgyiW

« Fighting The Invisible War In CyberSpace
Russian Scientists Have Solved Light-Based Computers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Nudge Security

Nudge Security

Nudge Security offer the world's first-ever SaaS security solution to discover shadow IT and curb SaaS sprawl across any device or location and nudges employees towards optimal security behavior.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.