SlideShare a Scribd company logo
1 of 14
Download to read offline
Sizing the Cyber Skills Gap: A White Paper
by
Stephen Cobb, CISSP
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
2
About the Author
Stephen Cobb has been researching information security and data
privacy for more than 25 years, providing advice and guidance to
companies, consumers, non-profits, and government agencies. His first
book on computer security was published in 1991 and became part of the
industry’s Common Body of Knowledge. In 1996, Cobb was one the first
people to obtain the Certified Information Systems Security Professional
qualification. He published a primer on privacy for business in 2002 and
has contributed numerous chapters to information security texts. As an
Adjunct Professor at Norwich University, Cobb taught Masters level
classes in Information Assurance, many of which were based on
curriculum material co-authored with Chey Cobb, his partner of 30
years. Peer-reviewed works by Cobb include a paper on government use
of malicious code presented at the 6th International Conference on
Cyber Conflict in Estonia, one of a dozen countries to which he has been
invited as a conference speaker. Cobb currently coordinates a team of
researchers at the North American headquarters of ESET, the Slovakia-
based internet security software company. Cobb is also working on his
Master of Science in Security and Risk Management in the Criminology
Department of the University of Leicester in England. This paper is a
by-product of his studies at Leicester, which are funded in part by
ESET's generous commitment to further education for all employees.
stc16@student.le.ac.uk
www.zcobb.com
www.cisosurvey.org
www.linkedin.com/in/stephencobb
www.welivesecurity.com/author/scobb
@zcobb
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
3
Sizing the Cyber Skills Gap: A white paper
Stephen Cobb, CISSP
Abstract: This white paper evaluates claims that there are not enough people in the
world with the necessary cybersecurity knowledge, skills, and abilities to meet
current demand. Frequently quoted estimates of this global “cyber skills gap” range
from 1 million today, to 1.5 million by 2020. If accurate, these numbers have serious
implications for the work of securing and defending the information systems upon
which so much of modern life depends. The origins of these numbers and their
plausibility are thus worthy of examination. The root causes of this alleged gap are
not discussed, nor are the efforts to close it, although suggestions for further
research are presented. The paper concludes that a significant cyber skills gap does
exist and can be modeled.
1. INTRODUCTION
Whether you are in charge of the security of your organization’s data and systems, or working in IT
security, or maybe just looking for a career, it is hard to ignore headlines like this one in Forbes
earlier this year: “One Million Cybersecurity Job Openings In 2016” [1]. The article cites multiple
studies that suggest there is a significant global shortage of skilled information system security
professionals, a 'cybersecurity skills gap' if you will (shortened to ‘cyber skills gap’ in many reports
and in this white paper). If there is a cyber skills gap and it is that big, then there are several serious
implications for cybersecurity:
1. Efforts to defend information systems against criminal hackers are being undermined
because organizations are under-staffed, either numerically, or qualitatively, or both [2].
2. The supply of the cybersecurity-skilled humans needs to be increased.
3. The underlying causes of the shortage of cybersecurity-skilled personnel need to be
understood and addressed.
Fortunately, numerous initiatives are underway to address points #2 and #3 (some of them are
discussed in a paper the author is presenting later this year [3]). There is no doubt that cyber security
education and recruitment efforts are receiving more and more funding [4] [5] [6]. However,
whether or not those efforts will be enough to close the gap is not the subject of this paper. The paper
also avoids discussion of what may have caused a gap although possible causes are listed in Appendix
B. The paper simply seeks to answer these questions: How true is that Forbes headline and others
like it? Does the world really need one million more cyber skilled workers than currently exist?
Why Question the Numbers?
One good reason for questioning numerical claims relating to cybersecurity headlines is the sad
reality that, historically speaking, the computer security industry does not have the best track record
when it comes to quantification. Taber was probably the first to alert the industry and the world to
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
4
this “number problem” in his landmark 1980 Computer/Law Journal article “A Survey of Computer
Crimes Studies” [7]. From the confusion created by early SRI studies in the 1970s that conflated
computer abuse and computer crime, to the $1 trillion cost of cybercrime cited by President Obama
[8], the industry has been a frequent source of suspect numbers [9]. Some numbers, like “five million
PCs infected with the Michelangelo virus,” [10] have often been repeated as fact by an unsuspecting
and often overeager press, and bent to the will of vendors and politicians. Sadly, Taber was largely
ignored and over the decades the industry has spawned numerous baseless data memes, such as the
80/20 rule of insider/outsider computer crime [11]. It certainly seems prudent to subject the million-
person cyber skills gap to scrutiny.
There can be little doubt that many organizations today are finding it hard to fill cybersecurity
positions and tap cybersecurity expertise. For example, in a 2016 global survey of IT spending, 46
percent of enterprises said they have a “problematic shortage” of cybersecurity skills [12]. A 2016
Spiceworks study found that 59% of businesses with fewer than 500 employees had no access to a
security expert (not internally, nor externally via third-party contractor or managed security
provider) [13]. In its 2015 Global Cybersecurity Status Report, ISACA revealed that 86% of
information security managers interviewed believe there is a shortage of skilled cybersecurity
professionals [14]. But do these opinions really amount to a cyber skills gap, and if so, how wide is it?
THE ONE MILLION GEEK GAP
The oft-cited million-person cyber skills gap appears to have its origins in a section of the Cisco 2014
Annual Security Report, also known as the 2014 CASR [15]. The section was titled “The Security
Talent Shortage and Solutions Gap” and it stated the following: “It’s estimated that by 2014 the
industry will still be short more than a million security professionals across the globe.” This sentence
sounds odd in a 2014 report because it seems to talk about 2014 as the future, implying that the
shortage had reached the one million mark some period prior. Also curious is the lack of a footnote
or other source for this number (despite the report having more three dozen endnotes). These
oddities did not prevent “one million” being picked up and repeated, not only by journalists and
industry experts [16] [17] but also by Cisco itself.
In 2015, the company published a document titled Mitigating the Cybersecurity Skills Shortage
[18]. The first paragraph states: “Cisco estimates there are more than 1 million unfilled security jobs
worldwide.” This time there is a footnote and it points to Cisco Security Capabilities Benchmark
Study (Cisco, Oct. 2014). Tracking down this study is not easy, but it appears to be reported in a
section of the Cisco 2015 Annual Security Report titled “Cisco Security Capabilities Benchmark
Study” [19]. Unfortunately, there is no reference to a shortage of information security professionals
in that section, or indeed that entire report. So where did Cisco get the notion that the 2014 global
shortfall of security professionals was 1 million?
Getting to One Million
In the United States (US), concern about a cyber skills gap originated within federal government
circles, most notably the military. The Air Force added cyberspace to its mission statement in 2005
which now reads: “to fly and fight in Air, Space and Cyberspace” [20], and in 2006 the 8th Air Force
was designated the service’s new cyberspace command, “focused on taking the fight against terrorism
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
5
to the technological realm” [21]. In 2008 the DoD recognized cyberspace as a warfighting domain in
need of appropriately trained cyber warriors [22]. The need to recruit for cyber roles in the military,
both attack and defense, produced numerous studies pertinent to the skills gap and these will be
discussed later in the Virus Bulletin paper mentioned earlier [3].
Recognizing the need for a federal cybersecurity strategy beyond the military the non-partisan non-
profit Center for Strategic and International Studies (CSIS) created the “CSIS Commission on
Cybersecurity for the 44th Presidency.” In December of 2008 the commission published a report
listing 25 recommendations, the 24th of which was: “Conduct Training for Cyber Education and
Workforce Development” [23]. However, the Commission left no doubt that the cyber skills gap was
an urgent concern:
“The cyber threat to the United States affects all aspects of society, business, and
government, but there is neither a broad cadre of cyber experts nor an established cyber
career field to build upon, particularly within the Federal government.” [21]
In April of 2009, Defense Secretary Robert Gates, speaking at the Air War College about the need to
“increase the throughput of training of experts in cyber” admitted that: “We are desperately short of
people who have capabilities in this area in all the services and we have to address it.” [24] This was
picked up by the New York Times in a May, 2009 article titled: “Cadets Trade the Trenches for
Firewalls” [25].
CSIS continued studying this problem and in July of 2010 published a 50-page analysis starkly titled:
A Human Capital Crisis in Cybersecurity [26]. This report included the following statement from
the founding Director of the CIA’s Clandestine Information Technology Office: “There are about
1,000 security people in the US who have the specialized security skills to operate effectively in
cyberspace. We need 10,000 to 30,000.” The CSIS report went on to describe the problem as one
both of depth and breadth, quality as well as quantity:
“We not only have a shortage of the highly technically skilled people required to operate and
support systems already deployed, but also an even more desperate shortage of people who
can design secure systems, write safe computer code, and create the ever more sophisticated
tools needed to prevent, detect, mitigate and reconstitute from damage due to system
failures and malicious acts.”
In January of 2009 another nonprofit organization, the nonpartisan Partnership for Public Service,
had begun studying the cyber skills shortage. Supported by government contractor Booz Allen
Hamilton, the researchers talked to “69 officials from 18 departments, agencies, subcomponents” to
produce Cyber IN-SECURITY: Strengthening the Federal Cybersecurity Workforce [27]. This
report contained some sobering findings: CISOs and CIOs in a wide range of government agencies,
not just those in the defense realm, said it was hard to find enough good applicants for cybersecurity
openings. Furthermore, and perhaps even more worrying, researchers found:
“…there is no strategic government-wide assessment of the current state of the cybersecurity
workforce, its size, strengths and weaknesses. There is no federal plan projecting how many
cybersecurity specialists will be needed next year or in the next five years to meet individual
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
6
agency and government-wide needs, what skills and certifications they should possess, how
they should be trained, or how they should be recruited into federal service.”
While there has been progress since 2009 on some of these issues, the Cyber IN-SECURITY report
struck several chords that would resonate over the next seven years, such as differences in opinion
between CIOs and CISOs on the one hand, and the Human Resources (HR) departments charged
with finding cyber-skilled employees for them on the other. HR tended to be pleased with its efforts
at finding candidates, but the CIO/CISO view was much less flattering. For example, only 30% of the
latter said that they were satisfied with the number of applicants supplied by HR, whereas HR was
45% satisfied.
Vested Interests?
The Cyber IN-SECURITY study put the federal cyber skills shortage on the map and, by the end of
2009, the problem was being reported by mainstream media and popular technology journalists like
Brian Krebs [28]. Cyber IN-SECURITY also highlighted the government’s over-reliance on the
private sector for data about cybersecurity (the report itself was not commissioned or funded by the
government). The author has discussed the downsides of such over-reliance elsewhere [9]. To
summarize, it creates a risk that politicians who are looking for reasons not to increase funding for
government activities – like fighting cybercrime or investing in cyber workforce development – may
find it convenient to discount arguments that are based on data from entities who stand to gain from
that increased spending. Such entities include cybersecurity contractors, vendors, consultants, as
well as educational institutions and certification organizations.
For example, any research that shows a need for more cybersecurity education and certification can
be seen as benefiting those who generate revenue by meeting that need, whether they are for-profit,
like Phoenix University and SANS Institute, or non-profit like Norwich University and CompTIA.
This observation does not imply that the ethics or integrity of any entity are necessarily suspect, but
unfortunately the information security industry is no stranger to exaggerations that have
undermined valid messaging about legitimate concerns, sometimes to the detriment of security (for
example, claims that outsider threats had outpaced insider threats in the late 1990s, claims that were
beneficial to firewall vendors, arguably led to complacency about insiders). There is a strong case for
saying that, when it comes to public policy debates, the use of data generated by objective agencies is
better for policymaking than relying on commercial entities for data. That said, there are valuable
insights to be gained from data created outside of government, particularly if it is used carefully, and
especially if it has been subjected to peer review.
Workforce Studies
Beyond the government and military, the cyber workforce in general has arguably been experiencing
a skills gap for some time. Consider the sixth edition of the Global Information Security Workforce
Study (GISWS), a study that has been produced biennially for many years by one of the largest non-
profit cybersecurity certification organizations, (ISC)2. This worldwide survey of more than 12,000
information security professionals, conducted in the fourth quarter of 2012 in partnership with Booz
Allen Hamilton, and with the assistance of Frost & Sullivan, found that:
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
7
“Even with past annual growth in the double-digits, workforce shortages persist – 56% of
respondents believe there is a workforce shortage, compared to 2% that believe there is a
surplus [29].”
The report went on to make an important point to which CISOs and their IT security staff can surely
attest: “The impact of shortage is the greatest on the existing workforce.”
Early in 2014 the RAND Corporation think tank weighed in on the global cyber skills gap with a
report titled H4ckers Wanted: An Examination of the Cybersecurity Labor Market [30]. Containing
a useful review of previous studies, including some of those mentioned above, this report looked at
numerous government initiatives to address the cyber skills gap, programs set in motion since
alarms were raised in 2008. Most notable among these is the National Initiative for Cybersecurity
Education (NICE), an interagency effort coordinated by the National Institute of Standards and
Technology (NIST) “to improve the nation’s cybersecurity education, including efforts directed at the
federal workforce” [31]. RAND also reviewed fluctuations in enrollment in computer science degree
programs and the role of the NSA in promoting Centers of Cyber Excellence.
Somewhat surprisingly, the RAND report’s recommendations amounted to ‘steady as she goes.’ This
perspective was based in part on RAND’s analysis of the economics of labor markets. RAND
concluded that, given the existing government programs, market forces would remove the cyber
skills gap over time. Unfortunately, that time was put at 5 to 10 years, and RAND seemed unaware
that a timeframe like that is of little practical help to those charged with protecting organizations
from cyber threats today.
Just as worrying was another factor in RAND’s analysis, explained like this: “By then [meaning the 5-
10 year timeframe] the current concern over cybersecurity could easily abate, driven by new
technology and more secure architectures.” While the majority of information security professionals
would welcome such developments – many have other interests they would like to pursue – relying
on “new technology and more secure architectures” to solve the cybersecurity problem is hardly a
practical strategy. The impact of unchecked cyber crime and conflict in the interim has to be
acknowledged, with its potential to erode trust in digital technology, cripple critical infrastructure,
and generally retard economic growth.
Sadly, but perhaps predictably, no evidence for RAND’s optimism was to be found in the 2015
GISWS; this edition of the study reported that the “information security workforce shortfall” was
growing wider [32]. The percentage of respondents who said that their organizations had too few
information security professionals had risen to 62%, from 56% in the 2013 survey. As for the
economics of the labor market, responses to a variety of questions in this study led researchers to
conclude this hiring shortfall was “less about money” and more about “an insufficient pool of suitable
candidates”.
For many years, research consultants Frost & Sullivan assisted (ISC)2 with the GISWS. In 2015,
based on analysis of that data and their in-house tracking, Frost & Sullivan predicted that by 2020
the cyber skills gap would be 1.5 million. This number was described as “the difference between Frost
& Sullivan’s projection of the workforce needed to fully address escalating security staffing needs and
our workforce projection that accounts for workforce supply constraints (e.g., a tightening labor
market among security professionals)” [32].
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
8
CONCLUSIONS AND IMPLICATIONS
Does that mean we have now reached Cisco’s 1 million mark? This paper concludes that yes, it is
entirely plausible that, in order to secure its digital information systems, the world needs to 1 million
more people than are currently available. Here are some more data points that support this assertion.
In 2015, a news organization at the Stanford Journalism Program reported that, based on their
analysis of Bureau of Labor Statistics, at least 209,000 cybersecurity jobs in the US were unfilled
[33]. Their analysis also showed cybersecurity job postings rising rapidly – “up 74% percent over the
past five years.” That equates to a year-on-year growth rate of 15% in unfilled positions, which is
consistent with numerous surveys of industry hiring intentions.
Rounding down to 200,000 unfilled cybersecurity jobs in the US produces a number that is quite
plausible relative to other stats, some of which are modeled in a spreadsheet in Appendix A. That
200K figure also extrapolates convincingly to 1 million globally. Although the US is one of the
heaviest users of information systems, it arguably accounts for a lot less than one fifth of the global
total of digital technology users, a useful metric for estimating the amount of cybersecurity work that
needs to be done. The consequences of not getting that work done are beyond the scope of this paper,
but it seems reasonable to assert that multiple aspects of the current situation urgently require
further research (and one might argue that this assertion would be equally valid if the gap were found
to be half a million and not a whole million).
Below are suggested topics for further research (some of which may be the subject of current but as
yet unpublished research). The author hopes to revisit the literature next year to review any progress
in these and related areas.
One urgent area for action, not just research, is the improvement of hiring practices for cybersecurity
roles. Despite the size of the cyber skills gap, the author is occasionally aware of individuals skilled in
cybersecurity who are unemployed or underemployed. The causes of this situation, one of which
appears to be immature cybersecurity hiring practices within organizations [34] [35], require urgent
study and remediation.
Suggestions for Further Research:
• How are organizations coping with the shortage of qualified applicants for cybersecurity
vacancies?
• What is the impact of understaffing on the cybersecurity of organizations?
• Can market forces solve close the cyber skills gap or is there a limit to the ability of higher
salaries for cybersecurity roles to draw enough suitable entrants into the field?
• How should “suitable entrant into the field” be defined, in terms of Knowledge, Skills, and
Abilities (KSAs) or is there more, like aptitude, personality, or even g? [3]
• Can cybersecurity roles be made more appealing within society, perhaps as public service
calling or the work of heroes? [36]
• What is the basis of job satisfaction in cybersecurity and is it sustainable?
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
9
Sizing the Cyber Skills Gap
APPENDIX A: MODELING THE GAP
This appendix addresses those who may be skeptical of the claim that there is a global cyber skills
gap of one million people. A model of cybersecurity employment is presented to test how realistic a
US gap of 200,000 appears in relation known good data. (This appendix does not investigate the
paper’s assumption that the US makes up one fifth of that one million.)
Skepticism is understandable when you look at some possible indicators of a skills gap such as job
listings. The large job aggregator indeed.com does not list anything like 200,000 cyber openings. It is
tempting to ask if there are even that many cyber jobs in the US, filled or otherwise. The answer is
yes there are, or at least it appears that there could be, if you apply a series of assumptions to Census
Bureau data about the US workforce. The spreadsheet below is an attempt to do that and the results
are roughly as follows: an appropriate size for the cyber skilled workforce is 600K, so a shortfall of
200K exists if 33% of positions cannot be readily filled at any given time (a percentage in line with
numerous surveys).
Whether or not this model is found acceptable depends upon the reasonableness of its assumptions
and the starting point. The latter is a US Census Bureau report: “Number Of Firms, Number Of
Establishments, Employment, And Annual Payroll By Enterprise Employment Size For The United
States And States, Totals: 2013.” All of the numbers in bold are from that report, which lists how
many people were working in the commercial sector, that is non-governmental, non-farm jobs,
broken down by size of employer entity.
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
10
The number of employees per entity can be calculated as an average until you get to entities of 500
employees or larger. The averages in C4 through C14 are ‘best fit’ based on the total entity number in
the >500 category (18,636) and the total employment for that group (118,266,253, which the model
misses slightly). For the very largest companies the numbers are based on percentages of their
workforce in the US (the largest being Walmart). The number of 21,732,000 for government
employment is all state and federal, including educational and the USPS, as provided by the Bureau
of Labor Statistics. Total US employment in this model is just under 140 million, a number that is
frequently cited from non-farm employment.
Columns E and F show the assumptions made about cyber workers per entity and cyber workers per
employee. For entities under 100 employees it is assumed that there will be one cyber worker for
each 500 employees. Many smaller companies lack the resources to have a dedicated cybersecurity
employee and leverage the expertise of vendors, consultants, or Managed Service Providers. In the
next largest category (100-499) it seems reasonable to assume a couple of cybersecurity staff as an
average across the range. As company size increases there are economies of scale and fewer cyber
skilled folks per 1,000 employees.
For the government numbers, the calculations were performed differently. If one assumes one cyber
skilled position for every 250 government/military/postal employee then resulting need is for 86,928
people. Time and resource constraints did not permit a more detailed breakdown than this, but it
should be possible. Given the high level of demand and recruitment for cyber positions in the armed
forces, and intelligence agencies, that seems reasonable (there are over 100,000 employees across
the Intelligence Community alone – CIA, NSA, National Reconnaissance Office, and the intelligence
offices tucked within the Departments of State, Justice, Treasury, and Homeland Security).
Clearly one can argue with some of these assumptions. For example, some of the ratios may be
unrealistic. Not every 200 person company is going to have two cybersecurity employees. On the
other hand, the model does not take into account the much higher ratios in security companies
(vendors, consultants, service providers), where one out of three positions may require cyber skills.
One could argue that not all jobs require the use of employer information systems, but it is hard to
deny that just about every employee has access to at least one very powerful information system,
their smartphone. On balance, this spreadsheet is a useful start. With appropriate resources a much
more sophisticated model could, and probably should, be developed.
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
11
Sizing the Cyber Skills Gap
APPENDIX B: CAUSES OF THE CYBER SKILLS GAP
A cyber skills gap exists, but why? The paper does not address this question, but it is an important
one, examination of which could provide insights that are useful to efforts to close the gap. This table
presents some possible causes. Note that these are not referenced and some are purely anecdotal, but
some links to further reading are provided. Also note that some of the issues are being addressed
today, but lack of attention in the past may have contributed to current shortage.
Cyber Skills Gap: Informal Outline of Possible Contributing Issues
Pipeline Issues Hiring Issues Retention Issues
• Lack of awareness of cyber
as a career
• Cyber does not appeal to
everyone as a career
• Not enough cyber career
role models (particularly for
women and minorities)
• Social status of cyber
defenders below that of
attackers and makers
• Not enough people have
what it takes to be good at
cybersecurity
• Lack of educational
opportunities for cyber
• Unrealistic demands in job
descriptions (laundry list)
• HR not clear on cyber roles
and appropriate KSAs
• Inappropriate qualification
demands (CISSP for Analyst)
• Picky employers (no
smokers, no color blind, no
buns or beards)
• Some employers refuse or
resent appropriate levels of
compensation
• Can be a thankless job
• Management lacks enough
understanding of cyber to
recognize good work
• Too much blame, not
enough appreciation
• Burn out can lead to career
switching
• Big boomer cohort currently
at or near retirement age
Readings
Cybersecurity's hiring crisis: A troubling trajectory – ZDNet
Lack of role models keeps women out of cyber security – FT.com
Millennials don't even know what cybersecurity is – F W
The FBI is struggling to convince tech whizzes to take jobs at bureau – MarketWatch
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
12
REFERENCES
Note: In the PDF version of this document the http references are clickable URLs.
[1] Morgan, S. (2016) “One Million Cybersecurity Job Openings In 2016” Forbes, January 2, accessed at
http://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-
openings-in-2016/#1ed106a77d27
[2] Drinkwater, D. (2015) “Cyber-security pros blame breaches on skills gap” SC Magazine, April 16
accessed at http://www.scmagazineuk.com/cyber-security-pros-blame-breaches-on-skills-
gap/article/409393
[3] Cobb, S. (2016) “Mind This Gap: Criminal hacking and the global cybersecurity skills shortage, a
critical analysis” Virus Bulletin, in process, to be accessed at
https://www.virusbulletin.com/conference/vb2016/abstracts/mind-gap-criminal-hacking-and-
global-cybersecurity-skills-shortage-critical-analysis
[4] White House (2016) “FACT SHEET: Cybersecurity National Action Plan” White House, accessed at
https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-
action-plan
[5] Curtis, J. (2015) “UK Gov will double cybersecurity funding to fend off ‘ISIS cyber attacks’” IT Pro UK,
November 17, accessed at http://www.itpro.co.uk/security/25611/uk-gov-will-double-
cybersecurity-funding-to-fend-off-isis-cyber-attacks.
[6] Peters, S. (2016) “New White House Cybersecurity Plan Creates Federal CISO” Dark Reading,
February 9, accessed at http://www.darkreading.com/risk/new-white-house-cybersecurity-plan-
creates-federal-ciso---/d/d-id/1324243
[7] Taber, J. (1980) “A Survey of Computer Crime Studies” Computer/Law Journal, 275, accessed at
http://repository.jmls.edu/jitpl/vol2/iss1/15
[8] Maass, P. and Rajagopalan, M. (2012) “Does Cyber Crime Really Cost $1 Trillion?” Pro Publica.
accessed at: http://www. propublica. org/article/does-cybercrime-really-cost-1-trillion
[9] Cobb, S. (2015) “Sizing Cybercrime: Incidents and accidents, hints and allegations” Virus Bulletin,
accessed at https://www.virusbulletin.com/blog/2016/02/vb2015-paper-sizing-cybercrime-
incidents-and-accidents-hints-and-allegations/
[10] Rosenberger, R. (1995) Computer Viruses and False Authority Syndrome, accessed at
http://vmyths.com/mm/fas/fas.pdf
[11] Bejtlich, R. (2009) “Insider Threat Myth Documentation” TaoSecurity, accessed at
http://taosecurity.blogspot.com/2009/05/insider-threat-myth-documentation.html
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
13
[12] Oltsik, J. (2016) “High-demand cybersecurity skill sets” Network World, May 10, accessed at
http://www.networkworld.com/article/3068177/security/high-demand-cybersecurity-skill-
sets.html
[13] Lemos, R. (2016) “IT Security Skills Gap More Harmful for SMBs Than Larger Firms” eWeek, July 3
accessed at http://www.eweek.com/security/it-security-skills-gap-more-harmful-for-smbs-than-
larger-firms.html
[14] ISACA (2015) “2015 Global Cybersecurity Status Report” ISACA, accessed at
http://www.isaca.org/cyber/Documents/2015-Global-Cybersecurity-Status-Report-Data-
Sheet_mkt_Eng_0115.pdf
[15 Cisco (2014) “Cisco 2014 Annual Security Report” Cisco, accessed at
http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf
[16] Morgan, S. (2016) “One Million Cybersecurity Job Openings In 2016” Forbes, January 2, accessed at
http://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-
openings-in-2016/#1ed106a77d27
[17] Bednarz, A. (2015) “Cisco estimates a million unfilled security jobs worldwide” Network World,
March 9, accessed at http://www.networkworld.com/article/2893365/security0/shortage-of-
security-pros-worsens.html
[18] Cisco (2015a) “Mitigating the Cybersecurity Skills Shortage” Cisco, accessed at
http://www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-talent.pdf
[19] Cisco (2015b) “Cisco 2015 Annual Security Report” Cisco, access [gated] at
http://www.cisco.com/web/offers/lp/2015-annual-security-report/index.html
[20] U.S. Air Force (2005) “Cyberspace as a Domain In which the Air Force Flies and Fights: Remarks as
delivered to the C4ISR Integration Conference, Nov. 2, 2006” U.S. Air Force website, accessed
ahttp://www.af.mil/AboutUs/SpeechesArchive/Display/tabid/268/Article/143968/cyberspace-
as-a-domain-in-which-the-air-force-flies-and-fights.aspx
[21] Wood, S. (2006) “New Air Force Command to Fight in Cyberspace” American Forces Press Service,
accessed ahttp://archive.defense.gov/news/newsarticle.aspx?id=2014
[22] U.S. Air Force (2009) “The Cyber Menace” AIR FORCE Magazine, March, accessed at
http://www.airforcemag.com/magazinearchive/documents/2009/march%202009/0309cyber.pd
f
[23] CSIC (2008) Securing Cyberspace for the 44th Presidency Report of the CSIS Commission on
Cybersecurity for the 44th Presidency, Center for Strategic and International Studies, accessed at
https://csis-prod.s3.amazonaws.com/s3fs-
public/legacy_files/files/media/csis/pubs/081208_securingcyberspace_44.pdf
[24] Real Clear Politics (2009) “Secretary Gates Talks to Troops in Alabama” Real Clear Politics accessed
at
http://www.realclearpolitics.com/articles/2009/04/15/gates_talks_to_troops_in_alabama_96023.
html#ixzz4DNvqTeHg
[25] Kilgannon, C. and Cohen, N. (2009) “Cadets Trade the Trenches for Firewalls” New York Times, May
10, accessed at http://www.nytimes.com/2009/05/11/technology/11cybergames.html
Sizing the Cyber Skills Gap © Stephen Cobb, 2016
14
[26] Evans, K. and Reeder, F. (2010) “A human capital crisis in cybersecurity: A report of the CSIS
commission on cybersecurity for the 44th presidency” Center for Strategic & International Studies,
accessed at https://csis-prod.s3.amazonaws.com/s3fs-
public/legacy_files/files/publication/100720_Lewis_HumanCapital_WEB_BlkWhteVersion.pdf
[27] Partnership for Public Service (2009) Cyber IN-SECURITY: Strengthening the Federal Cybersecurity
Workforce, Booz Allen Hamilton, accessed at
https://www.boozallen.com/content/dam/boozallen/media/file/CyberIn-Security_2009.pdf
[28] Krebs, B and Nakashima, E. (2009) “As attacks increase, U.S. struggles to recruit computer security
experts” Washington Post, December 23, accessed at http://www.washingtonpost.com/wp-
dyn/content/article/2009/12/22/AR2009122203789.html
[29] (ISC)2 (2013) 2013 Global Information Security Workforce Study (ISC)2 accessed at
https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/2013-ISC2-Global-
Information-Security-Workforce-Study.pdf
[30] Libicki, M. C., Senty, D. and Pollak, J. (2014) Hackers Wanted: an examination of the cybersecurity
labor market. Rand Corp. accessed at
http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.p
df
[31] NICE (2014) National Cybersecurity Workforce Framework, website and link to the interactive
version accessed at http://csrc.nist.gov/nice/framework
[32] (ISC)2 (2015) 2015 Global Information Security Workforce Study (ISC)2 accessed at
https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/GISWS/FrostSullivan-
(ISC)%C2%B2-Global-Information-Security-Workforce-Study-2015.pdf
[33] Satelvad,(2015) A. “Demand to fill cybersecurity jobs booming” Peninsula Press, March 31, accessed
at http://peninsulapress.com/2015/03/31/cybersecurity-jobs-growth/
[34] Schwartau, W. (2016) “Hiring the Unhireable” RSA Conference, San Franciso (video), March 15
accessed at https://www.rsaconference.com/videos/hiring-the-unhireable
[35] Cobb, S. (2016) “What the CISSP? 20 years as a Certified Information Systems Security Professional”
We Live Security, May 28, accessed at http://www.welivesecurity.com/2016/05/28/cissp-
certified-information-systems-security-professional/
[36] Collar Jr, E. (2015) “Where is the Cybersecurity Hero? Practical Recommendations for Making
Cybersecurity Heroism More Visible in Organizations” International Journal of Computer Science
and Information Security, 13(4), 1. accessed at
http://www.academia.edu/download/37479983/01_Paper_31031505_IJCSIS_Camera_Ready_pp._
1-5.pdf

More Related Content

What's hot

NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY anurama
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Cláudia Alves
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Chapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareChapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareAdi Saputra
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsSai Huda
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 

What's hot (20)

NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Chapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareChapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs Ransomware
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 

Similar to Cyber Skills Gap: Analyzing Claims of 1M Shortage

Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Black Duck by Synopsys
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)Bradley Susser
 
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...Black Duck by Synopsys
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxcockekeshia
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and SecurityEMC
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
How large is the cyber security skills gap?
How large is the cyber security skills gap?How large is the cyber security skills gap?
How large is the cyber security skills gap?Megan Thudium
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspacemark-smith
 

Similar to Cyber Skills Gap: Analyzing Claims of 1M Shortage (20)

Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)
 
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and Security
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
How large is the cyber security skills gap?
How large is the cyber security skills gap?How large is the cyber security skills gap?
How large is the cyber security skills gap?
 
Cybersecurity jobs jb
Cybersecurity jobs jbCybersecurity jobs jb
Cybersecurity jobs jb
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 

More from Stephen Cobb

Cybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptxCybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptxStephen Cobb
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
 
What Makes a Good CISO
What Makes a Good CISOWhat Makes a Good CISO
What Makes a Good CISOStephen Cobb
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with securityStephen Cobb
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of CybercrimeStephen Cobb
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeMalware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeStephen Cobb
 
Malware and the risks of weaponizing code
Malware and the risks of weaponizing codeMalware and the risks of weaponizing code
Malware and the risks of weaponizing codeStephen Cobb
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseStephen Cobb
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionStephen Cobb
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Stephen Cobb
 
Endpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategyEndpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategyStephen Cobb
 

More from Stephen Cobb (20)

Cybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptxCybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptx
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
What Makes a Good CISO
What Makes a Good CISOWhat Makes a Good CISO
What Makes a Good CISO
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeMalware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
 
Malware and the risks of weaponizing code
Malware and the risks of weaponizing codeMalware and the risks of weaponizing code
Malware and the risks of weaponizing code
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
 
Endpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategyEndpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategy
 

Recently uploaded

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Cyber Skills Gap: Analyzing Claims of 1M Shortage

  • 1. Sizing the Cyber Skills Gap: A White Paper by Stephen Cobb, CISSP
  • 2. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 2 About the Author Stephen Cobb has been researching information security and data privacy for more than 25 years, providing advice and guidance to companies, consumers, non-profits, and government agencies. His first book on computer security was published in 1991 and became part of the industry’s Common Body of Knowledge. In 1996, Cobb was one the first people to obtain the Certified Information Systems Security Professional qualification. He published a primer on privacy for business in 2002 and has contributed numerous chapters to information security texts. As an Adjunct Professor at Norwich University, Cobb taught Masters level classes in Information Assurance, many of which were based on curriculum material co-authored with Chey Cobb, his partner of 30 years. Peer-reviewed works by Cobb include a paper on government use of malicious code presented at the 6th International Conference on Cyber Conflict in Estonia, one of a dozen countries to which he has been invited as a conference speaker. Cobb currently coordinates a team of researchers at the North American headquarters of ESET, the Slovakia- based internet security software company. Cobb is also working on his Master of Science in Security and Risk Management in the Criminology Department of the University of Leicester in England. This paper is a by-product of his studies at Leicester, which are funded in part by ESET's generous commitment to further education for all employees. stc16@student.le.ac.uk www.zcobb.com www.cisosurvey.org www.linkedin.com/in/stephencobb www.welivesecurity.com/author/scobb @zcobb
  • 3. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 3 Sizing the Cyber Skills Gap: A white paper Stephen Cobb, CISSP Abstract: This white paper evaluates claims that there are not enough people in the world with the necessary cybersecurity knowledge, skills, and abilities to meet current demand. Frequently quoted estimates of this global “cyber skills gap” range from 1 million today, to 1.5 million by 2020. If accurate, these numbers have serious implications for the work of securing and defending the information systems upon which so much of modern life depends. The origins of these numbers and their plausibility are thus worthy of examination. The root causes of this alleged gap are not discussed, nor are the efforts to close it, although suggestions for further research are presented. The paper concludes that a significant cyber skills gap does exist and can be modeled. 1. INTRODUCTION Whether you are in charge of the security of your organization’s data and systems, or working in IT security, or maybe just looking for a career, it is hard to ignore headlines like this one in Forbes earlier this year: “One Million Cybersecurity Job Openings In 2016” [1]. The article cites multiple studies that suggest there is a significant global shortage of skilled information system security professionals, a 'cybersecurity skills gap' if you will (shortened to ‘cyber skills gap’ in many reports and in this white paper). If there is a cyber skills gap and it is that big, then there are several serious implications for cybersecurity: 1. Efforts to defend information systems against criminal hackers are being undermined because organizations are under-staffed, either numerically, or qualitatively, or both [2]. 2. The supply of the cybersecurity-skilled humans needs to be increased. 3. The underlying causes of the shortage of cybersecurity-skilled personnel need to be understood and addressed. Fortunately, numerous initiatives are underway to address points #2 and #3 (some of them are discussed in a paper the author is presenting later this year [3]). There is no doubt that cyber security education and recruitment efforts are receiving more and more funding [4] [5] [6]. However, whether or not those efforts will be enough to close the gap is not the subject of this paper. The paper also avoids discussion of what may have caused a gap although possible causes are listed in Appendix B. The paper simply seeks to answer these questions: How true is that Forbes headline and others like it? Does the world really need one million more cyber skilled workers than currently exist? Why Question the Numbers? One good reason for questioning numerical claims relating to cybersecurity headlines is the sad reality that, historically speaking, the computer security industry does not have the best track record when it comes to quantification. Taber was probably the first to alert the industry and the world to
  • 4. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 4 this “number problem” in his landmark 1980 Computer/Law Journal article “A Survey of Computer Crimes Studies” [7]. From the confusion created by early SRI studies in the 1970s that conflated computer abuse and computer crime, to the $1 trillion cost of cybercrime cited by President Obama [8], the industry has been a frequent source of suspect numbers [9]. Some numbers, like “five million PCs infected with the Michelangelo virus,” [10] have often been repeated as fact by an unsuspecting and often overeager press, and bent to the will of vendors and politicians. Sadly, Taber was largely ignored and over the decades the industry has spawned numerous baseless data memes, such as the 80/20 rule of insider/outsider computer crime [11]. It certainly seems prudent to subject the million- person cyber skills gap to scrutiny. There can be little doubt that many organizations today are finding it hard to fill cybersecurity positions and tap cybersecurity expertise. For example, in a 2016 global survey of IT spending, 46 percent of enterprises said they have a “problematic shortage” of cybersecurity skills [12]. A 2016 Spiceworks study found that 59% of businesses with fewer than 500 employees had no access to a security expert (not internally, nor externally via third-party contractor or managed security provider) [13]. In its 2015 Global Cybersecurity Status Report, ISACA revealed that 86% of information security managers interviewed believe there is a shortage of skilled cybersecurity professionals [14]. But do these opinions really amount to a cyber skills gap, and if so, how wide is it? THE ONE MILLION GEEK GAP The oft-cited million-person cyber skills gap appears to have its origins in a section of the Cisco 2014 Annual Security Report, also known as the 2014 CASR [15]. The section was titled “The Security Talent Shortage and Solutions Gap” and it stated the following: “It’s estimated that by 2014 the industry will still be short more than a million security professionals across the globe.” This sentence sounds odd in a 2014 report because it seems to talk about 2014 as the future, implying that the shortage had reached the one million mark some period prior. Also curious is the lack of a footnote or other source for this number (despite the report having more three dozen endnotes). These oddities did not prevent “one million” being picked up and repeated, not only by journalists and industry experts [16] [17] but also by Cisco itself. In 2015, the company published a document titled Mitigating the Cybersecurity Skills Shortage [18]. The first paragraph states: “Cisco estimates there are more than 1 million unfilled security jobs worldwide.” This time there is a footnote and it points to Cisco Security Capabilities Benchmark Study (Cisco, Oct. 2014). Tracking down this study is not easy, but it appears to be reported in a section of the Cisco 2015 Annual Security Report titled “Cisco Security Capabilities Benchmark Study” [19]. Unfortunately, there is no reference to a shortage of information security professionals in that section, or indeed that entire report. So where did Cisco get the notion that the 2014 global shortfall of security professionals was 1 million? Getting to One Million In the United States (US), concern about a cyber skills gap originated within federal government circles, most notably the military. The Air Force added cyberspace to its mission statement in 2005 which now reads: “to fly and fight in Air, Space and Cyberspace” [20], and in 2006 the 8th Air Force was designated the service’s new cyberspace command, “focused on taking the fight against terrorism
  • 5. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 5 to the technological realm” [21]. In 2008 the DoD recognized cyberspace as a warfighting domain in need of appropriately trained cyber warriors [22]. The need to recruit for cyber roles in the military, both attack and defense, produced numerous studies pertinent to the skills gap and these will be discussed later in the Virus Bulletin paper mentioned earlier [3]. Recognizing the need for a federal cybersecurity strategy beyond the military the non-partisan non- profit Center for Strategic and International Studies (CSIS) created the “CSIS Commission on Cybersecurity for the 44th Presidency.” In December of 2008 the commission published a report listing 25 recommendations, the 24th of which was: “Conduct Training for Cyber Education and Workforce Development” [23]. However, the Commission left no doubt that the cyber skills gap was an urgent concern: “The cyber threat to the United States affects all aspects of society, business, and government, but there is neither a broad cadre of cyber experts nor an established cyber career field to build upon, particularly within the Federal government.” [21] In April of 2009, Defense Secretary Robert Gates, speaking at the Air War College about the need to “increase the throughput of training of experts in cyber” admitted that: “We are desperately short of people who have capabilities in this area in all the services and we have to address it.” [24] This was picked up by the New York Times in a May, 2009 article titled: “Cadets Trade the Trenches for Firewalls” [25]. CSIS continued studying this problem and in July of 2010 published a 50-page analysis starkly titled: A Human Capital Crisis in Cybersecurity [26]. This report included the following statement from the founding Director of the CIA’s Clandestine Information Technology Office: “There are about 1,000 security people in the US who have the specialized security skills to operate effectively in cyberspace. We need 10,000 to 30,000.” The CSIS report went on to describe the problem as one both of depth and breadth, quality as well as quantity: “We not only have a shortage of the highly technically skilled people required to operate and support systems already deployed, but also an even more desperate shortage of people who can design secure systems, write safe computer code, and create the ever more sophisticated tools needed to prevent, detect, mitigate and reconstitute from damage due to system failures and malicious acts.” In January of 2009 another nonprofit organization, the nonpartisan Partnership for Public Service, had begun studying the cyber skills shortage. Supported by government contractor Booz Allen Hamilton, the researchers talked to “69 officials from 18 departments, agencies, subcomponents” to produce Cyber IN-SECURITY: Strengthening the Federal Cybersecurity Workforce [27]. This report contained some sobering findings: CISOs and CIOs in a wide range of government agencies, not just those in the defense realm, said it was hard to find enough good applicants for cybersecurity openings. Furthermore, and perhaps even more worrying, researchers found: “…there is no strategic government-wide assessment of the current state of the cybersecurity workforce, its size, strengths and weaknesses. There is no federal plan projecting how many cybersecurity specialists will be needed next year or in the next five years to meet individual
  • 6. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 6 agency and government-wide needs, what skills and certifications they should possess, how they should be trained, or how they should be recruited into federal service.” While there has been progress since 2009 on some of these issues, the Cyber IN-SECURITY report struck several chords that would resonate over the next seven years, such as differences in opinion between CIOs and CISOs on the one hand, and the Human Resources (HR) departments charged with finding cyber-skilled employees for them on the other. HR tended to be pleased with its efforts at finding candidates, but the CIO/CISO view was much less flattering. For example, only 30% of the latter said that they were satisfied with the number of applicants supplied by HR, whereas HR was 45% satisfied. Vested Interests? The Cyber IN-SECURITY study put the federal cyber skills shortage on the map and, by the end of 2009, the problem was being reported by mainstream media and popular technology journalists like Brian Krebs [28]. Cyber IN-SECURITY also highlighted the government’s over-reliance on the private sector for data about cybersecurity (the report itself was not commissioned or funded by the government). The author has discussed the downsides of such over-reliance elsewhere [9]. To summarize, it creates a risk that politicians who are looking for reasons not to increase funding for government activities – like fighting cybercrime or investing in cyber workforce development – may find it convenient to discount arguments that are based on data from entities who stand to gain from that increased spending. Such entities include cybersecurity contractors, vendors, consultants, as well as educational institutions and certification organizations. For example, any research that shows a need for more cybersecurity education and certification can be seen as benefiting those who generate revenue by meeting that need, whether they are for-profit, like Phoenix University and SANS Institute, or non-profit like Norwich University and CompTIA. This observation does not imply that the ethics or integrity of any entity are necessarily suspect, but unfortunately the information security industry is no stranger to exaggerations that have undermined valid messaging about legitimate concerns, sometimes to the detriment of security (for example, claims that outsider threats had outpaced insider threats in the late 1990s, claims that were beneficial to firewall vendors, arguably led to complacency about insiders). There is a strong case for saying that, when it comes to public policy debates, the use of data generated by objective agencies is better for policymaking than relying on commercial entities for data. That said, there are valuable insights to be gained from data created outside of government, particularly if it is used carefully, and especially if it has been subjected to peer review. Workforce Studies Beyond the government and military, the cyber workforce in general has arguably been experiencing a skills gap for some time. Consider the sixth edition of the Global Information Security Workforce Study (GISWS), a study that has been produced biennially for many years by one of the largest non- profit cybersecurity certification organizations, (ISC)2. This worldwide survey of more than 12,000 information security professionals, conducted in the fourth quarter of 2012 in partnership with Booz Allen Hamilton, and with the assistance of Frost & Sullivan, found that:
  • 7. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 7 “Even with past annual growth in the double-digits, workforce shortages persist – 56% of respondents believe there is a workforce shortage, compared to 2% that believe there is a surplus [29].” The report went on to make an important point to which CISOs and their IT security staff can surely attest: “The impact of shortage is the greatest on the existing workforce.” Early in 2014 the RAND Corporation think tank weighed in on the global cyber skills gap with a report titled H4ckers Wanted: An Examination of the Cybersecurity Labor Market [30]. Containing a useful review of previous studies, including some of those mentioned above, this report looked at numerous government initiatives to address the cyber skills gap, programs set in motion since alarms were raised in 2008. Most notable among these is the National Initiative for Cybersecurity Education (NICE), an interagency effort coordinated by the National Institute of Standards and Technology (NIST) “to improve the nation’s cybersecurity education, including efforts directed at the federal workforce” [31]. RAND also reviewed fluctuations in enrollment in computer science degree programs and the role of the NSA in promoting Centers of Cyber Excellence. Somewhat surprisingly, the RAND report’s recommendations amounted to ‘steady as she goes.’ This perspective was based in part on RAND’s analysis of the economics of labor markets. RAND concluded that, given the existing government programs, market forces would remove the cyber skills gap over time. Unfortunately, that time was put at 5 to 10 years, and RAND seemed unaware that a timeframe like that is of little practical help to those charged with protecting organizations from cyber threats today. Just as worrying was another factor in RAND’s analysis, explained like this: “By then [meaning the 5- 10 year timeframe] the current concern over cybersecurity could easily abate, driven by new technology and more secure architectures.” While the majority of information security professionals would welcome such developments – many have other interests they would like to pursue – relying on “new technology and more secure architectures” to solve the cybersecurity problem is hardly a practical strategy. The impact of unchecked cyber crime and conflict in the interim has to be acknowledged, with its potential to erode trust in digital technology, cripple critical infrastructure, and generally retard economic growth. Sadly, but perhaps predictably, no evidence for RAND’s optimism was to be found in the 2015 GISWS; this edition of the study reported that the “information security workforce shortfall” was growing wider [32]. The percentage of respondents who said that their organizations had too few information security professionals had risen to 62%, from 56% in the 2013 survey. As for the economics of the labor market, responses to a variety of questions in this study led researchers to conclude this hiring shortfall was “less about money” and more about “an insufficient pool of suitable candidates”. For many years, research consultants Frost & Sullivan assisted (ISC)2 with the GISWS. In 2015, based on analysis of that data and their in-house tracking, Frost & Sullivan predicted that by 2020 the cyber skills gap would be 1.5 million. This number was described as “the difference between Frost & Sullivan’s projection of the workforce needed to fully address escalating security staffing needs and our workforce projection that accounts for workforce supply constraints (e.g., a tightening labor market among security professionals)” [32].
  • 8. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 8 CONCLUSIONS AND IMPLICATIONS Does that mean we have now reached Cisco’s 1 million mark? This paper concludes that yes, it is entirely plausible that, in order to secure its digital information systems, the world needs to 1 million more people than are currently available. Here are some more data points that support this assertion. In 2015, a news organization at the Stanford Journalism Program reported that, based on their analysis of Bureau of Labor Statistics, at least 209,000 cybersecurity jobs in the US were unfilled [33]. Their analysis also showed cybersecurity job postings rising rapidly – “up 74% percent over the past five years.” That equates to a year-on-year growth rate of 15% in unfilled positions, which is consistent with numerous surveys of industry hiring intentions. Rounding down to 200,000 unfilled cybersecurity jobs in the US produces a number that is quite plausible relative to other stats, some of which are modeled in a spreadsheet in Appendix A. That 200K figure also extrapolates convincingly to 1 million globally. Although the US is one of the heaviest users of information systems, it arguably accounts for a lot less than one fifth of the global total of digital technology users, a useful metric for estimating the amount of cybersecurity work that needs to be done. The consequences of not getting that work done are beyond the scope of this paper, but it seems reasonable to assert that multiple aspects of the current situation urgently require further research (and one might argue that this assertion would be equally valid if the gap were found to be half a million and not a whole million). Below are suggested topics for further research (some of which may be the subject of current but as yet unpublished research). The author hopes to revisit the literature next year to review any progress in these and related areas. One urgent area for action, not just research, is the improvement of hiring practices for cybersecurity roles. Despite the size of the cyber skills gap, the author is occasionally aware of individuals skilled in cybersecurity who are unemployed or underemployed. The causes of this situation, one of which appears to be immature cybersecurity hiring practices within organizations [34] [35], require urgent study and remediation. Suggestions for Further Research: • How are organizations coping with the shortage of qualified applicants for cybersecurity vacancies? • What is the impact of understaffing on the cybersecurity of organizations? • Can market forces solve close the cyber skills gap or is there a limit to the ability of higher salaries for cybersecurity roles to draw enough suitable entrants into the field? • How should “suitable entrant into the field” be defined, in terms of Knowledge, Skills, and Abilities (KSAs) or is there more, like aptitude, personality, or even g? [3] • Can cybersecurity roles be made more appealing within society, perhaps as public service calling or the work of heroes? [36] • What is the basis of job satisfaction in cybersecurity and is it sustainable?
  • 9. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 9 Sizing the Cyber Skills Gap APPENDIX A: MODELING THE GAP This appendix addresses those who may be skeptical of the claim that there is a global cyber skills gap of one million people. A model of cybersecurity employment is presented to test how realistic a US gap of 200,000 appears in relation known good data. (This appendix does not investigate the paper’s assumption that the US makes up one fifth of that one million.) Skepticism is understandable when you look at some possible indicators of a skills gap such as job listings. The large job aggregator indeed.com does not list anything like 200,000 cyber openings. It is tempting to ask if there are even that many cyber jobs in the US, filled or otherwise. The answer is yes there are, or at least it appears that there could be, if you apply a series of assumptions to Census Bureau data about the US workforce. The spreadsheet below is an attempt to do that and the results are roughly as follows: an appropriate size for the cyber skilled workforce is 600K, so a shortfall of 200K exists if 33% of positions cannot be readily filled at any given time (a percentage in line with numerous surveys). Whether or not this model is found acceptable depends upon the reasonableness of its assumptions and the starting point. The latter is a US Census Bureau report: “Number Of Firms, Number Of Establishments, Employment, And Annual Payroll By Enterprise Employment Size For The United States And States, Totals: 2013.” All of the numbers in bold are from that report, which lists how many people were working in the commercial sector, that is non-governmental, non-farm jobs, broken down by size of employer entity.
  • 10. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 10 The number of employees per entity can be calculated as an average until you get to entities of 500 employees or larger. The averages in C4 through C14 are ‘best fit’ based on the total entity number in the >500 category (18,636) and the total employment for that group (118,266,253, which the model misses slightly). For the very largest companies the numbers are based on percentages of their workforce in the US (the largest being Walmart). The number of 21,732,000 for government employment is all state and federal, including educational and the USPS, as provided by the Bureau of Labor Statistics. Total US employment in this model is just under 140 million, a number that is frequently cited from non-farm employment. Columns E and F show the assumptions made about cyber workers per entity and cyber workers per employee. For entities under 100 employees it is assumed that there will be one cyber worker for each 500 employees. Many smaller companies lack the resources to have a dedicated cybersecurity employee and leverage the expertise of vendors, consultants, or Managed Service Providers. In the next largest category (100-499) it seems reasonable to assume a couple of cybersecurity staff as an average across the range. As company size increases there are economies of scale and fewer cyber skilled folks per 1,000 employees. For the government numbers, the calculations were performed differently. If one assumes one cyber skilled position for every 250 government/military/postal employee then resulting need is for 86,928 people. Time and resource constraints did not permit a more detailed breakdown than this, but it should be possible. Given the high level of demand and recruitment for cyber positions in the armed forces, and intelligence agencies, that seems reasonable (there are over 100,000 employees across the Intelligence Community alone – CIA, NSA, National Reconnaissance Office, and the intelligence offices tucked within the Departments of State, Justice, Treasury, and Homeland Security). Clearly one can argue with some of these assumptions. For example, some of the ratios may be unrealistic. Not every 200 person company is going to have two cybersecurity employees. On the other hand, the model does not take into account the much higher ratios in security companies (vendors, consultants, service providers), where one out of three positions may require cyber skills. One could argue that not all jobs require the use of employer information systems, but it is hard to deny that just about every employee has access to at least one very powerful information system, their smartphone. On balance, this spreadsheet is a useful start. With appropriate resources a much more sophisticated model could, and probably should, be developed.
  • 11. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 11 Sizing the Cyber Skills Gap APPENDIX B: CAUSES OF THE CYBER SKILLS GAP A cyber skills gap exists, but why? The paper does not address this question, but it is an important one, examination of which could provide insights that are useful to efforts to close the gap. This table presents some possible causes. Note that these are not referenced and some are purely anecdotal, but some links to further reading are provided. Also note that some of the issues are being addressed today, but lack of attention in the past may have contributed to current shortage. Cyber Skills Gap: Informal Outline of Possible Contributing Issues Pipeline Issues Hiring Issues Retention Issues • Lack of awareness of cyber as a career • Cyber does not appeal to everyone as a career • Not enough cyber career role models (particularly for women and minorities) • Social status of cyber defenders below that of attackers and makers • Not enough people have what it takes to be good at cybersecurity • Lack of educational opportunities for cyber • Unrealistic demands in job descriptions (laundry list) • HR not clear on cyber roles and appropriate KSAs • Inappropriate qualification demands (CISSP for Analyst) • Picky employers (no smokers, no color blind, no buns or beards) • Some employers refuse or resent appropriate levels of compensation • Can be a thankless job • Management lacks enough understanding of cyber to recognize good work • Too much blame, not enough appreciation • Burn out can lead to career switching • Big boomer cohort currently at or near retirement age Readings Cybersecurity's hiring crisis: A troubling trajectory – ZDNet Lack of role models keeps women out of cyber security – FT.com Millennials don't even know what cybersecurity is – F W The FBI is struggling to convince tech whizzes to take jobs at bureau – MarketWatch
  • 12. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 12 REFERENCES Note: In the PDF version of this document the http references are clickable URLs. [1] Morgan, S. (2016) “One Million Cybersecurity Job Openings In 2016” Forbes, January 2, accessed at http://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job- openings-in-2016/#1ed106a77d27 [2] Drinkwater, D. (2015) “Cyber-security pros blame breaches on skills gap” SC Magazine, April 16 accessed at http://www.scmagazineuk.com/cyber-security-pros-blame-breaches-on-skills- gap/article/409393 [3] Cobb, S. (2016) “Mind This Gap: Criminal hacking and the global cybersecurity skills shortage, a critical analysis” Virus Bulletin, in process, to be accessed at https://www.virusbulletin.com/conference/vb2016/abstracts/mind-gap-criminal-hacking-and- global-cybersecurity-skills-shortage-critical-analysis [4] White House (2016) “FACT SHEET: Cybersecurity National Action Plan” White House, accessed at https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national- action-plan [5] Curtis, J. (2015) “UK Gov will double cybersecurity funding to fend off ‘ISIS cyber attacks’” IT Pro UK, November 17, accessed at http://www.itpro.co.uk/security/25611/uk-gov-will-double- cybersecurity-funding-to-fend-off-isis-cyber-attacks. [6] Peters, S. (2016) “New White House Cybersecurity Plan Creates Federal CISO” Dark Reading, February 9, accessed at http://www.darkreading.com/risk/new-white-house-cybersecurity-plan- creates-federal-ciso---/d/d-id/1324243 [7] Taber, J. (1980) “A Survey of Computer Crime Studies” Computer/Law Journal, 275, accessed at http://repository.jmls.edu/jitpl/vol2/iss1/15 [8] Maass, P. and Rajagopalan, M. (2012) “Does Cyber Crime Really Cost $1 Trillion?” Pro Publica. accessed at: http://www. propublica. org/article/does-cybercrime-really-cost-1-trillion [9] Cobb, S. (2015) “Sizing Cybercrime: Incidents and accidents, hints and allegations” Virus Bulletin, accessed at https://www.virusbulletin.com/blog/2016/02/vb2015-paper-sizing-cybercrime- incidents-and-accidents-hints-and-allegations/ [10] Rosenberger, R. (1995) Computer Viruses and False Authority Syndrome, accessed at http://vmyths.com/mm/fas/fas.pdf [11] Bejtlich, R. (2009) “Insider Threat Myth Documentation” TaoSecurity, accessed at http://taosecurity.blogspot.com/2009/05/insider-threat-myth-documentation.html
  • 13. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 13 [12] Oltsik, J. (2016) “High-demand cybersecurity skill sets” Network World, May 10, accessed at http://www.networkworld.com/article/3068177/security/high-demand-cybersecurity-skill- sets.html [13] Lemos, R. (2016) “IT Security Skills Gap More Harmful for SMBs Than Larger Firms” eWeek, July 3 accessed at http://www.eweek.com/security/it-security-skills-gap-more-harmful-for-smbs-than- larger-firms.html [14] ISACA (2015) “2015 Global Cybersecurity Status Report” ISACA, accessed at http://www.isaca.org/cyber/Documents/2015-Global-Cybersecurity-Status-Report-Data- Sheet_mkt_Eng_0115.pdf [15 Cisco (2014) “Cisco 2014 Annual Security Report” Cisco, accessed at http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf [16] Morgan, S. (2016) “One Million Cybersecurity Job Openings In 2016” Forbes, January 2, accessed at http://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job- openings-in-2016/#1ed106a77d27 [17] Bednarz, A. (2015) “Cisco estimates a million unfilled security jobs worldwide” Network World, March 9, accessed at http://www.networkworld.com/article/2893365/security0/shortage-of- security-pros-worsens.html [18] Cisco (2015a) “Mitigating the Cybersecurity Skills Shortage” Cisco, accessed at http://www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-talent.pdf [19] Cisco (2015b) “Cisco 2015 Annual Security Report” Cisco, access [gated] at http://www.cisco.com/web/offers/lp/2015-annual-security-report/index.html [20] U.S. Air Force (2005) “Cyberspace as a Domain In which the Air Force Flies and Fights: Remarks as delivered to the C4ISR Integration Conference, Nov. 2, 2006” U.S. Air Force website, accessed ahttp://www.af.mil/AboutUs/SpeechesArchive/Display/tabid/268/Article/143968/cyberspace- as-a-domain-in-which-the-air-force-flies-and-fights.aspx [21] Wood, S. (2006) “New Air Force Command to Fight in Cyberspace” American Forces Press Service, accessed ahttp://archive.defense.gov/news/newsarticle.aspx?id=2014 [22] U.S. Air Force (2009) “The Cyber Menace” AIR FORCE Magazine, March, accessed at http://www.airforcemag.com/magazinearchive/documents/2009/march%202009/0309cyber.pd f [23] CSIC (2008) Securing Cyberspace for the 44th Presidency Report of the CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies, accessed at https://csis-prod.s3.amazonaws.com/s3fs- public/legacy_files/files/media/csis/pubs/081208_securingcyberspace_44.pdf [24] Real Clear Politics (2009) “Secretary Gates Talks to Troops in Alabama” Real Clear Politics accessed at http://www.realclearpolitics.com/articles/2009/04/15/gates_talks_to_troops_in_alabama_96023. html#ixzz4DNvqTeHg [25] Kilgannon, C. and Cohen, N. (2009) “Cadets Trade the Trenches for Firewalls” New York Times, May 10, accessed at http://www.nytimes.com/2009/05/11/technology/11cybergames.html
  • 14. Sizing the Cyber Skills Gap © Stephen Cobb, 2016 14 [26] Evans, K. and Reeder, F. (2010) “A human capital crisis in cybersecurity: A report of the CSIS commission on cybersecurity for the 44th presidency” Center for Strategic & International Studies, accessed at https://csis-prod.s3.amazonaws.com/s3fs- public/legacy_files/files/publication/100720_Lewis_HumanCapital_WEB_BlkWhteVersion.pdf [27] Partnership for Public Service (2009) Cyber IN-SECURITY: Strengthening the Federal Cybersecurity Workforce, Booz Allen Hamilton, accessed at https://www.boozallen.com/content/dam/boozallen/media/file/CyberIn-Security_2009.pdf [28] Krebs, B and Nakashima, E. (2009) “As attacks increase, U.S. struggles to recruit computer security experts” Washington Post, December 23, accessed at http://www.washingtonpost.com/wp- dyn/content/article/2009/12/22/AR2009122203789.html [29] (ISC)2 (2013) 2013 Global Information Security Workforce Study (ISC)2 accessed at https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/2013-ISC2-Global- Information-Security-Workforce-Study.pdf [30] Libicki, M. C., Senty, D. and Pollak, J. (2014) Hackers Wanted: an examination of the cybersecurity labor market. Rand Corp. accessed at http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.p df [31] NICE (2014) National Cybersecurity Workforce Framework, website and link to the interactive version accessed at http://csrc.nist.gov/nice/framework [32] (ISC)2 (2015) 2015 Global Information Security Workforce Study (ISC)2 accessed at https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/GISWS/FrostSullivan- (ISC)%C2%B2-Global-Information-Security-Workforce-Study-2015.pdf [33] Satelvad,(2015) A. “Demand to fill cybersecurity jobs booming” Peninsula Press, March 31, accessed at http://peninsulapress.com/2015/03/31/cybersecurity-jobs-growth/ [34] Schwartau, W. (2016) “Hiring the Unhireable” RSA Conference, San Franciso (video), March 15 accessed at https://www.rsaconference.com/videos/hiring-the-unhireable [35] Cobb, S. (2016) “What the CISSP? 20 years as a Certified Information Systems Security Professional” We Live Security, May 28, accessed at http://www.welivesecurity.com/2016/05/28/cissp- certified-information-systems-security-professional/ [36] Collar Jr, E. (2015) “Where is the Cybersecurity Hero? Practical Recommendations for Making Cybersecurity Heroism More Visible in Organizations” International Journal of Computer Science and Information Security, 13(4), 1. accessed at http://www.academia.edu/download/37479983/01_Paper_31031505_IJCSIS_Camera_Ready_pp._ 1-5.pdf