forked from rahuldeve/Diversification-Dataset
-
Notifications
You must be signed in to change notification settings - Fork 0
/
2013-ISC2-Global-Information-Security-Workforce-Study.txt
executable file
·2354 lines (1515 loc) · 61.6 KB
/
2013-ISC2-Global-Information-Security-Workforce-Study.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
50 Years of Growth, Innovation and Leadership
The 2013 (ISC)2 Global Information Security Workforce Study
A Frost & Sullivan Market Study in Partnership with:
Prepared by
Michael Suby
Global Program Director
Information Security
www.frost.com
Executive Summary ............................................................................................................... 3
Survey Objective and Methodology ..................................................................................... 4
Security Threats and Vulnerabilities, Implications, and State of Readiness ...................... 6
People are a Key Tool in Information Security .................................................................... 10
Need and Budget for the Right Information Security Professionals ................................ 12
Skills ...................................................................................................................................... 13
Certification ......................................................................................................................... 14
Affiliations ............................................................................................................................. 15
Information Security is a Rewarding and Resilient Profession .......................................... 15
Secure Software Development: Essential but Under-Supported ...................................... 19
Security Implications of BYOD, Cloud Computing, and Social Media .............................. 21
BYOD .................................................................................................................................... 22
Cloud Computing ................................................................................................................. 23
Social Media ......................................................................................................................... 25
The Last Word ........................................................................................................................ 26
Frost & SullivanCONTENTSExECUTIVE SUMMaRY
The information security profession, in addition to being a large and growing field, is a
barometer of economic health and the changing nature of how business is being conducted.
Information security professionals are critical guardians in the protection of networked
operations and informational assets. Growth in this profession is a testament to the need
for their expertise and also a signal that global economic activity is advancing. Furthermore,
changes in information technology (IT) and evolving IT norms on how, when, and where
business operations occursuch as BYOD, cloud computing, and social mediaremind us
that information security professionals must be highly adaptable in learning and applying new
skills, technologies, and procedures in order to manage a dynamic range of risks. Not to be
overlooked, hackers, attackers, and other threatening entities are also advancing and evolving.
Change and complexity in IT and IT norms represent new opportunities for them to succeed
in their nefarious pursuits. Consequently, information security professionals have no downtime;
there are always new risk management challenges to address.
It is against this backdrop that (ISC)2, in partnership with Booz Allen Hamilton, with the
assistance of Frost & Sullivan, conducted its sixth bi-annual worldwide survey of information
security professionals.1 This Web-based survey conducted in the fourth quarter of 2012 was
both broad in scope (more than 12,000 respondents, a 19 percent increase over the 2011
survey) and deep in its queries. In addition to producing a rich profile of this profession and its
dedication to continuous training and education, this years survey intensified its focus on the
risk and response to BYOD, cloud computing, and social media. Secure software development,
touched on lightly in previous surveys, also garnered expanded focus in the 2013 survey. This
was done in recognition that software applications are increasingly under attack. Without a
corresponding response by security professionals and the technology vendors that support
them, this soft underbelly of business and governmental entities has and will continue to be
exposed with serious consequencesdata breaches, disrupted operations, lost business, brand
damage, and regulatory fines. Secure software development, more than any other
discipline, is where the largest gap between risk and response attention by the
information security profession exists. Other notable survey findings include:
Information security is a stable and growing profession Information security
professionals are very stable in their employment; more than 80 percent had no change in
employer or employment in the past year, and the number of professionals is projected to
continuously grow more than 11 percent annually over the next five years.
(ISC)2 membership and location drive higher salaries The salary gap between
(ISC)2 members and non-members is widening. Comparatively on a regional basis, 79
percent of information security professionals in developed countries in the Americas have
average salaries of US$80,000 or more, whereas only 12 percent of respondents located
in APAC developing countries do.
1 Founded in 1989, (ISC)2 is a not-for-profit global operating organization dedicated to providing education,
certification, and peer-networking opportunities for information security professionals throughout their careers.
Frost.com
3
The Dynamically Stable Information Security CareerCONTENTS Even with past annual growth in the double-digits, workforce shortages persist
Fifty-six percent of respondents believe there is a workforce shortage, compared to two
percent that believe there is a surplus. The impact of shortage is the greatest on the
existing workforce.
Knowledge and certification of knowledge weigh heavily in job placement
and advancement Broad understanding of the security field was the #1 factor in
contributing to career success; followed by communication skills. Nearly 70 percent view
certification as a reliable indicator of competency.
application vulnerabilities rank the highest in security concern Malware
and mobile device are close seconds. Mitigating the risk from these and other security
concerns to the organizations reputation is the highest priority.
While attack remediation is anticipated to be rapid, security incident
preparedness is exhibiting signs of strain Twenty-eight percent believe their
organizations can remediate from a targeted attack within one day. Yet, with regard
to being prepared for a security incident, a doubling of the percentage of 2013 survey
respondents believe their preparedness has worsened compared to the respondents in
the 2011 survey.
Information security professionals trump products in securing infrastructure
effectiveness In a ranking of importance in securing infrastructure, software and
hardware solutions rank behind the effectiveness of information security professionals.
Security concern is high for BYOD and cloud computing Protecting sensitive
information contributes to the security concern noted in both of these IT trends. Security
concern with social media is significantly lower than in 2011 as organizations leverage existing
security technologies and policy mechanisms to manage this communication channel.
New skills, deepening knowledge, and a wider range of technologies needed
A multi-disciplinary approach is required to address the risks in BYOD and cloud computing.
With cloud computing, organizations balance the type of cloud environment with their
level of acceptable risk and ability to control risk. For example, with security concern
regarding cloud computing being high, private clouds, where the customer has greater
control in security risk management, are chosen more frequently than public clouds.
SURVEY OBjECTIVE aND METhODOLOgY
The 2013 Global Information Security Workforce Study (GISWS) was conducted in
September-December of 2012 through a Web-based survey, approximately 25 minutes in
length. The studys objective is to gauge the opinions of information security professionals
regarding trends and issues affecting their profession and careers. Designed to capture
expansive viewpoints and produce statistically significant results, a total of 12,396 surveys of
qualified information security professionals were collected. The diversity of survey respondents
is reflected in the survey respondent profiles shown on the next page.
4
Frost.com
Frost & SullivanRespondents by Membership
Respondents by job Title
Non-Members
32%
(ISC)2
Members
68%
C-Levels &
Officers
14%
Managers
Security Analysts
& All Other
34%
13%
Auditors
7%
Architects, Strategists,
& Strategic Advisors
32%
Respondents by Industry Vertical
Manufacturing
5%
Telecom &
Media
7%
Govt
Defense
10%
Govt
Non-Defense
Healthcare
4%
Other Private
Enterprise
12%
Professional &
Personal Services
21%
11%
Information
Technology
13%
Banking, Insurance,
& Finance
17%
Respondents by Company Size
(Number of Employees)
10,000 or more
43%
1-499
25%
2,500-9,999
17%
500-2,499
15%
Respondents by Region
Rest of
the World
11%
Asia
11%
Europe
21%
North America
57%
Frost.com
5
The Dynamically Stable Information Security CareerSECURITY ThREaTS aND VULNERaBILITIES, IMPLICaTIONS aND STaTE
Of REaDINESS
As reported in previous GISWS surveys, there is no lack of diversity in the threats and
vulnerabilities information security professionals are tacklingand concerned about. All of the
12 threats and vulnerabilities presented in the survey were selected as top or high concerns for
36 percent or more of the survey respondents. At the top of the list, application vulnerabilities,
malware, and mobile devices were each identified as a top or high concern by two-thirds or
more of the respondents.
THREAT AND VULNERABILITY CONCERNS
(TOP AND HIGH CONCERNS)
Application Vulnerabilities
Malware
Mobile Devices
Internal Employees
Hackers
Cloud-based Services
Cyber Terrorism
Contractors
Hacktivists
Trusted Third Parties
Organized Crime
State Sponsored Acts
69%
67%
66%
56%
56%
49%
44%
43%
43%
39%
36%
36%
Greater examination of Bring Your Own Device (BYOD), including mobile devices, cloud
computing, and social media, and their security implications and how information security
professionals are responding, is included later in this paper. Secure software development, the
upfront means to lessen application vulnerabilities, will also be examined later in this paper.
Focusing deeper into the responses on threats and vulnerabilities reveals that concern
severity varies.
Some perspectives change over time Comparing this years survey to the 2011
results, the level of concern is fairly stable. However, there was a notable increase in
cloud-based services. Compared to the 49 percent of respondents that view cloud-based
services as either a top or high security concern in the 2013 survey, 43 percent viewed
it as a top or high security concern in the 2011 survey. We believe this increase follows
the increased adoption of cloud-based services over the two-year period since the last
survey, combined with the resilient security concerns, real and perceived, associated with
cloud-based services.
C-levels and officers rated nearly all threat and vulnerability categories
higher than respondents in other job titles This was most notable in application
vulnerabilities and mobile device security. Top or high concern was selected by 72 percent
of C-levels and officers for application vulnerabilities and 70 percent for mobile devices.
Size and anxiety is correlated In all threat and vulnerability categories, the average
level of concern increased as company size increased. Perhaps the bigger the company is,
the more resources it devotes to examining these threats and through that examination,
gains a more comprehensive and realistic appreciation of risk and risk implications. Also,
6
Frost.com
Frost & Sullivanfrom the greatest gain for the effort mentality, larger companies represent more lucrative
targets for attackers and hackers, thus contributing to a higher level of concern among
large company respondents.
Vertical equates to variability The nature of a companys business and operations
also has implications on being a target and with that, variation in concern. No surprise,
respondents in the banking, insurance, and finance verticals, with their possession and
use of valuable and exploitable personally identifiable and financial information, view
the threats posed by hackers, hacktivists, and organized crime higher than the majority
of other verticals. Government respondents, also not a surprise, view the threat of
state-sponsored acts and cyber terrorism as a greater security concern (i.e., choosing top
or high concern) over private enterprises by more than 20 percentage points in each of
these threat categories.
Developing countries express higher level of concern Survey respondents located
in developing countries state a higher level of concern for a majority of the threat and
vulnerability categories versus respondents in developed countries. Directly contributing
to this is that information security investments in developing countries are historically
less than the global average. This is reflected in the lower level of security certifications in
developing versus developed countries. For example, with the most popular certification
chosen by survey respondentsCertified Information Systems Security Professional
(CISSP)only 42 percent of the survey respondents located in developing countries
(members and non-members combined) had acquired and maintained this certification,
versus 71 percent of respondents located in developed countries.2
Threats and vulnerabilities have implicationsattackers are successful and vulnerabilities are
exploited. To that point, the survey asked respondents to rank their organizations priorities:
In other words, what needs to be avoided? As shown, damage to the organizations reputation,
breach of laws and regulations, and service downtime represent the top three to-be-avoided
outcomes. Also noteworthy is the high percentage of top-priority selections. For example,
49 percent of all survey respondents rated damage to the organizations reputation as a
top priority. In fact, five of the nine categories received a top-priority rating by more than
one-third of the survey respondents. Conclusion: the protect and secure activities of
information security professionals are strongly aligned with many high priorities
of their organizations.
ORGANIZATIONS PRIORITIES
(TOP AND HIGH)
Damage to the organization's reputation
Breach of laws and regulations
Service downtime
Customer privacy violations
Customer identity theft or fraud
Theft of intellectual property
Health and safety
Reduced shareholder value
Lawsuits
83%
75%
74%
71%
66%
58%
57%
49%
47%
Frost.com
7
The Dynamically Stable Information Security CareerPerhaps an indication of information security professionals improving ability to allay a subset
of outcomes, the percent of respondents in the 2013 survey selecting top or high concern
for service downtime, customer privacy violations, theft of intellectual property, and lawsuits
was down 3-5 percentage points from the 2011 survey for these categories. These reductions
notwithstanding, these categories remain high priority.
Notable variation in priority ratings among job titles, company sizes, and verticals are:
auditors aim is clear In keeping with the role of auditor, survey respondents that
chose this job title prioritize breach of laws and regulations higher than all other job titles.
Also aligned with their roles, managers and security analysts placed a higher priority on
service downtime than the other job titles.
Priority rises with company size Like security concerns, priority ratings rose with
company size.
Top priority varies among verticals, logically Sixty-three percent of banking,
insurance, and finance respondents selected damage to the organizations reputation as
top priority. In healthcare, 59 percent chose customer privacy violations as top priority.
Fifty-seven percent of construction respondents chose health and safety as a top priority,
and 50 percent of telecom & media respondents view service downtime as top priority.
With a diversity of threats and vulnerabilities to be concerned with and the need to avoid a
range of undesirable outcomes, it is logical to ask about preparedness. In a repeat of the 2011
survey, the 2013 survey requested the respondents judge their change in readiness relative
to 12 months earlier (perform better, worse, or same). The results for both surveys are
summarized in the following table.
Percent of Respondent
Performance Relative to 12 months Earlier
Better
2013 survey: 41%
2011 survey: 55%
2013 survey: 40%
2011 survey: 50%
2013 survey: 39%
2011 survey: 49%
Worse
2013 survey: 6%
2011 survey: 3%
2013 survey: 6%
2011 survey: 3%
2013 survey: 6%
2011 survey: 3%
Same
2013 survey: 53%
2011 survey: 43%
2013 survey: 54%
2011 survey: 47%
2013 survey: 55%
2011 survey: 48%
Being prepared for
a security incident
Discovering a
security breach
Recovering from a
security incident
While the majority of respondents believe that their organizations would perform better or
the same relative to 12 months earlier, there was a 10-point or more decline in the percent
of respondents believing they would perform better in the 2013 survey compared to the
2011 survey. Not as significant, but equally disconcerting about improvement in the state
2 The percent of survey respondents with certifications other than CISSP (e.g., ITIL, CISA, and Security+) was materially lower,
and the difference between developed and developing countries was less (10 percentage points difference or less).
8
Frost.com
Frost & Sullivanof readiness, twice the percentage of respondents in the 2013 survey view their readiness
has worsened in the past year as did respondents in the 2011 survey. as an indication
that membership really matters, the survey-over-survey decline in the percent
of respondents selecting better, and increase in selecting worse, was not as
profound with member respondents compared to non-member respondents.
Other noteworthy observations from the 2013 survey on these readiness categories include:
C-levels and the rank-and-file differ Respondents with C-level and officer job titles
were decidedly more optimistic on readiness; they chose perform better by a greater
percentage than respondents in all other job title categories.
Largest companies more optimistic In all three categories of readiness, a greater
percentage of the largest companies (10,000 employees or more) viewed that their readiness
had improved versus smaller companies. Reflecting the correlation between readiness and
training, and smaller companies being less optimistic on their readiness than large companies,
a greater percent of survey respondents in companies with 2,500 or fewer employees than
larger companies indicated spending on training and education increased in the past 12
months and is expected to increase over the next 12 months as well.
Battle-tested banking, finance, and insurance verticals confident they are
turning the tide Respondents in these industries chose perform better to a greater
extent than all other verticals in all three categories. Conversely, the respondents in the
less battle-tested utilities vertical chose perform worse to a greater extent than any
other vertical.
Another survey question focused on readiness is how quickly damage from a targeted attack
would be remediated. Slightly more than two-thirds of the respondents project that they could
remediate the damage from a targeted attack within a week or less. Yet, there is also a material
portion of the respondents that are unsure how long damage remediation might take.
Time to Remediate from a Targeted attack
Within a month
4%
Within two
to three weeks
9%
Longer than a month
3%
Dont
know
15%
Within
a day
28%
Within
a week
41%
as typical, C-levels voiced greater assurance on their organizations
readiness C-levels and officers chose within one day or dont know less than
respondents with job titles farther down the organizational structure31 percent and
10 percent, respectively.
Frost.com
9
The Dynamically Stable Information Security Career Smallness advantage With a less diverse and smaller spread of operations, 31 percent
of small companies (less than 500 employees) believe they can remediate in one day
and 44 percent within a week. This is a faster expectation than very large companies
(10,000 or more employees)28 percent and 39 percent, respectively. Also, respondents
in very large organizations chose dont know to a greater extent (18 percent) than small
companies (12 percent).
Experience advantage Banking, insurance, and finance verticals, plus the info tech
vertical, believe they can respond faster than other industries; 34 percent and 32 percent
of respondents in those verticals, respectively, predicted within one day to remediate.
Potentially due to highly distributed operations, respondents in the retail & wholesale and
construction verticals chose dont know at higher levels19 percent and 20 percent,
respectively. Potentially, a lack of experience in past remediation efforts influenced 20
percent of respondents in the utilities vertical to choose dont know.
PEOPLE aRE a KEY TOOL IN INfORMaTION SECURITY
With the pervasiveness, diversity, and evolution in security threats, information security
professionals use an assortment of tools. Top of the list are human aspects: management
support, qualified staff, and policy adherence, with half or greater of respondents
choosing very important for each. The next four categories also have a human aspect.
Security software and hardware are materially farther down the list of essential tools in
effective security; confirming the viewpoint that the effectiveness of security technologies is
maximized only when the trained human element is actively incorporated.
IMPORTANCE IN SECURING INFRASTRUCTURE
(VERY IMPORTANT AND IMPORTANT)
M anagement support of security policies
Qualified security staf f
Adherence to security policy
Training of staf f on security policy
Budget allocated for security
Having access to executive management
Secure software development
Software solutions
Hardware solutions
Other observations include:
89%
88%
86%
83%
80%
68%
68%
53%
61%
Compared to the 2011 survey, the average importance ratings were essentially unchanged
in the 2013 survey.
C-levels and officers indicated a higher importance on access to executives than
respondents in other job titles, indicating that these respondents believe their greatest
influence occurs at their peer level.
10
Frost.com
Frost & Sullivan As organization size increases, importance on human assets increases, whereas the
importance of hardware and software is even across company sizes.
Across industry verticals, respondents in the government place higher importance on
hardware and software solutions than the companies in the private sector.
Secure software development is viewed as more important by banking, finance,
and insurance; info tech; retail and wholesale; and telecom and media verticals.
Concentrating on select security technologies that provide significant improvement in system
and network security (those that garnered more than 10 percent of respondent selection),
two technologies were highlighted by the survey respondents for their capabilities: network
monitoring & intelligence, and intrusion detection & prevention.
TECHNOLOGIES THAT SIGNIFICANTLY
IMPROVE SYSTEM AND NETWORK SECURITY
Network monitoring and intelligence
Improved intrusion detection
and prevention technologies
Web security applications
Policy management and audit tools
75%
72%
55%
54%
Automated identity management software
45%
Other perspectives are:
Aside from the technologies shown, no other selectable technology in the survey gained
more than one percent of survey respondents votes. Other selectable technologies
included: authentication, network access control (NAC), and security incident and event
monitoring (SIEM).
There was no tangible difference in selection frequency by company size or job title.
Owing to the public-facing attribute of their businesses, Web security applications had the
greatest frequency of votes by the banking, finance, and insurance; education; info tech; and
retail and wholesale verticals. Healthcare respondents selected policy management and
auditing tools in greater numbers than respondents in other verticals.
Frost.com
11
The Dynamically Stable Information Security CareerNEED aND BUDgET fOR ThE RIghT INfORMaTION
SECURITY PROfESSIONaLS
With security staff viewed as critical in importance, it is equally important to understand the
acuteness of need, organizations ability to fund staff expansion and improvement, and the
sought-after attributes of information security professionals.
The need is present
Very few respondents view their security organizations as being over-staffed.
Nearly one-third of respondents believe they have the right number of staff, but more than
50 percent believe staff expansion is justified.
The good news is that two-thirds of C-levels, those with the greatest budgetary influence,
view their security organizations as being too few in numbers.
More midsize companies (500-2,499 employees) respondents view their organizations as
understaffed versus smaller and larger size companies.
Across industries, a greater percentage of respondents in education, healthcare,
manufacturing, and retail & wholesale verticals believe they are understaffed.
Does Your Organization Currently have the Right Number of Information
Security Workers?
The right
number
32%
Dont
know
10%
Too Few
56%
Too Many
2%
The strain of understaffing is felt greatest on the existing security workforce
greater than the overall organization, security breaches, and customers.
The reasons for an inability to bridge the need for additional information security
workers are fueled by three factors: business conditions, executives not fully
understanding the need, and an inability to locate appropriate information security
professionals. Other reasons provided by respondentssuch as economy, lack of funding or
budget, and staffing cuts or layoffswere volunteered by one percent or less of the respondents.
Across verticals, respondents in info tech view an inability to find qualify personnel as a larger
impediment to staffing than other verticals. When asked which job title experienced the greatest
workforce shortage, security analyst (chosen by 47 percent of respondents) topped the list, followed
by security engineering-planning and design (32 percent), and security auditor (31 percent).
12
Frost.com
Frost & SullivanIMPACT OF INFORMATION SECURITY WORKFORCE SHORTAGES
(VERY GREAT AND GREAT IMPACTS)
On the existing information
security workforce
On the organization overall
On security breaches
On customers
71%
56%
52%
47%
Budget availability to increase spending is strong
An increase in spending is predicted by nearly one-third of survey respondents in personnel,
training and education, and hardware and software. Slightly more than 10 percent, however,
predict a decline. This decline is more prevalent in government (approximately 19 percent
of respondents predicting declines) versus private sector (approximately 10 percent of
respondents predicting declines). More than any other private sector vertical, 35 percent of
respondents in the info tech vertical predict spending increases.
How will information security spending
change over the next 12 months?
Information security personnel
Training and education
Hardware and software
Percent of Respondents
Increase
Decrease
30%
28%
32%
12%
13%
11%
Same
59%
60%
57%
Slightly more than one-third (34 percent) of C-levels expect their spending on personnel to
increase over the next 12 months. Also, 31 percent of C-levels predict increased spending on
education and training.
Sought-after attributes in information security professionals
When examining the sought-after attributes of information security professionals,
it is not just the skills that are important. Confirmation of those skills (i.e.,
certification) and professionals engagement in peer groups (i.e., affiliations) are
also essential. The importance attached to each is examined in this section.
Skills
Across the entire survey, broad understanding of the security field was on top in terms
of importance, followed by communication skills. Technical knowledge, awareness and
understanding of the latest security threats round out the top four.
Frost.com
13
The Dynamically Stable Information Security CareerSUCCESS FACTORS OF INFORMATION SECURITY PROFESSIONALS
(IMPORTANT AND VERY IMPORTANT)
Broad understanding of the security field
Communication skills
Technical knowledge
Awareness and understanding
of the latest security threats
Security policy formulation and application
Leadership skills
Business management skills
Project management skills
92%
91%
88%
86%
75%
68%
57%
55%
Legal knowledge
42%
Respondents in the banking, finance, and insurance verticals place a higher emphasis on the
importance of broad understanding than other verticals. Info tech and government-defense
place higher importance on technical knowledge. Healthcare respondents rate communication
skills higher in importance.
Certification
Slightly more than 46 percent of all survey respondents indicated that their
organizations require certification, and among those respondents, 50 percent of
member and 39 percent of non-member indicate certification is a requirement.
Government-defense is most emphatic on this point; 84 percent state certification is required,
and a distant, but still high, second is info tech at 47 percent.
While regulations are a primary driver for certification in government-defense, that is an
anomaly. The private sector overwhelmingly (74 percent) views certification as an indicator of
competency. The correlated quality of work was the second highest reason.
REASONS FOR REQUIRING INFORMATION SECURITY CERTIFICATIONS
Employee competence
Quality of work
Regulatory requirements (governance)
Company image or reputation
Company policy
Customer requirement
Continuing education requirement
68%
53%
48%
43%
40%
40%
35%
Ethical conduct
Legal/due diligence
27%
24%
14
Frost.com
Frost & SullivanAffiliations
When asked about affiliations that matter most in career development and
resiliency, (ISC)2 was rated the highest, no surprise by (ISC)2 members (74 percent
chose extremely critical or critical), but the same is true with non-(ISC)2 members
(51 percent chose extremely critical or critical). SANS and ISACA were ranked the
next two in importance for each survey group.
CAREER CRITICALITY OF SECURITY AFFILIATIONS
(EXTREMELY CRITICAL AND CRITICAL)
66%
(ISC)2
SANS
ISACA
OWASP
IEEE
CSA Cloud
Security Alliance
32%