7 Cyber-Security Skills In High Demand

...

Businesses around the world report a shortage in cyber-security talent. Here are the skills IT managers should be seeking to keep their data secure.

Organizations across industries are challenged to address a cyber-security skills shortage leaving their networks open to attacks.

There will be 1 million to 2 million unfilled cyber-security jobs worldwide by 2019, according to a recent report released by Intel Security called "Hacking the Skills Shortage." The report includes the results of a survey of 775 IT decision-makers involved with security, 82% of whom reported a lack of cyber-security skills within their business.

The lack of security talent is both dangerous and expensive, especially as businesses face growing threats from external internet cyberattacks. Most organizations don't know how to detect or mitigate attacks that leverage digital channels such as social media and mobile.

Most respondents in the Intel study (82%) reported a lack of security talent within their organizations. One in three said this makes them hacking targets, and one in four claimed they have suffered reputational damage and proprietary data loss as a direct result of the skills shortage.

[Read: What can IT professionals learn from the DNC hack?]

Part of the problem is a lack of adequate cyber-security training for IT professionals. About half of survey respondents said they prefer entry-level candidates to have a bachelor's degree, but hands-on experience and professional certifications are typically more useful for developing the skills in greatest demand.

High-value technical skills are especially scarce. Skills such as secure software development, intrusion detection, and attack mitigation are in greater demand than comparatively "soft" skills, such as communication and collaboration, according to the study.

More than half of respondents (55%) believe cyber-security technologies will evolve to help close the skills gap within five years. Some also plan to outsource, but only for skills easily automated -- for example, threat detection through network monitoring.

Here, we take a close look at some of the cyber-security skills in greatest demand. This list can give IT managers a better idea of what to seek as they build a robust security workforce.

Do you look for these skills in members of your IT team? Are there any skills not listed that you value in your team? Feel free to share your thoughts in the comments section below.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    And Here is the Galaxy Note 7 in Three Fun Colors

    Moments after the long, 3-day weekend kicked off here (that’s code for: we peaced out and never looked back), we welcomed in a first set of press images of the upcoming Samsung Galaxy Note 7.We have front and back cameras, along with what appears to be an additional front camera (or two?
  • 5300c769af79e

    HTC Confirms Android N Update for One A9, M9, and 10

    No shock here, HTC confirmed on Twitter today that Android N will be made available to owners of the One A9, One M9, and HTC 10.According to HTC, delivery date of the Android N update will depend on when Google actually delivers Android N to manufacturers, and of course, carriers go through their testing/certification phase.
  • 5300c769af79e

    Here is the Google Home Super Bowl Commercial

    Yesterday’s Super Bowl LI was one for the ages, especially those last few minutes.It was everything a football fan can hope for, as long as you aren’t the ultimate Patriots hater.
  • 5300c769af79e

    President Donald Trump Still Uses an "Old, Unsecured Android Phone"

    According to the New York Times, President Donald Trump still uses an “old, unsecured Android phone” regularly.While we don’t necessarily have on-the-record proof of this happening, we do know that all of the Tweets you’ve seen from him since being sworn into office all appear to have come from the official Android Twitter app, hence the “Twitter for Android” we see attached to those pictured below.