Great cyber security technologies need great people | Inquirer Technology

Great cyber security technologies need great people

/ 04:21 AM August 27, 2016

(The author, Michael Xie, is the founder, president and CTO of Fortinet)

As chief technology officer, my primary mandate is to develop technologies to help our enterprise customers improve their security postures. As we cross our 300-patent milestone after 16 years in the business, I am encouraged by the good progress we have made.

In recent times, however, it has dawned on me that powerful as they are, our solutions are not reaching their full potential in all the organizations where they are deployed ─ no thanks to a dire shortage of cyber security professionals to harness them.

Article continues after this advertisement

This is a global phenomenon, and we have reached a stage where cyber security manpower development cannot be put off any longer.

FEATURED STORIES

One may assume that with greater automation and the advancement of technology in general, the dependency of cyber security on human beings have fallen. The truth is quite the opposite. According to Frost & Sullivan, more manpower is needed for the following reasons:

  • More sophisticated and persistent cyber threats – The rising sophistication of cyber threats is not just to accomplish a singular goal (e.g., steal sensitive information), but to be persistent and effective over an extended period of time. To achieve these goals, evading detection and, if detected, silently adapting to either continue or reappear later are part of the hacker’s operating principles. Consequently, identifying compromises and qualifying their severity requires constant diligence and deep pockets of expertise. A high degree of talent, knowledge, and time is also needed to thoroughly root out discovered compromises.
  • Larger IT footprints – The growing ubiquity of mobile devices used for business, both corporate-issued and personally owned, and the increasing adoption of cloud services, contribute to a larger IT footprint to protect. The raft of mobile devices (manufacturers, operating systems, and models) and cloud environments (service models and providers) add to the challenge.
  • More security technologies – Evasiveness of threats and a growing IT footprint require next-generation security technologies to replace and supplement in-place technologies. With this, the security operations team has more dashboards to view, dials to turn, and alerts and reports to examine.
  • Self-inflicted wounds – No one is perfect and perfection cannot be expected in an IT world of perpetual change. Configuration errors and oversights have and will continue to occur. Similarly, end users will have lapses in judgement (e.g., clicking on an untrusted link). This means re-do and recovery will continue to be a routine part of security professionals’ activities.

In the face of the cyber security manpower shortage, the industry has made some stop-gap efforts to deal with the issue.

Article continues after this advertisement

Various organizations are developing machine learning and automation technologies that try to substitute human beings in analytical work. There are also attempts to create artificial intelligence to discover and respond to security threats.

Article continues after this advertisement

In addition, I expect the industry to continue focusing development efforts on technologies that can let businesses deploy security with minimal manpower. Such technologies include cloud-based security platforms that can help resource-lean SMBs manage or increase visibility, as well as security solutions that can be managed remotely by mobile devices.

Article continues after this advertisement

Commendable as these efforts are, they are no replacement for the flesh and blood of real IT personnel. Intelligent cybersecurity technologies can only take the place of human decision making as an initial filter (take a look at what trading algorithms have done to the modern stock market) ─ at the end of the day both artificial intelligence and human operators need to work together. Without the human element, larger and larger swaths of the world will suffer from poorly implemented cyber security ─ security tasks will be sub-optimally done, leading to greater vulnerabilities in cyber defences and inefficiently run security departments.

Michael Xie, founder, president and CTO of Fortinet. CONTRIBUTED PHOTO

Michael Xie, founder, president and CTO of Fortinet. CONTRIBUTED PHOTO

On the security technology provider front, we can expect to see more consolidation in the near term. A dearth of security practitioners will make it hard for small vendors to both develop their technology and expand headcount, putting pressure on them to merge with larger solution providers.

Article continues after this advertisement

To successfully groom cyber security talent, all stakeholders in the industry must come together – not just technology providers, but governments, regulators, educational institutions, services providers and end-users. There must be more concerted setting of the security education agenda, curriculum development and knowledge transfer, funding and internship programs. Fortinet has taken a lead in some of these areas, and would encourage other industry stakeholders to do the same.

For young aspiring cyber security professionals, it will be immensely helpful if you could reach out to the industry to signal your interest.

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

And if you aren’t sure you will make a good cyber sleuth? Just ask yourself a few questions. Did you grow up reading Agatha Christie? Do you have a natural inclination for investigation and discovery? Do you love connecting dots and reading minds? Is good triumphing over evil important to you? Do you enjoy using technology to solve everyday issues and improve lives? If you have answered yes to all these, the industry needs you.

TOPICS: Cyber security, technology
TAGS: Cyber security, technology

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.