- March 21, 2019
- Posted by: admin
- Category: Uncategorized
Cybersecurity Skills Shortage-The fact that organizations are struggling to hire top talent for security roles is no secret; the problem is that the situation does not look like it will ease anytime soon. Harvard Business Review wrote about the cybersecurity talent shortage in 2017 stating that it was a problem that had been top of mind since 2015. And yet here we are in 2019 with recent research finding that 59% of companies are at moderate or extreme risk of cybersecurity attacks due to this shortfall.
While there are new initiatives, such as universities investing in undergraduate degrees, and federal retraining programs like the National Initiative for Cybersecurity Careers and Studies, which will increase the available talent, it’s not going to be enough, and it will take time to see the results.
For most organizations, the skills shortage means it’s time to get creative. What follows are several ideas to combat this problem, ranging from internal changes to technology-based tactics you can employ at your own organization.
1: Manage Your Network Complexity
Your cybersecurity skills needs are directly related to the size of your network — the more complex and fragmented your network, the more work that must be done to protect your organization. As network complexity increases, the ability to provide visibility and control no matter what size your network becomes even more important.
Another approach to the cybersecurity skills gap is to examine areas where your own organization could simplify the workload and thus require fewer man-hours to complete. While reducing the number of vendors and platforms is typically not an option in large organizations, a few considerations that will simplify the management of your complex hybrid IT environment include:
- Centralize Network Security Policy Management: Managing security configurations across vendors and platforms, on-prem and hybrid cloud, from a single pane of glass will reduce efforts and better control risks.
- Provide Network Visibility: Understanding the topology of your network allows you to see the pathways a change should follow which means that change requests will become fulfilled more easily with a higher degree of accuracy.
- Document All Network Changes: When it comes time to proving compliance, if all network change requests are documented, searchable and readily available, that frees up your staff’s time for other critical functions.
Network complexity is not going away but with consistent centralized control and management of security policies across complex, hybrid networks your team can improve efficiency, provide faster response to business requests, and reduce the risk of cyberattacks and audit failures.
2: Automate Your Security Changes
Many organizations spend too much time manually processing routine and low-risk security tasks. These manual processes are especially prone to errors and misconfigurations which can lead to serious downtime, a failed audit, or worse yet, a breach. In some cases, essential procedures like decommissioning rules or servers do not take place because of bandwidth constraints, an oversight that can expose your network to cyberthreats.
The key to automating security changes is the ability to centralize and adhere to an organization’s security policy. Automating security policy management provides the guardrails that are needed to enforce a well-documented change process and increase your operational efficiency without adding additional staff. It also helps identify changes that are already implemented and eliminate resource-intensive mistakes and redos. Ultimately, this means gaining better control over security changes and reducing overall risk with the staff that you have in place.
Read More Here
Article Credit: SB
The post 4 Inventive Ways to Combat the Cybersecurity Skills Shortage appeared first on erpinnews.