In S.Africa The Cybersecurity Skills Gap Is A Chasm

The digital landscape has grown at a rapid pace over the past 10 years, says Vikas Kapoor, Practice head, Cybersecurity and GRC at In2IT Technologies.

The sheer scale of our connected, digital world means that the scope for cyber-crime has also broadened. As each new technology is unveiled, it introduces a new security risk.

South Africa 3rd most Cyber-Attacked Country
South Africa has seen a steady rise in cyber-crime, jumping to rank as the 3rd most cyber attacked country in the world out of 117 countries. The situation is dire, and not helped by their vast shortage of cyber security skills. Cyber security professionals are constantly having to play catch up, and the development of cyber security skills is simply not keeping pace with digital and technological expansion, a lack which cyber criminals are capitalising on.

Mind the Gap
This skills shortage is not confined to South African borders, and countries across the globe face similar challenges. The highly publicised global security breaches of this past year point to an increase in the prevalence of the likes of ransomware, a malware that keeps evolving to find new ways to penetrate and attack networks. As fast as cyber security measures improve to bridge current security gaps, so does cyber threats, resulting in a continuous shortfall of suitably skilled people capable of properly protecting networks from intrusion. Beyond the vast size of growing security concerns, another contributor to the dire shortage of skills in this critical sector is time. 

Becoming a knowledgeable expert in cyber security takes a considerable investment of time spent learning various technologies and systems, and understanding how they integrate. 

It takes time to build a pool of skilled resources, including time spent in the classroom, to time spent garnering experience protecting live networks. Unfortunately, the cyber security space is already on the back foot and time is of the essence. Cybersecurity experts require more than just the skills taught in a classroom. They also require a mindset that thirsts for knowledge on security threats. It's more than simply understanding how to protect a network but, also, what to protect it from.  The ability to navigate and understand the dark Web, or what new cyber security threats are emerging goes a long way towards a building proactive, security-centric mindset.

Fill the Gap
The challenge for businesses is that they do not necessarily have the right in house skills to cater to their growing cyber security needs. Furthermore, they may not have the right knowledge to hire people with the right skills either. There is a distinct gap in the market for recruitment agencies that specialise in the cyber security industry. Organisations that are tackling this recruitment process themselves, need to ensure they are opting for individuals who possess the full package: suitable cyber security certifications, experience with multiple environments and the security-centric mindset. 

However, such individuals are, for now, few and far between.

Organisations can look to co-sourced services to address their cyber security needs, partnering with experienced outsource partners to supplement their own teams, thus building on their skills while benefitting from the expertise of experts. From a national perspective, South Africa needs to begin addressing the skills gap before we can start to reduce our chances of cyber-attack. 

The United States of America have developed their NICE Cybersecurity Workforce Framework which details a framework around categorising, organising, and describing cybersecurity work into various roles and areas. 
South Africa, at a national level, should be looking to develop a similar initiative. Government led initiatives around building specific learning centres or training facilities for the development of cyber security skills would also go a long way padding skills development.

Additional encouragement of careers in this field can also be attained through offering tax breaks for students pursuing cyber security studies, or organisations who invest in programmes for cyber security development. 
Perhaps even encouraging the bringing in of talent from outside of our borders, in order to supplement our skills pool as well as increase our knowledge base.

It's a matter of time before South Africa feels the full brunt of being a cybercrime target. We need to act now to begin to address this gap before cyber-crime affects our economy and our reputation.

ITWeb

You Might Also Read: 

Three Most In-Demand Cybersecurity Jobs:

S. Africa’s Model For Cybesecurity:

South Africa: Serious About Cyberwarfare:

« Cyber Attacks Rank Alongside Natural Disasters
Drones: A Crowd-Management Solution »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

UMBRA

UMBRA

UMBRA is solely concerned with protecting governments against Nation State attacks. We are not a consumer or enterprise company.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

Simplilearn

Simplilearn

Simplilearn is the world's #1 online bootcamp for digital skills training in disciplines such as Cyber Security, Cloud Computing, Project Management, Digital Marketing, and Data Science.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Sourcepass

Sourcepass

Sourcepass is an IT consulting company that focuses on providing expert IT services, cloud computing solutions, cybersecurity services, website, and application development.

Inspectiv

Inspectiv

Inspectiv offers a turn-key solution to continuously identify security vulnerabilities and provide security assurance.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

Cytidel

Cytidel

Cytidel is a vulnerability and risk management platform that utilises threat and business intelligence to help IT Security teams.