CISOs can beat the infosec skills shortage. Here’s how The information security skills gap may have become a huge issue for Chief Security Offices (CSOs) and Chief Information Security Officers (CISOs), but there are a number of ways InfoSec teams can work around the shortage so to protect their networks and stay ahead of the attackers.Outsourcing staffWhen people think of outsourcing, they often think of outsourcing services. A company may, for example, choose to outsource its accounting, customer management, or recruitment.However, it’s worth noting that you can also outsource talent and this is a poignant note for an understaffed and under-skilled security industry. Most security teams are increasingly working with penetration testers, consultants and incident response (IR) experts, but this writer knows of at least one CISO, working at a major transportation company, whose own team are formed almost entirely of experienced contractors.This may sound extreme but there are numerous benefits to outsourcing your team. For starters, these personnel are usually heavily-experienced with years in the industry, perhaps even within specific sectors, while they can hit the ground running from day one. As a result, there’s no need to train them up and they earn lucrative salaries, so there’s little chance of them jumping ship. Push work to other teamsInformation security is a broad field which encompasses various other parts of the business. Brian Honan, managing director at BH Consulting and a cyber-security adviser at Europol, believes that CISOs should take advantage of this by pushing work elsewhere.“Thefirst thing CISOs should do is look at what alternatives there may be to alleviate the pressures on their areas,” Honan tells CSO Online.“For example, some routine security take could be operationalized and given to other areas including the business, such as IT, compliance, or risk functions. Those tasks that can’t be given to another team could be outsourced to external providers.”Use automated technologiesOne of the falls-out from the lack of skilled personnel, and thus resources, is that companies often don’t see the threat from attackers until it’s too late. Data breaches are classic examples of security teams having little idea of what’s happening on their own networks, with reports suggesting that average breach detection times run into weeks rather than days. A lot of this failure to detect and respond comes down to resources, poorly practiced incident response (IR) plans and weak log management.However, all is not lost thanks to the rise of automated technology which simplifies the process of detecting and removing threats, whilst protecting key business assets.Richard Starnes, CISO at the Kentucky Health Cooperative, believes that relying on SIEMs from vendors is a positive first step for automating security.“There is a great deal to be said for the automation of information security, such as in GRC or even outsourcing, particularly in areas like SIEMs,” Starnes told CSO Online. “This reduces the need for staff, particularly in large organizations where a 24/7/365 capability may be required. Also, with the outsourcing of SIEMs, you can utilize the cross skills, experience and the intelligence capabilities of the vendor. That must be weighed against the obvious downsides of outsourcing security capabilities.”Quentyn Taylor, head of information security at Canon Europe, adds: “In the security space automation is the key, from the operational sphere to the investigative sphere, automation is what is needed to ensure that the response and action is timely enough to be effective. The key point is that for automation to be effective the staff themselves should be part of the design and implementation.”Up-skill existing staffGiven both the skills shortage, and the fact that most computer science students would likely rather build the next Facebook than, say, a next-gen firewall, CISOs and CSOs are limited in where their next InfoSec professional is coming from.One suggestion is to up-skill existing employees that show a passion or aptitude for security.“Develop and promote your internal staff,” says Starnes. “Create a work environment where they are happy and fulfilled. Keep their remuneration at a sustainable level. This will reduce your staff churn significantly. Recruit as you would normally and bring your new staff into this environment. You will always lose a few, but you will keep many of them and people will want to come work for you on their own.”Honan adds: “I think this is an area often overlooked by many CISOs, to their own detriment. Too often the focus in security is on technical skills, yet security needs those with people skills, report writing, communication skills, and analysis skills. People with these skills can be a great asset for the security team and enables the CISO to extend their recruiting net into other industries.”Taylor says: “We have all known that network and server ops staff can make superb InfoSec staff, however there are also other areas I suspect can be useful.“If you think what security awareness is at its core it is communications, I believe staff from these areas would bring a totally new perspective to InfoSec. Many other areas also have relevant transferable skills that can add to InfoSec teams.”Hire from other sectorsSecurity experts have long-since argued that information security is not just about the technology, and that the nitty gritty technical details could be taught if personnel had the appropriate other skills and experiences.“Information assurance is not just a skill; it is also a mind-set, a way for thinking,” says Starnes. “That mind-set is curiosity, tenacity and a passion for information assurance. Those traits can be found in any number of professions and industries. Find the mind-set and the passion first, the skills and experience can be developed.”Taylor agrees, adding: “The right skills can be found – what I find more challenging is finding people with the right aptitudes and experience.“My first suggestion would be to review hiring role descriptions and cut back on the mandatory skills and qualifications and see what candidates you get. Many people believe that certification is a substitute for experience or that demanding the right certification will ensure the correct level of experience, but I find this not the case.”Run or attend competitionsThere are numerous competitions, workshops and even holiday camps for those interested in a career in security – and so it makes sense for CISOs and CSOs to attend or organize as many of these as possible.A lot of these competitions, like CyberLympics in Europe and the Cyber Security Challenge in the UK, are interactive and role-based game and so they give a great insight into how the participants would tackle similar situations in real-life. Security pros can also be found from initiatives like SANS Institute’ Cyber Academy, or meet-up hackathons.“Many [CISOs] are doing the above but even going a step further with initiates such as running capture the flag competitions and/or hackathons sponsored by the company,” says Honan.“This allows the company to identify potential talent to recruit into the team. Others will offer on placements for university students during the holidays, or work with the research function of universities of joint projects.” Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe