Infosec professionals believe cyber-adversaries have a distinct advantage over cyber-defenders, according to new research from ESG and the Information Systems Security Association (ISSA). Credit: Thinkstock Cybersecurity professionals are paranoid by nature. That’s not a bad thing; it’s a job requirement. We want our cybersecurity team to “think like the enemy” to discover and remediate vulnerabilities as rapidly as they possibly can. Aside from this cynicism, my cybersecurity friends also take great pride in what they do. Like Elliot Alderson from the TV series, “Mr. Robot,” many cybersecurity professionals want to save the world (from hackers and the like).With this profile in mind, some of the data from the latest report from ESG and ISSA fits with this professional mistrust. (Note: I am an ESG employee.) For example, 91% of cybersecurity professionals surveyed believe that most organizations (other than their own) are extremely vulnerable or somewhat vulnerable to a significant cyber attack or data breach (i.e. one that disrupts business processes or leads to the theft of sensitive data). This question has been included in the survey for the past three years, and the results haven’t changed a whit and is one indicator of just how bad things are. As part of this year’s project, survey respondents were also asked about the balance of power between cyber-adversaries and cyber-defenders. The results were equally depressing – 59% of respondents believe that in general, cyber-adversaries have a big advantage over cyber-defenders, while 34% claim that cyber-adversaries have a marginal advantage over cyber-defenders.Why the imbalance? Cyber-adversaries are well organized and cooperative. There are strong divisions of labor and even customer services between coders and criminals. Cyber-adversaries have access to hacking tools written by government intelligence agencies with advanced skills. Finally, hackers can afford to be persistent and patient. It’s OK for them to experiment, fail, re-group, and try again. Sadly, a skilled adversary can find their way into networks with a bit of sweat equity. For those of us who live in the world of cybersecurity, these results aren’t surprising, but they should be alarming to everyone – business people, legislators, consumers, and citizens. The battlefield is heavily tilted toward black hats, with cybersecurity professionals constantly fighting uphill. Pure and simple, the ongoing cyberwar isn’t a fair fight. We as a society need to accept this reality and put more effort and resources into balancing the playing field. Technology hyperbole and arm waving won’t cut it. Note: The ESG/ISSA research report, The Life and Times of Cybersecurity Professionals, is available for free download. We encourage all interested parties to read the report and provide us with your feedback. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe