recommended reading

Survey: Most IT Execs Say Their Companies Can Only Handle ‘Simple’ Cyberincidents

Maksim Kabakou/

Most corporate information security executives believe their teams can only handle “simple” incidents, like deactivating a lost phone or scanning a computer for a virus. This reflects a steady loss of confidence among corporate infosec pros in their ability to keep up with modern threats, according to a new global survey by ISACA, a non-profit group that certifies security professionals, and the RSA Conference, a series of events by security vendor RSA.

The same survey, conducted two years ago, found that 87% of respondents were comfortable with their teams’ ability to deal with security incidents. That figure dropped to 73% in the latest survey, which polled 461 information security practitioners and managers:

The survey also revealed the types of incidents that corporate infosec executives face on a daily basis. Almost a third reported dealing with phishing attacks–attempts to trick users into divulging sensitive information with cleverly disguised messages–every day. Malicious code and hacking are the other two problems that security pros grapple with daily:

Things aren’t looking up for the people charged with keeping corporate systems safe. There’s a skills gap in the infosec space, with most survey respondents saying it takes between three and six months to fill a vacancy. And even when a hire is made, respondents most frequently said that less than a quarter of those are actually qualified for the job. Companies generally provide on-the-job training to hires to get them up to speed, according to the survey.

Understaffed, underqualified, and overwhelmed security departments aren’t feeling optimistic about their ability to keep up with new technologies, and the threats these bring. A majority of respondents saw artificial intelligence posing a risk to corporate security. They were also concerned about the growth of the Internet of Things, which expands the “attack surface” available to hackers.

But Ron Hale, ISACA’s chief knowledge officer, says security managers shouldn’t be so glum. “When there’s a risk there’s a reward,” he told Quartz. “We can use AI to identify where hackers are; we can identify what incidents are occurring in a system. We can start using these systems to our benefit, rather than just relying on human judgment.”

(Image via /

By Joon Ian Wong Quartz March 8, 2016


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.