ISACA Journal
Volume 6, 2,015 

Features 

Revising Cybersecurity Skills for Enterprises 

Ivo Ivanovs and Sintija Deruma 

Cyberspace is a virtual environment. Today, it does not matter which device is used for connecting to the Internet. Millions of users are there—in that virtual place—conducting day-to-day activities such as communicating, shopping, paying bills, searching for information, reading news, doing business, and controlling or managing something.

Cybersecurity is the ability to protect or defend the use of cyberspace from cyberattacks1 and is defined as the protection of information assets by addressing threats to information processed, stored and transported by internetworked information systems.2

Main Challenges for Cybersecurity

The main challenges faced by governments attempting to enhance their cybersecurity capability and, by doing so, ensuring reliable and properly protected information resources are:

  • The increased importance of the national coordination of information and communications technology (ICT)
  • Cooperation between the public and private sectors
  • International cooperation
  • Reinforced incident response
  • Effective crime control
  • Critical infrastructure protection

The development of democracy and social networks has expanded the virtual environment and turned it into an effective collaborative platform for municipalities, governments and politicians, as well as criminals who do not respect national borders. These criminals are called by different names, based on their motivations and competencies, including terrorists, hackers and other attackers.

The positive impact of this virtual world on democratic processes, driven by active participation of the population, is indisputable. It includes education possibilities and information exchange using cyberspace. However, the dark side of it cannot be ignored. Data thieves are professional criminals deliberately trying to steal resources and information utilizing lack of competence by users and sometimes even those who should protect the users.

The UK report Cyber Security Skills: Business Perspectives and Government’s Next Steps3 makes clear that having the skills and capabilities to manage cyberrisk effectively can reduce the financial cost to a business from cybercrime, and it can also increase consumer confidence, providing that business with a competitive edge. As businesses increasingly take steps to protect themselves from cyberattacks, demand for cybersecurity products and services will continue to increase, providing growth opportunities for the organizations that supply them. A highly skilled workforce will enable cybersuppliers to derive maximum benefit from these opportunities.

Cyberthreats have the power to drive up costs and affect revenue for companies, making them similar to any other financial risk. What organizations need are practical tools to mitigate this risk.4 Larry Clinton, Internet Security Alliance (ISA) president, said, “We need to connect the dots between the operational issues and the strategic issues which is what businesses focus on.”5

People and Skills—Preparing for Cybersecurity

Cybersecurity is a long-term trend in which information assurance, risk approach by default, and privacy by design indicate the evolution of information security and give broader understanding of cyberspace.6

Cybersecurity skills are key elements of an organization’s preparedness to address cyberrisk.

Thus, in the field of cybersecurity, ability, knowledge and skills are essential for business survival in the virtual world and in the economy of tomorrow.

The recently released study, State of Cybersecurity: Implications for 20157 by ISACA and RSA, reveals that 82 percent of organizations expect to experience a cyberattack in 2015, yet more than one in three (35 percent) are unable to fill open cybersecurity positions.8

The lack of cybersecurity professionals is a vulnerability in the three lines of defense.

The three lines of defense concept means collaboration and better understanding of how to manage risk to an acceptable level. The first line of defense is responsible for day-to-day activities—monitoring and protecting information assets. The second line of defense is responsible for governing those tasks and ensuring that information assets have applicable monitoring, reporting and tracking; and the third line of defense is responsible for ensuring compliance.

In this case, soft skills for risk managers; auditors; process, information and system owners, including information security managers, are needed to resolve problems more creatively to assure the confidentiality, integrity, availability and accountability of an organization’s information assets.

Cybersecurity will continue to pose a serious risk, of which top management needs to be aware, measure and supervise continuously. This process should be a part of the company’s strategy, and top management plays a strategic role in implementing the cybersecurity culture.

The motivation of hackers ranges from individuals testing their skills to break into the US National Aeronautics and Space Administration (NASA) systems to well-organized criminal enterprises hacking for profit to intrusions sponsored by foreign intelligence services.9

The comparably small size of certain governments, for example, Latvia, to other European Union (EU) member-states combined with the small size of the companies operating in these smaller countries are two of the main challenges to developing and maintaining skilled cybersecurity resources to fight cybercrime, which, in fact, can be a well-organized, multinational business with strategy, processes and quality management, a dynamic infrastructure, robust cash flow, and highly-skilled professionals.

This situation is worsened by the job market in which leading security services companies aggressively cherry-pick cybersecurity specialists by offering lucrative compensation packages along with intensive training for skills development. Cybersecurity employees with years of faithful employment at small, regional banks, universities and state governments get employment offers they simply cannot refuse. Panic ensues at many organizations when they lose security professionals who, more or less, owned the organization’s informal incident detection and response processes.10

A better understanding cyberecosystem elements, their relationships and main performance drivers makes it possible to plan and develop effective cybersecurity readiness, even within the limited resources and capabilities of small enterprises.

Cyberdefense requires short-term and long-term solutions for cybersecurity professionals in obtaining knowledge in different dimensions, including:

  • Cybersecurity for computing professionals (e.g., computer science, software engineering)
  • Cybersecurity for society (policy creators and decision-makers)
  • Cyberdefense for operations

To strengthen the security of information resources, proactive behavior is no longer sufficient to safeguard the critical resources in the organization. Organizations need to go further; they need to reengineer the behavior, attitudes and knowledge of all stakeholders, including those outside the organization (e.g., customers, suppliers). It is obvious that all kinds of Internet users, regardless of their age, business area and confidence, should expand their knowledge.

This leads to the conclusion that the main drivers toward reasonable cybersecurity are human resources—the capabilities for which can be developed as follows:

  • Establish new professions
  • Develop education curriculum
  • Reengineer security awareness programs
  • Reengineer mind-sets

The mind-set of the cybersecurity professional is a very important factor in preventing, detecting and mitigating security breaches. Developing this way of thinking must be part of recruiting and educating cybersecurity professionals,11 recalling the similarity with opposite forces in which the mind-set of the hacker is the main advantage in distinguishing the good and not-so-good hacker.

The core competencies cybersecurity managers must possess include:

  • Plan, organize, direct, control and evaluate the operations of cybersecurity management systems, formulating strategies, policies and plans, and security architecture taking into account the legal and ethical issues of cybersecurity.
  • Plan, organize, control and continually evaluate risk management procedures.
  • Direct and advise staff engaged in providing holistic information security management integration and establish security awareness training.
  • Direct and control corporate governance and regulatory compliance procedures, incident handling, and management.
  • Plan, administer and control security requirements for projects, contracts, equipment, services, inventory skills and competencies for related professionals.
  • Accept the responsibility for processes associated with business contingency and disaster recovery planning.
  • Prepare reports and briefs for management committees evaluating the cybersecurity ecosystem.

The Skills Framework for the Information Age (SFIA)12 is a logical, two-dimensional skills framework defined by areas of work on one axis and levels of responsibility on the other. It has been proven to be an effective resource that benefits businesses by facilitating all aspects of the management of capability in corporate and educational environments.13 Further, the US National Initiative for Cybersecurity Education (NICE) provides a common understanding of and lexicon for cybersecurity work, defined as the capabilities critical for successful job performance across cyberroles and the behaviors that exemplify the progressive levels of proficiency associated with these competencies.14

People, Not Technology, Are Key Elements of Cybersecurity

The 2013 (ISC)2 Global Information Security Workforce Study15 was conducted in 2012 through a web-based survey.

The study’s objective was to gauge the opinions of information security professionals regarding trends and issues affecting their profession and careers. Designed to capture expansive viewpoints and produce statistically significant results, a total of 12,396 surveys of qualified information security professionals were collected.

With security staff viewed as critical in importance, it is equally important to understand the acuteness of need, organizations’ ability to fund staff expansion and improvement, and the sought-after attributes of information security professionals. When examining the sought-after attributes of information security professionals, it is not just the skills that are important. Confirmation of those skills and professionals’ engagement in peer groups are also essential.

The 2013 (ISC)2 Global Information Security Workforce Study respondents ranked success factors of professionals in order of importance as shown in figure 1.

Across the entire survey, broad understanding of the security field was on top in terms of importance, followed by communication skills; technical knowledge, awareness and understanding of the latest security threats round out the top four. While skill and knowledge building must never slow down—attackers, hackers and other cyberthreat actors certainly will not—information security professionals must also translate their risk management expertise into organization-wide leadership.

Conclusion

When taking into account the aforementioned frameworks and the demand in the market for new cybersecurity professionals, it can be concluded that good technical knowledge of cybersecurity alone is not enough to establish effective cybersecurity and broader understanding of the business and human management principles. Strategic skills are equally important, especially in smaller organizations that cannot afford narrow specialization of their resources.

Endnotes

1 National Institute of Standards and Technology, NIST IR 7298 Revision 2, Glossary of Key Information Security Terms, USA, 2013
2 ISACA, Cybersecurity Fundamentals Glossary, USA, 2014, www.isaca.org/Knowledge-Center/Documents/Glossary/Cybersecurity_Fundamentals_glossary.pdf
3 Department for Business, Innovation and Skills, Cyber Security Skills: Business Perspective and Government’s Next Steps, United Kingdom, March 2014, www.gov.uk/government/uploads/system/uploads/attachment_data/file/289806/bis-14-647-cyber-security-skills-business-perspectives-and-governments-next-steps.pdf
4 Ayers, E.; “Public-private Push to Improve Boards’ Cyber Readiness,” Cyber Risk Network, 2014, www.cyberrisknetwork.com
5 Ibid.
6 Deruma, S.; Problems and Solutions of Information Security Management in Latvia, SHS Web of Conferences, vol. 10, 2014, www.shs-conferences.org/articles/shsconf/pdf/2014/07/shsconf_shw2012_00007.pdf
7 ISACA and RSA Conference, State of Cybersecurity: Implications for 2015, 2015, www.isaca.org/cyber/pages/state-of-cybersecurity-implications-for-2015.aspx
8 Ibid.
9 Martin, P. K; “Hackers Had ‘Full Functional Control’ of NASA Computers,” BBC News, 8 March 2012, www.bbc.com/news/technology-17231695
10 Oltsik, J.; “Cybersecurity Skills Shortage Panic in 2015?” Networkworld, 9 December 2014, www.networkworld.com
11 McGettrick, A.; Toward Curricular Guidelines for Cybersecurity, Report of a Workshop on Cybersecurity Education and Training, Association for Computing Machinery, 30 August 2013, www.acm.org/education/TowardCurricularGuidelinesCybersec.pdf
12 SFIA Foundation, Skills Framework for the Information Age, UK, www.sfia-online.org/
13 Ibid.
14 National Initiative for Cybersecurity Education, USA, http://csrc.nist.gov/nice/
15 Frost & Sullivan, The 2013 (ISC)2 Global Information Security Workforce Study, USA, 2012, www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/2013-ISC2-Global-Information-Security-Workforce-Study.pdf
16 Ibid.

Ivo Ivanovs works at EY EMEIA Information Security Advisory Centre, specializing in information security and data protection for companies in Eastern Europe. Ivanovs is also vice president of the ISACA Latvia Chapter.

Sintija Deruma, Education Chair of the ISACA Latvia Chapter, leads the BA School of Business and Finance’s (Riga, Latvia) new master’s degree program in cybersecurity management, the first such program in Latvia. This full-time master’s program concentrates on the cybersecurity management domain and combines core cybersecurity management skills with a master’s of business administration and Certified Information Security Management (CISM)-related curriculum tasks.

 

Add Comments

Recent Comments

Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and from opinions endorsed by authors’ employers or the editors of the Journal. The ISACA Journal does not attest to the originality of authors’ content.