Enterprise organizations lack skills and no longer want to own security tasks In my last blog, I presented some data about the extremely critical but often ignored security skills shortage. While 55% of enterprise organizations (i.e. more than 1,000 employees) plan to add information security headcount this year, 83% say it is “extremely difficult” or “somewhat difficult” to recruit and hire these folks.So if you need help and can’t hire anyone new, what do you do? What about turning to security service providers as an alternative? Good suggestion but in the past, many enterprises looked at security services as somewhat of a taboo. After all, mission-critical applications and sensitive data are often considered the “family jewels,” so you simply couldn’t trust the security of these assets to 3rd parties. The long-standing aversion for 3rd party security services is officially gone for the most part. According to ESG Research, 62% of enterprise organizations will use 3rd party professional or managed security services in 2012. What’s more, 58% of organizations say that their use of 3rd party professional or managed security services has increased over the last 2 years. There are a number of reasons for increasing use of security services but the skills shortage is certainly a root cause behind the change:39% of enterprises are increasing the use of security services because “security service providers can perform certain tasks better than we can”34% of enterprises are increasing the use of security services because “new types of threats persuaded my organization to seek outside expertise”29% of enterprises are increasing the use of security services because “they don’t have a large enough staff to handle all security responsibilities”26% of enterprises are increasing the use of security services because “they don’t have specific security skills in house.”20% of enterprises are increasing the use of security services because “they couldn’t recruit/hire enough security expertise so they had no choice”So clearly the security skills shortage has a silver lining for security services experts like BT, CSC, EMC/RSA, HP, IBM, Symantec, Unisys, and Verizon Business Services as well as VARS and resellers whose margin depends upon adding services value on top of product sales. A few more thoughts here however: 1. All security product vendors should consider building services themselves, creating new services for their channel partners, or extending partnerships with additional service providers.2. Security services demand will increase raising prices and prolonging schedules. As services margins rise, CISOs must closely watch their top security talent as they will be heavily recruited by services companies with a growing number of projects in the queue. 3. While VCs tend to eschew services companies because of low multiples, it may be worthwhile to invest in security services in this climate. A small high-end security services firm focused on a growth area like server virtualization or cloud security should be acquired at an attractive price in no time. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe