Asia Fresh News

Asia Fresh Stories

Latest Technologies Straining Cyber Security Staffs, Study Warns

leave a comment »

Critical Skills Gap Also Found in (ISC)2-Sponsored, Frost & Sullivan Study of More than 10,000 Information Security Professionals Worldwide

HONG KONG, Feb. 18, 2011 /PRNewswire-Asia/ –﹛A study based on a survey of more than 10,000 information security professionals worldwide finds that a growing number of technologies being widely adopted by businesses are challenging information security executives and their staffs, potentially endangering the security of government agencies, corporations and consumers worldwide over the next several years.

Conducted by Frost & Sullivan, the 2011 (ISC)2(R) Global Information Security Workforce Study (GISWS) says new threats stemming from mobile devices, the cloud, social networking and insecure applications, as well as added responsibilities such as addressing the security concerns of customers, have led to “information security professionals being stretched thin, and like a series of small leaks in a dam, the current overworked workforce may be showing signs of strain.”

Conducted on behalf of (ISC)2, the not-for-profit global leader in educating and certifying information security professionals throughout their careers, the study also shows a severe gap in skills needed industry-wide.﹛Information security professionals admitted they needed better training yet reported in significant numbers that many of these technologies are already being deployed without security in mind.

“In the modern organization, end-users are dictating IT priorities by bringing technology to the enterprise rather than the other way around,” said Robert Ayoub, global program director – network security for Frost & Sullivan.﹛”Pressure to secure too much and the resulting skills gap are creating risk for organizations worldwide.

“We can reduce the risks, however, if we invest now in attracting high-quality entrants to the field and make concurrent investments in professional development for emerging skills. As the study finds, these solutions are underway, but the question remains whether enough new professionals and training will come soon enough to keep global critical infrastructures in the private and public sectors protected.”

“The good news from this study is that information security professionals finally have management support and are being relied upon and compensated for the security of the most mission-critical data and systems within an organization,” added Ayoub. “The bad news is that they are being asked to do too much, with little time left to enhance their skills to meet the latest security threats and business demands.”

Other key findings from the study include:

— As of 2010, Frost & Sullivan estimates that there are 2.28 million﹛
﹛ information security professionals worldwide, while there are around
﹛ 750,000 in Asia-Pacific (A-P). Demand for professionals in A-P is expected
﹛ to increase to over 1.3 million by 2015, with a compound annual growth rate
﹛ (CAGR) of 11.9 percent, creating career opportunities for those with the
﹛ right skills.

— Secure software development is a significant new area of focus for
﹛ information security professionals worldwide.﹛Application vulnerabilities
﹛ ranked as the No. 1 threat to organizations by 72 percent of respondents,
﹛ while 20 percent said they are involved in secure software development.

— Nearly 70 percent of respondents reported having policies and technology in
﹛ place to meet the security challenges of mobile devices, yet mobile devices
﹛ were still ranked second on the list of highest concerns by respondents.﹛
﹛ The study concludes that mobile security could be the single most dangerous
﹛ threat to organizations for the foreseeable future.

— Cloud computing illustrates a serious gap between technology implementation
﹛ and the skills necessary to provide security. More than 50 percent of
﹛ respondents reported having private clouds in place, while more than 70
﹛ percent reported the need for new skills to properly secure cloud-based
﹛ technologies.

— Professionals aren’t ready for social media threats. Respondents reported
﹛ inconsistent policies and protection for end-users visiting social media
﹛ sites, and just less than 30 percent had no social media security policies
﹛ whatsoever.

— Viruses and worms, hackers and internal employees all fell in significance
﹛ as top threats from 2008, the most recent year of the study.

— The main drivers for the continued growth of the profession are regulatory
﹛ compliance demands, greater potential for data loss via mobile devices and
﹛ mobile workforce, and the potential loss of control as organizations shift
﹛ data to cloud-based services.

— Nearly two-thirds of respondents don’t expect to see any increase in budget
﹛ for information security personnel and training in 2011.

— Salaries showed healthy growth despite a global recession, with three out
﹛ of five respondents reported receiving a salary increase in 2010. Overall,
﹛ salaries for information security professionals increased, with the A-P
﹛ region showing the highest growth at 18 percent since the 2007 study.

“With the increasing demand for information security professional due to security threats, we need to change our approach to global cyber security to address the skills gaps revealed by the study,” said Dr Lee Jae-woo, co-chair for the (ISC)2 Asian Advisory Board and Fellow of (ISC)2. “Especially in Asia, we see the career opportunities are growing. In order to fill the gap of professional demands, we urge industry, government, academia and the profession to collaborate to attract a new generation of highly qualified information security talent while supporting current professionals to help them address the latest threats.”

Likely the largest study of the information security profession ever conducted, 10,413 information security professionals from companies and public sector organizations from around the world were surveyed in the fall of 2010, including 61 percent in the Americas, 22.5 percent in Europe, the Middle East and Africa, and 16.5 percent in Asia Pacific.﹛Forty-five percent were from organizations with over 10,000 employees.

The average experience of respondents worldwide was more than nine years, while five percent of respondents held executive titles such as Chief Information Security Officer. Additionally, Frost & Sullivan supplemented the analysis with its other primary data sources and methods.

The objective of the GISWS, the fifth study sponsored by (ISC)2 since 2004, is to provide meaningful research about the information security profession to industry stakeholders, including professionals, corporations, government agencies, academia, and hiring managers.

The full study can be found here:﹛

About (ISC)2
(ISC)2 is the largest not-for-profit membership body of certified information security professionals worldwide, with nearly 75,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC)2 issues the Certified Information Systems Security Professional (CISSP(R)) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP(R)), Certified Authorization Professional (CAP(R)), and Systems Security Certified Practitioner (SSCP(R)) credentials to qualifying candidates. (ISC)2’s certifications are among the first information technology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)2 also offers education programs and services based on its CBK(R), a compendium of information security topics. More information is available at .

(C) 2011, (ISC)2 Inc.﹛(ISC)2, CISSP, CSSLP, ISSAP, ISSMP, ISSEP, CAP, SSCP and CBK are registered marks of (ISC)2, Inc.


Kitty Chung
(ISC)2 Asia-Pacific
Tel: +852-3520-4001


Written by asiafreshnews

February 18, 2011 at 4:04 pm

Posted in Uncategorized

Tagged with

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: