Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks
Cybersecurity professionals are overworked and stressed out to such an extent that it threatens to provide hackers and cybercriminals with a better chance of conducting cyber attacks against the enterprise.
A study by Goldsmiths, University of London and cybersecurity company Symantec surveyed over 3,000 CISOs and senior cybersecurity decision makers across the UK, France and Germany and found that the mounting pressure faced by those responsible for protecting organisations against cyber threats is taking an increasing toll.
Such is this pressure that the research says that almost two-thirds of cybersecurity professionals have considered quitting their jobs (64%) or leaving the industry altogether (63%).
That's a problem when the industry is faced with a skills shortage, but there's also a small chance that some of those who feel burned out by cybersecurity could take their abilities and apply them to the dark side.
"If you've acquired the skills and as the topic of security, and you're seriously considering moving onto something else, where do they go? Maybe data analytics and things like that. But it's possible a small percentage would be considering a career on the criminal side," Darren Thomson, EMEA CTO at Symantec told ZDNet.
"There's certainly money there, we know that, and it's essentially the same skill set: those people could turn into some of the scariest cybercriminals we've ever seen because we know they've been on the other side," he said, adding: "Even if it was one per cent of that 63 per cent, it'd worry me."
Even without the threat of cybersecurity staff leaving jobs, just under half (44%) of those surveyed said they believe their security teams lack the necessary skills to combat the threats that their organisations face – especially as threats continue to evolve.
But despite the awareness of changing threats and skills required to face them, almost half of the security professionals say they're too busy to keep up with the necessary skill development, while the same number say technological change is happening too quickly for them to adapt.
Meanwhile, almost half of cybersecurity professionals believe that attackers are gaining an edge due to backing from well-resourced groups, including organised crime operations and nation-state-backed hacking teams.
Attackers also have the advantage in that they don't need to formally prove their skills – cybercriminals don't need to get a certificate that says they're capable of performing a certain task like cybersecurity professionals do, criminals can just jump straight in and go about their illicit business.
"There are too many tools – it's very hard to upskill in many environments because they have this smorgasbord of security tools which has grown over time over 20 years," said Thomson.
"If you compare that to the criminals, they're using far fewer tools," he continued, detailing how attackers are increasingly using 'living off the land' techniques that exploit legitimate software.
It's because of all these issues and more that the survey found that cybersecurity professionals are increasingly burned out – and in some cases, expected to deal with issues they may not have the experience to face.
"The average age of the CISO seems to be dropping. You see adverts for CISOs with three or four years experience – but that's like having a 17-year-old general for me, and you won't find many of those," Steve Purser, head of core operations for ENISA told ZDNet.
"To do the job you've got to have experience – not book learning and knowledge, but hands-on experience – and you've got to develop a set of skills which take a long time to develop.
"And not saying you can't have young CISOs, but if you have someone in that situation where human life may even be at risk, I can see very easily how you'd get burnout fast," Purser added.
The potential of burnout is bad for everyone involved – the individual, their organisation, and potentially their organisation's staff and customers.
"Cybersecurity professionals are first responders, locked into a constant arms race with attackers – where talent and skill are the most important weapons," said Chris Brauer, director of innovation for Goldsmiths, University of London.
"Highly stressed workers are far more likely to be disengaged and ultimately quit. In an industry already plagued by a skills shortage, this is a significant risk to businesses," he added.
source zdnet
Industry: Cyber Security

Latest Jobs
-
- Security Auditor / 3rd Party Assurance. London. End user
- London
- 60000
-
Security Auditor / 3rd Party Assurance. London. End user The Security Auditor / 3rd Party Assurance role has two key functions. Manage the ongoing assessment of new and existing 3rd party suppliers to ensure they meet the internal policies / controls. (Reassessment etc) Internal Auditing across business to ensure various departemnt / operations are compliant and inline with internal ISMS etc. ISO 27001 internal audit experience, creation of audit reports experinece essential. This is an internal business so broad experience across a multiple technology environment (cloud and on prem) is highly desirable. MUST be able to engage and work with senior stakeholders in an often faced pace environment. ISO27001, NIST, CISSP, CISA Risk assessment experinece needed This is a permanent role.. Blend of technical and consultative approach needed. This role will require someone to travel to London a few days a week once lock down permits and their offices fully reopen. All details kept in confidence. Apply today to find out more.
-
- Security Auditor / 3rd Party Assurance. London. End user
- London
- 60000
-
Security Auditor / 3rd Party Assurance. London. End user The Security Auditor / 3rd Party Assurance role has two key functions. Manage the ongoing assessment of new and existing 3rd party suppliers to ensure they meet the internal policies / controls. (Reassessment etc) Internal Auditing across business to ensure various departemnt / operations are compliant and inline with internal ISMS etc. ISO 27001 internal audit experience, creation of audit reports experinece essential. This is an internal business so broad experience across a multiple technology environment (cloud and on prem) is highly desirable. MUST be able to engage and work with senior stakeholders in an often faced pace environment. ISO27001, NIST, CISSP, CISA Risk assessment experinece needed This is a permanent role.. Blend of technical and consultative approach needed. This role will require someone to travel to London a few days a week once lock down permits and their offices fully reopen. All details kept in confidence. Apply today to find out more.
-
- Head of Penetration Testing, UK based, Flexible location.
- United Kingdom
- Upto £100,000 plus excellent benefits
-
Head of Penetration Testing needed to join a security consultancy that are delivering client facing penetration testing services around Web app and Infrastructure. Looking for someone hands on that is able to manage a highly skilled technical team of testers. 50-60% of the time is expected to be hands on, other duties will include, but not be limited to; leading and managing the day to day running of the team, mentoring, team upskill, recruitment, reporting, escalation, process improvement etc. Flexible location although south east is preferred. Anyone with Check / CREST experience is highly desirable. MUST be able to achieve SC clearance. UK based role. All details kept in confidence.
-
- Technical Security Analyst. Immediate opportunity,
- Newcastle upon Tyne
- 48000
-
Technical Security Analyst. Immediate opportunity, Technical Security Analyst needed to join a specialist security team. This role will require travel into the office in a hybrid model once industry returns back to the working environment. The Security Analyst must be commutable to Newcastle upon Tyne. This is an Immediate opportunity. An essential requirement of the role is to be able to engage with internal stakeholders so a blend off technical hands on analytical and consultative communication skills. The role will include, but not be limited to; managing and handling incidents end to end, log review, incident analysis, escalation, vulnerability assessment, Automation, Malware Analysis, Threat intelligence, etc All details kept in confidence. https://calendly.com/chris-holt/call-with-chris-holt-dcl-search