The leading sources of stress for cybersecurity leaders? Regulation, threats, skills shortage

A perfect storm of regulation, increased threats and technological complexity is overwhelming cybersecurity decision makers, reveals new research from Symantec.
Four in five (82 percent) security leaders across France, Germany and the UK report feeling burned out, whilst just under two-thirds (63 percent) think about leaving the industry or quitting their job (64 percent).
Surveying 3,045 cybersecurity decision makers across the across France, Germany and the UK, the research – conducted by Symantec in collaboration with Dr Chris Brauer, Goldsmiths, University of London – reveals mounting pressure on the security profession.
The leading source of stress for cybersecurity leaders is government regulation. Four in five (86 percent total, 81 percent UK) reported that mounting regulation, such as GDPR and the NIS Directive, was increasing their stress. Two in five (40 percent total, 33 percent UK) reported concerns that they would be held personally liable for a data breach.
Just over half (55 percent total, 37 percent UK) feared dismissal if a breach happened on their watch. Insufficiently skilled staff (80 percent total, 70 percent UK), the size and complexity of the estate to be defended (82 percent total, 70 percent UK), and the increasing volume of threats (82 percent total, 69 percent UK) are also major contributors to stress.
“Stress dramatically impacts our ability to make good decisions,” said Dr Chris Brauer, Director of Innovation, Goldsmiths, University of London.
“It impairs your memory, disrupts rational thinking and negatively impacts every cognitive function you have. In an industry like cybersecurity, which requires focus, creative thinking, attention to detail and rational decisions in high pressure scenarios – stress can be crippling. Highly stressed workers are far more likely to be disengaged and ultimately quit. In an industry already suffering a skills shortage, this kind of stress can present a significant risk.”
On high alert
Ironically, efforts to protect the enterprise are also increasing stress:
- 79 percent (62 percent UK)) reported that managing ‘too many cyber defence products or vendors’ was increasing their stress levels
- Two-thirds (68 percent total, 54 percent UK) of cyber-security decision makers said they’d felt ‘paralysed’ by the overwhelming volume of threat alerts
- A third (33 percent total, 28 percent UK) reported that threat alerts, designed to help keep a business safe, are making the situation worse due to their sheer volume
- In the face of such huge workloads, the majority of security professionals (67 percent total, 54 percent UK) said their cybersecurity teams left work at the end of the day with threat alerts left unreviewed
This volume is impacting the security of enterprises:
- Already 41 percent (46 percent UK) agree a breach is inevitable
- A third (32 percent total, 28 percent UK) say their organisation is currently vulnerable to avoidable cybersecurity incidents
- A quarter (26 percent total, 22 percent UK) admitted they have already suffered an avoidable cybersecurity incident
“Feeling paralyzed by an overwhelming volume of threat alerts is a common problem for security professionals, and reason why legacy WAFs are typically bought for a compliance check box, and then, turned off. Not only do they flag an unmanageable volume of alerts, but they also block large amounts of legitimate traffic, creating false positives,” Hala Al-Adwan, VP of Technology at Signal Sciences told Help Net Security.
“In today’s environment, security teams need a modern solution that pulls out needles from the haystack. Signal Sciences next-gen WAF surfaces the most important real-time attacks and anomalies in one quick view and immediately alerts teams through integrated ChatOps and DevOps tools, like Slack, DataDog or PagerDuty. We give you alerts that actually matter and contain actionable data. Any team member can easily access this security event data and quickly understand what’s going on within their applications and how to resolve it. They can diagnose, triage, and solve security problems quickly. Any malicious attacks will be automatically detected and blocked—without producing false positives on legitimate traffic,” Al-Adwan concluded.
The challenge ahead
Two-thirds of security leaders (65 percent total, 54 percent UK) feel they are being ‘set up for failure’. However, the overwhelming workload and pressure doesn’t seem to deter them.
The vast majority of security leaders are adrenaline junkies, fully immersed in their work, even when it’s stressful (92 percent UK and total). Nine in ten are motivated by high pressure situations and 92 percent (UK and total) report that they find their work environment thrilling.
“This appetite for pressure is much needed, as the challenges cybersecurity professionals are facing is set to grow,” commented Darren Thomson, EMEA CTO, Symantec.
Many are already challenged by the pace of change and rapid growth of data. Four in five (82 percent total, 70 percent UK) report that having to secure too much data, in too many places, is making the job more stressful. Almost half (45 percent total, 37 percent UK) say technological change is occurring too quickly for their teams to adapt.
“Ever since the internet started connecting computers and systems, cyber defence has largely been a game of reactions,” continued Thomson.
“With new technology, came new threats. As each new exploit emerged, a new defence was created. Organisations and the cybersecurity industry got sucked into an ever-accelerating game of whack-a-mole. There are now too many moles and too many hammers. It’s time for organisations to take a step back, and approach cyber defence in a far more effective way.”

Latest Jobs
-
- Contact 12 month- Security Operations- Crowdstrike Falcon Insight EDR / Analyst.
- United Kingdom
- Dependent on experience
-
Security Operations engineer / Analyst with Crowdstrike Falcon Insight EDR experience for a 12 month contract. Experienced Contractor with Crowdstrike Falcon Insight: Endpoint detection and Response (EDR) experience needed - 12 month rolling project. Implementation, configuration and Analyst experience needed with Crowdstrike Falcon Insight: (EDR) Migration project- relocating capability internationally. technically implementing, configuration of that that migration and then transition to BAU role monitoring. DCL Search exclusive associate Project.
-
- SailPoint Consultant
- London
- Upto £75,000 plus benefits
-
SailPoint Consultant is needed for an expanding Financial Service business, this is an exciting time to join the Business as they are in the Process of deploying both IAM and PAM solutions and this consultant will form a key part of the IAM team Location can be flexible but would require the individual to come into the London office a couple of times a month for team meetings and face to face project reviews Duties include · Engage in the Identity & Access Management project to deliver SailPoint IdentityNow and Privileged Access Management · On-board applications and users into IAM tools and customise or configure integrations as required · Regularly review, secure and recertify privileged roles in applications, databases and operating systems · Implement least privilege, just-in-time access, password rotation and vaulting wherever possible · Migrate application authentication to Single Sign-On through the use of SAML and OAuth · Implement and enforce the use of MFA where possible, focusing on critical applications and risky sign-ins · Provide technical support to Centrify and SailPoint users Key experience required: Previous experience with SailPoint, including integrating and deploying into a business, onboarding users and applications, supporting users and performing manual administration tasks. Experience with SAML and OAuth to migrate applications to Single Sign-on. If you are interested in hearing more please reach out to me for more information
-
- Centrify Consultant
- London
- Upto £75,000 plus benefits
-
A Privileged Access Management Consultant is needed for an expanding Financial Service business, this is an exciting time to join the Business as they are in the Process of deploying a Centrify PAM solution,, this consultant will form a key part of the team Location can be flexible but would require the individual to come into the London office a couple of times a month for team meetings and face to face project reviews Duties include · On-board applications and users into PAM tools and customise or configure integrations as required · Regularly review, secure and recertify privileged roles in applications, databases and operating systems · Implement least privilege, just-in-time access, password rotation and vaulting wherever possible · Migrate application authentication to Single Sign-On through the use of SAML and OAuth · Implement and enforce the use of MFA where possible, focusing on critical applications and risky sign-ins · Provide technical support to Centrify users You would also gain expsoure with the IAM toolset as part of an Identity Access deployment. Key experience required: Previous experience with a PAM tool (Centrify would be an added bonus but not essential) including integrating and deploying into a business, onboarding users and applications, supporting users and performing manual administration tasks. Experience with SAML and OAuth to migrate applications to Single Sign-on. If you are interested in hearing more please reach out to me for more information
-
- SOC team lead- Deputy SOC manager - Managed Security Services, Bradford. Exclusive
- Bradford
- £70,000 +
-
SOC team lead- Deputy SOC Manager - Managed Cyber Security Services, Bradford. Exclusive Identifier project. Technical team lead needed to join a Managed Cyber Security Services business. The role will be a hands on lead role and technical escalation point for the team. You will also be responsible for leading, mentoring, growing and developing the team. You will be the deputy SOC manager and be involved in the strategic growth of the capability. A managed security services background is essential, specifically within a managed security operations capability. Current hands on support experience across Firewall, SIEM, Incident Response is essential.