The leading sources of stress for cybersecurity leaders? Regulation, threats, skills shortage
A perfect storm of regulation, increased threats and technological complexity is overwhelming cybersecurity decision makers, reveals new research from Symantec.
Four in five (82 percent) security leaders across France, Germany and the UK report feeling burned out, whilst just under two-thirds (63 percent) think about leaving the industry or quitting their job (64 percent).
Surveying 3,045 cybersecurity decision makers across the across France, Germany and the UK, the research – conducted by Symantec in collaboration with Dr Chris Brauer, Goldsmiths, University of London – reveals mounting pressure on the security profession.
The leading source of stress for cybersecurity leaders is government regulation. Four in five (86 percent total, 81 percent UK) reported that mounting regulation, such as GDPR and the NIS Directive, was increasing their stress. Two in five (40 percent total, 33 percent UK) reported concerns that they would be held personally liable for a data breach.
Just over half (55 percent total, 37 percent UK) feared dismissal if a breach happened on their watch. Insufficiently skilled staff (80 percent total, 70 percent UK), the size and complexity of the estate to be defended (82 percent total, 70 percent UK), and the increasing volume of threats (82 percent total, 69 percent UK) are also major contributors to stress.
“Stress dramatically impacts our ability to make good decisions,” said Dr Chris Brauer, Director of Innovation, Goldsmiths, University of London.
“It impairs your memory, disrupts rational thinking and negatively impacts every cognitive function you have. In an industry like cybersecurity, which requires focus, creative thinking, attention to detail and rational decisions in high pressure scenarios – stress can be crippling. Highly stressed workers are far more likely to be disengaged and ultimately quit. In an industry already suffering a skills shortage, this kind of stress can present a significant risk.”
On high alert
Ironically, efforts to protect the enterprise are also increasing stress:
- 79 percent (62 percent UK)) reported that managing ‘too many cyber defence products or vendors’ was increasing their stress levels
- Two-thirds (68 percent total, 54 percent UK) of cyber-security decision makers said they’d felt ‘paralysed’ by the overwhelming volume of threat alerts
- A third (33 percent total, 28 percent UK) reported that threat alerts, designed to help keep a business safe, are making the situation worse due to their sheer volume
- In the face of such huge workloads, the majority of security professionals (67 percent total, 54 percent UK) said their cybersecurity teams left work at the end of the day with threat alerts left unreviewed
This volume is impacting the security of enterprises:
- Already 41 percent (46 percent UK) agree a breach is inevitable
- A third (32 percent total, 28 percent UK) say their organisation is currently vulnerable to avoidable cybersecurity incidents
- A quarter (26 percent total, 22 percent UK) admitted they have already suffered an avoidable cybersecurity incident
“Feeling paralyzed by an overwhelming volume of threat alerts is a common problem for security professionals, and reason why legacy WAFs are typically bought for a compliance check box, and then, turned off. Not only do they flag an unmanageable volume of alerts, but they also block large amounts of legitimate traffic, creating false positives,” Hala Al-Adwan, VP of Technology at Signal Sciences told Help Net Security.
“In today’s environment, security teams need a modern solution that pulls out needles from the haystack. Signal Sciences next-gen WAF surfaces the most important real-time attacks and anomalies in one quick view and immediately alerts teams through integrated ChatOps and DevOps tools, like Slack, DataDog or PagerDuty. We give you alerts that actually matter and contain actionable data. Any team member can easily access this security event data and quickly understand what’s going on within their applications and how to resolve it. They can diagnose, triage, and solve security problems quickly. Any malicious attacks will be automatically detected and blocked—without producing false positives on legitimate traffic,” Al-Adwan concluded.
The challenge ahead
Two-thirds of security leaders (65 percent total, 54 percent UK) feel they are being ‘set up for failure’. However, the overwhelming workload and pressure doesn’t seem to deter them.
The vast majority of security leaders are adrenaline junkies, fully immersed in their work, even when it’s stressful (92 percent UK and total). Nine in ten are motivated by high pressure situations and 92 percent (UK and total) report that they find their work environment thrilling.
“This appetite for pressure is much needed, as the challenges cybersecurity professionals are facing is set to grow,” commented Darren Thomson, EMEA CTO, Symantec.
Many are already challenged by the pace of change and rapid growth of data. Four in five (82 percent total, 70 percent UK) report that having to secure too much data, in too many places, is making the job more stressful. Almost half (45 percent total, 37 percent UK) say technological change is occurring too quickly for their teams to adapt.
“Ever since the internet started connecting computers and systems, cyber defence has largely been a game of reactions,” continued Thomson.
“With new technology, came new threats. As each new exploit emerged, a new defence was created. Organisations and the cybersecurity industry got sucked into an ever-accelerating game of whack-a-mole. There are now too many moles and too many hammers. It’s time for organisations to take a step back, and approach cyber defence in a far more effective way.”
- SOC Manager. SC Clearance. Immediate opportunity.
Permanent SOC Manager. SC cleared / clearable, London / Birmingham. SOC Manager needed to replace a SOC contractor I placed into a client who is due to complete their assignment at the end of March. The ability to achieve SC clearance is essential. Looking for someone that is a blend of strategic stakeholder engagement with strong technical skills. The role will sit in a relatively new SOC environment. The position is to setup, implementation and management of resources to help with the initial and on-going stages of a new SOC. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-manager-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- Security engineer. Financial Services. UK. Permanent
CH7863 Security engineer. End User . Financial Services Security Engineer needed to monitor and manage a security suite of tools within an End User environment. The Security Engiener will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-
- DevSecOps - Security design / review consultant. SC Clearance. London
CH7858 London £70,000 DevSecOps - Security design / review consultant. DevSecOps - Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
- CONTRACTOR Cyber Vulnerability Analyst, NESSUS, Rapid 7, SC clearance required.
Cyber Vulnerability analyst NESSUS, Rapid 7, needed for IMMEDIATE 3 month contract MUST have / be able to achieve UK SC clearance role to work within a live environment within a public sector department. The individual must have experience in using various security methods and tools such as Rapid7 and NESSUS scan for / identify vulnerabilities, prioritise them according to risk and raise appropriate tickets for remediation / follow up. In depth experience utilising Nessus highly beneficial. Current cyber public sector experience highly desirable.