{"id":22735,"date":"2021-04-09T08:07:00","date_gmt":"2021-04-09T08:07:00","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/closing-cyber-skills-gap-take-new-technologies-new-talent\/"},"modified":"2023-08-26T12:02:08","modified_gmt":"2023-08-26T12:02:08","slug":"closing-cyber-skills-gap-take-new-technologies-new-talent","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/closing-cyber-skills-gap-take-new-technologies-new-talent\/","title":{"rendered":"Closing The Cyber Skills Gap Will Take New Technologies In Addition To New Talent"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22735\" class=\"elementor elementor-22735\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-110599d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"110599d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d3d51ac\" data-id=\"7d3d51ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5920cfea elementor-widget elementor-widget-text-editor\" data-id=\"5920cfea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"has-medium-font-size\">The cybersecurity resources gap is no longer a problem we can solve with humans alone.<\/p>\n<p>Though the cybersecurity \u201cskills gap\u201d should be an issue of the past, it remains a problem companies across industries still struggle to solve. Even with the cybersecurity workforce gap seeing its\u00a0<a href=\"https:\/\/www.isc2.org\/Research\/Workforce-Study\" target=\"_blank\" rel=\"noreferrer noopener\">first decrease on record<\/a>, cybersecurity\u00a0professionals\u2019 workloads and tasks have only scaled up and increased in complexity amidst a rise in sophisticated, fast-moving attacks. The actual most critical gap for security teams across industries isn\u2019t a specific skill: it is the gap between the growing number of cybersecurity tasks and the personnel and expertise needed to complete them.<\/p>\n<p>Even as more individuals enter the field, a number of factors will continue to leave the cybersecurity community playing a constant game of catch up. Without solving the work-to-worker\u00a0gap, trying to solve the skills gap by hiring en masse will only make a small dent in a larger, continuous problem.<\/p>\n<p>These challenges include evolutions in external attack methods\u2014such as the rise of automated attacks and advanced threat tactics. Security teams are also dealing with accelerated transformation in workforce practices and technological infrastructure, with the widespread shift toward remote working and the adoption of software-as-a-service\u00a0and cloud platforms.\u00a0<\/p>\n<p>With these compounded challenges, the cybersecurity resources gap is no longer a problem we can solve with humans alone. Rather than work harder, and throw more humans at the problem, we need to empower them to work smarter.\u00a0<\/p>\n\n<p>To work smarter, we need to rethink the intelligence around the security tools with which we equip our professionals, and the roles new technologies can play in augmenting and expediting cybersecurity tasks. Cybersecurity professionals\u2014no matter how skilled\u2014are often using legacy tools that spit out a constant stream of alerts. As a result, many spend more than 25% of their time hunting down &#8220;false positives&#8221;;\u00a0benign activity that is mistakenly labeled as threatening, according to a\u00a0<a href=\"https:\/\/www.exabeam.com\/library\/exabeam-siem-productivity-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">recent report<\/a>. The right technology, however, can parse through this data autonomously, cutting through the noise\u00a0to foreground only the most threatening activity.\u00a0<\/p>\n\n<p>Secondly, machine-speed attacks like ransomware, which lock down entire digital ecosystems in seconds, outpace humans\u2019 ability to respond. Even the most talented analyst does not have a superhuman response time. They also need to sleep, take breaks and have weekends. We need security technology that can fight back against these threats head-on without human intervention, spotting and stopping rapid attacks in an instant before they escalate and do damage.<\/p>\n\n<p>We need technologies that not only alert security professionals, but that also allow us to get the best of human talent available. AI is perfectly positioned to meet this task. The power of artificial intelligence\/machine learning (AI\/ML) to conduct the initial triage and response of security incidents is how human teams are going to regain control.<\/p>\n\n<p>However, not all AI is created equal. Closing the gap requires a shift in focus from merely replacing humans with automation to augmenting humans with autonomous, self-learning technologies. These autonomous <a href=\"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/deploying-new-technologies-will-create-the-need-for-new-talent-so-if-you-think-tech-think-talent-too\/\" target=\"_blank\" rel=\"noreferrer noopener\">technologies<\/a> work in tandem with humans. For example, when threatening activity occurs, this AI can connect disparate events to immediately discern the full scope of the incident and recommend remediating action. Here, the human remains fully in control of the incident investigation and mitigation loop, yet they are able to start from a place of investigated action rather than initial incident evaluation\u2014or worse, incident response\u2014saving them hours.\u00a0<\/p>\n\n<p>Self-learning AI is uniquely positioned to do the heavy lifting for security professionals, thus freeing them up for high-level activities. Rather than parsing through false positives, analysts can look at fleshed out, AI-generated incident reports, then use their expertise to make high-level decisions as to what to do next.\u00a0<\/p>\n\n<p>Closing both the resources and skills gap will take more than new talent but will require embracing breakthrough technologies. The true power of self-learning AI is not in dealing with basic tasks for humans, but also supercharging their existing skillset, and often going beyond it, thus augmenting their abilities to keep pace with the speed and severity of today\u2019s threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Though the cybersecurity \u201cskills gap\u201d should be an issue of the past, it remains a problem companies across industries still struggle to solve.<\/p>\n","protected":false},"author":1105,"featured_media":19125,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[97,1492,127,287,1493,1083],"ppma_author":[3829],"class_list":["post-22735","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-artificial-intelligence","tag-cyber-skills","tag-cybersecurity","tag-iot","tag-new-talent","tag-new-technologies"],"authors":[{"term_id":3829,"user_id":1105,"is_guest":0,"slug":"marcus-fowler","display_name":"Marcus Fowler","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Marcus-Fowler-150x150.jpeg","user_url":"http:\/\/www.darktrace.com","last_name":"Fowler","first_name":"Marcus","job_title":"","description":"Marcus Fowler is Director of Strategic Threat at Darktrace, the world\u2019s leader in Cyber AI defense, and the creator of Autonomous Response technology."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/1105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=22735"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22735\/revisions"}],"predecessor-version":[{"id":31613,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22735\/revisions\/31613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/19125"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=22735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=22735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=22735"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=22735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}