Crisis in the SOC as skills shortage bites deep, says report
British companies are heading towards a security operations centre (SOC) crisis which could dramatically swing the threat success balance in favour of the bad guys.
The Agari 'Email Fraud & ID Deception insights Trends' report published today should serve as a wake-up call to organisations across the country that the SOC is cracking up under the strain of a severe skilled staff shortage.
According to the Agari research, based upon the number of phishing incidents reported and the time it takes to investigate just this threat sector, the average SOC needs a total of 54 skilled analysts to perform optimally.
Yet the average number of analysts in UK-based SOCs is just 12.
"The fact that UK enterprises are suffering an average deficit of over 40 analysts at any one time," Crane Hassold, director of threat research for the Agari Cyber Intelligence Division, told SC Media UK, "should be a massive red flag that organisations are simply unable to deal with the burgeoning number, and increased sophistication of threats – especially those using targeted email."
The phishing threat isn't the only thing that's sucking up the time of SOC analysts, but it has become a pretty important resource drain when those resources are being stretched so thinly.
The research suggests that analysts in UK SOCs spend an average of 4.25 hours triaging phishing incidents that turn out to be false positives, whereas actual phishing incidents require only slightly longer at 4.81 hours. The significance of these figures becomes apparent when you read that of the 24,000 phishing incidents reported by employees per UK organisation each year, on average, some 55 percent of these are false positives.
"The number of suspected email threats reported by employees shows that much has been achieved in educating staff on the threat of phishing and other email threats," Hassold said. "However, the increase in these reports is flooding SOCs with a raft of false positives, which current resources just can’t deal with."
And there lies the rub: the cost of manually handling these reports is over £3 million a year, according to Agari, assuming of course that SOCs can find the skilled analysts required.
Rod Soto, head of security research at JASK, compares the problem to having a castle with no guards or an open backdoor in your house with no locks or cameras. "The impact comes in significant losses in financial terms, reputation and intellectual property," Soto told SC.
The skills shortage also plays out with other organisations continually seeking to "pry your most valued professionals away with ever new shiny things and increasing compensation" as Steffan Jones, the Security Operations Manager responsible for Alert Logic’s European arm of its Global SOC says.
"The expertise is out there," Jones said, "but a lot is in motion far more than other IT disciplines."
Which means that most enterprises are forever behind the curve in terms of being properly prepared to defend the business.
"Consequently, there will be less focus on delivering proactive security awareness and expertise to end users and business projects, broadening the scope for monitoring and workload of the SOC to undertake," Jones warned, "resulting in a vicious cycle rather than a virtuous one."
So, what should enterprises be doing in order to mitigate the risks that this apparent shortage of optimally-staffed SOCs bring to the data security party?
Barbara Kay, senior director security at ExtraHop, feels that there is a "rich vein of talent within organisations if they cross-train existing IT teams to understand security".
She admitted that this "takes a commitment, but leverages existing knowledge of the business and its IT systems."
Kay told SC that security teams must consciously reassess their processes and tools to get the most from their people, meaning both better and fewer tools which are flexible and proactive in adopting automated processes and machine learning as staples.
Javvad Malik, security advocate for AlienVault, agreed that "having tools that are built together and can also integrate threat intelligence… can help reduce the different applications needed to be managed".
Kunal Hatodé, senior manager (EMEA) for advanced cyber security services at NTT Security, added that "with the help of an automated workflow orchestration tool, it’s possible to carry out investigations across all internal and external tools in a shorter time, at least 60 percent quicker, by carrying them out in parallel rather than sequentially".
We'll leave the last word to JASK's Rod Soto though, who provided SC with this handy bullet point list of measures the enterprise can take:
Hire on skills not degrees
Reach within your own organisation for potential individuals that can be trained and already know your enterprise systems
Once you have personnel invest in them, have a career path and make them feel appreciated so they do not leave
Embrace technologies that will allow cybersecurity operators to perform further tasks. Things such as SOC automation, Machine Learning and AI
- IDAM Business Analyst - Home based
- Upto £500 per day
IDAM Business Analyst is required for a global retailer who are currently going through a global transformation of their IDAM solution This would be a rolling 3 month contrat estimated to be at least for 12 months YOu will be responsible for Creating process roadmaps and company strategy for Identity Management. Analysing and defining the client's needs and conducting a gap analysis to define areas of improvement/weakness in order to provide solutions that are in line with security best practices. Managing stakeholders from both the business (application owners) & Technology (IT Risk, Audit). * IAM subject matter expertise. Creat process diagrams to explain and demonstrate the IAM framework to end-users. We are looking for an experienced Business Analyst who has been involved in an IAM transformation where they have moved the business from one vendor to a new vendor. Experience with any of these vendors would be advantageous, Saviyant, Sailpoint, Okta, OR IBM
- REMOTE Cyber Security Operations Engineer. UK
- United Kingdom
CH8196 REMOTE Cyber Security Operations Engineer. UK Internal opportunity. New position. Exclusive to DCL Search. You will be the hands on technical eyes and ears of the Cyber security capability actively working to ensure and enhance the adherence to ISO27001 and SOC 2 controls. You role will touch on the following o Security Monitoring- Threat Analysis, Maturing monitoring capability. Utilising SIEM tools o Vulnerability Management- Identifying threats to internal assets- working with internal teams to patch. § Cloud based vulnerability tool experience preferred. o Access Control Management- Mature policy and process of RBAC. Ideally AWS KMS experience. o Vulnerability Testing- Aiding with Pen test scoping in line with identified vulnerabilities. Working internally to plan and track remediation actions. o Security Incident Management- Triaging alerts, evidence capture, escalation, diagnose and fix. o Working within a Cloud based environment. Ideally AWS. o Security Patch Management Support & Assistance – Approach methods, solutions, and policy alignment. o Disaster Recovery planning o Change Management Any CLOUD SIEM experience highly desirable. Contact me today for more information Chris.Holt@dclsearch.com / 07884666351
- Senior Product Developer, Microsoft.NET, Remote working
- Upto €80,000 plus benefits
- Senior Product Developer, Microsoft.NET, Remote working
- Upto 65,000 plus benefits