(ISC)2 2015 Global Information Security Workforce Study (GISWS) Results U.S. Federal Government Global Study Objectives & Project Background 2 Study Objectives Study Objectives • To obtain feedback from the (ISC)2 members regarding certification, training and educational requirements for their organizations and their professional development. • To identify trends and issues related to information security from both members and non-member security professionals. • To understand potential gaps in organizational security. • To forecast what positions will be most highly sought after in the next 3 to 5 years. 3 Research Background Background The information security profession continues to undergo shifts as a result of constantly changing regulatory environment and increasingly sophisticated and emerging new threats. (ISC)2 has committed itself to maintaining its leadership role and growing its membership base in key geographic regions in which it is currently under represented. • Bi-annual study • 7th GISWS, first one released in 2004 • In partnership with Booz Allen Hamilton, Cyber 360 Solutions and NRI Secure Technologies, conducted by Frost & Sullivan • Likely the largest study of the information security profession ever conducted, the GISWS is comprised of nearly 14,000 information security professionals worldwide. 4 Research Background (continued) • Of the nearly 14,000 - 11,208 were (ISC)2 members and 2,722 were non-members • Conducted using an on-line web based survey using the (ISC)2 membership list. • Email invitations to complete the survey were sent out to (ISC)2 members between October 2014 and January 2015. Source: Frost & Sullivan 5 U.S. Federal Government Results 6 U.S. Federal Government Composition U.S. Federal Government Composition Sample U.S. Federal Government (Military, armed forces, defense) 1,099 U.S. Federal Government (Excluding military, armed forces, defense) 727 Total U.S. Federal Government 1,826 Source: Frost & Sullivan 7 Profile—U.S. Federal Government • Gender Composition of Workforce 86% male and 14% female • Education 41% have degrees and an additional 47% have advanced degree • Average Salary $112,000 • Average Years of Experience 15 •Reporting Structure (Top 3) 24% Security Department, 24% Executive Management, and 18% to IT Department Source: Frost & Sullivan 8 Assessment of U.S. Government Information Security: Better or Worse? 9 Assessment of U.S. Government Information Security U.S. Government Information Security Assessment 2015 2013 52% 47% 27% 28% 5% increase since 2013 17% 12% Better off About the same Worse off 9% 8% Don't know Base: Filtered Respondents (n=975). QG5a. Overall, is the government's information security better or worse off than a year ago? Source: Frost & Sullivan 10 Reasons for Improved U.S. Government Security Reasons for Improved U.S. Government Security 76% 79% Improved security awareness 58% 56% Improved understanding of risk management 51% 53% Improving ability to keep pace with threats 45% 44% Effective security guidance or standards Better or more qualified professionals available Adequate funding for security initiatives 38% 48% 25% 27% 2015 2013 Base: Filtered respondents (n=441)/(n=725) QG5b. Why do you say that government security is better off than a year ago? Source: Frost & Sullivan 11 Reasons for Reduced U.S. Government Security Reasons for Reduced Government Security Inability to keep pace with threats 80% Poor understanding of risk management within government 73% Inadequate funding for security initiatives 71% Not enough qualified professionals available 70% Security awareness is still too low Ineffective security guidance or standards 60% 49% Base: Filtered respondents (n=174). QG5c. Why do you say that government security is worse off than a year ago? Source: Frost & Sullivan 12 Impact of Information Security Metrics, Tools and Technologies 13 Useful IT Security Metric Tools Useful IT Security Metric Tools 67% Continuous monitoring reports Annual FISMA reports and quarterly POAM reports 45% Statistics of viruses prevented, intrusions blocked, etc. 38% 35% Color coded dashboard techniques CyberScope 16% Base: Filtered respondents (n=974). QG8. Which of the following IT security metric tools do you find useful? Select all that apply. Source: Frost & Sullivan 14 Technologies Improving Security Activities in U.S. Government Technologies Improving Security Activities 79% Network monitoring and intelligence Improved intrusion detection and prevention technologies 75% 57% Policy management and audit tools Automated identity management software Web security applications 44% 40% Base: Filtered respondents (n=1,059). Q33b. What security technologies do you believe will provide significant improvements to the security of your organization? Select as many as you feel apply. Source: Frost & Sullivan 15 Effectiveness of U.S. Government Initiatives Effectiveness of U.S. Government Initiatives (Extremely Effective and Effective) 2015 72% 63% 68% 57% 2013 60% 50% 53% 45% 41% 38% 34% 27% 13% NIST SP 800- NIST SP 80053 37 FISMA FIPS 199 SCAP FedRAMP Baseline Security Controls 19% CyberStat Review Base: Filtered respondents (n=1,058)/(n=1611). Q33f. Please rate the effectiveness of each of the following government initiatives in providing security guidance and standards. 16 Implementation of NIST Cybersecurity Framework Implementation of NIST CSF Across the U.S. - Excluding the Federal Government 45% 39% 15% Yes No Don't know Base: Filtered respondents (n=2,983) Note: This base size represents all US respondents who do NOT work for the Federal government Q33h. In 2014, the United States government released the Framework for Improving Infrastructure Cybersecurity. Has your company adopted any of the measured outlined in this framework? Source: Frost & Sullivan 17 Attitudes Toward Mandated Security Requirements Attitudes Toward Specific, Mandatory Security Requirements in Major IT Procurements 81% agree there should be security requirements for every IT procurement 50% 31% 12% 3% Agree completely Agree somewhat Neither agree nor Disagree somewhat disagree 3% Disagree completely Base: Filtered Sample (n=975) QG7. How much do you agree that the government should include specific, mandatory security requirements in every major IT procurement? Source: Frost & Sullivan 18 Threat Response 19 U.S. Government Threat Response Threat Response 46% 21% say threat remediation would take a week or more 17% 12% 5% 4% Within one Two to seven Eight to Three to five Six weeks or day days twenty days weeks more U.S. Private Industry 18% 43% 4% 13% 5% Base: Filtered Sample (n=1,059) Q33a. If your organization's systems or data were compromised by a targeted attack, how quickly do you predict it would take to remediate the damage? Source: Frost & Sullivan 20 U.S. Government Top Security Threats Security Threats (Very/Somewhat Concerned) Application vulnerabilities Malware Configuration mistakes/oversights Mobile devices Faulty network/system configuration Hackers Internal employees Cloud-based services Cyber terrorism Trusted third parties Corporate espionage State sponsored acts Contractors Hacktivists Organized crime 72% 71% 65% 60% 59% 59% 54% 49% 48% 42% 42% 41% 41% 40% 38% Base: Filtered respondents (n=1,059). Q30. Thinking about your own organization, please rate the following potential security threats on the degree of concern you have for each. - Top two box scores Source: Frost & Sullivan 21 Workforce & Funding 22 Number of Security Workers in U.S. Government Number of Security Workers in U.S. Government 2015 2013 60% 58% 30% 24% 3% 2% Too many The right number Too few Base: Filtered respondents (n=1,059) / (n=1,821) Q28a. Would you say that your organization currently has the right number of information security workers, too few, or too many? Source: Frost & Sullivan 23 Impact of Worker Shortage in U.S. Government Impact of Worker Shortage (Very Great/Great Impact) 74% 62% 56% 48% On the existing information security workforce On the organization as a whole On customers On security breaches Base: Filtered respondents (n=632). Q28e. What is the impact of your organization's shortage of information security workers on each of the following? - Top two box scores Source: Frost & Sullivan 24 Reasons for Worker Shortage in U.S. Government Reasons for Worker Shortage in U.S. Government It is difficult to find the qualified personnel we require 48% 43% Business conditions can't support additional personnel at this time 46% Leadership in our organization has insufficient understanding of the requirement for information security It is difficult to retain security workers There is no clear career path for information security workers 58% 39% 40% 36% 2015 2013 31% Base: Filtered respondents (n=632)/(n=1,049) Q28d. What are the reasons that your organization has too few information security workers? Select as many as apply. Source: Frost & Sullivan 25 Average Salary in U.S. Government Average Salary 2015 2015 US Private Sector 2013 $118,000 $114,000 $112,000 $110,500 $106,500 Government Employee Contractor Base: Filtered Sample (n=1,802) / (n=1,798) Q66. Which of the following includes your current annual salary in U.S. dollars before taxes? Source: Frost & Sullivan 26 Salary Change in U.S. Government 2015 GISWS Salary Data in U.S. Government Direct Hire Contractor 47% 40% 40% 6% Yes, an increase of up to 5% 8% 36% 9% 4% 4% 7% Yes, an Yes, an No change in Received a increase of increase of over salary or salary or benefit between 5% 10% benefits reduction and 10% Base: Filtered Sample (n=1,802) / (n=1,798) Q67. Did you receive a salary increase, including benefits and incentives, in 2014? Source: Frost & Sullivan 27 U.S. Government Projected Change in Overall Spend Projected Change in Overall Spend 28% 60% 17% 20% 34% 72% 67% 58% 26% 24% Increase Stay the Same 61% 64% Decrease 12% 8% 11% 13% 13% 12% Personnel Security tools Professional services Outsourced or managed services Training and education Certification Base: Filtered respondents (n=1,826). Q16b. Do you expect overall information security spending at your organization to increase, decrease, or remain the same? Source: Frost & Sullivan 28 Confidence in Legislators Providing Funding for Cybersecurity Confidence in Legislators to Provide Funding for Cybersecurity 58% not confident 33% 25% 21% 17% 4% Very confident Somewhat confident Neither Somewhat Not confident confident nor unconfident at all unconfident Base: Filtered Sample (n=401) Q33l. How confident are you that your country's legislators understand the importance of security enough to provide sufficient funding to support your key information security initiatives? Source: Frost & Sullivan 29 Skills, Training & Education 30 Important Skills in New Hires in U.S. Government Most Important Skills in New Hires (% Very Important) The candidate has relevant information security experience 77% The candidate has information security certifications The candidate has knowledge of relevant regulatory policies The candidate has an information security or related degree 50% 30% 19% Base: Filtered respondents (n=237). Q19b. When making hiring decisions for information security staff how important is each of the following? – Top box scores Source: Frost & Sullivan 31 Future Skills and Competencies in U.S. Government Future Skills and Competencies 56% 50% 48% 44% 43% 43% Risk assessment and management Incident investigation and response Governance, risk management, and compliance… Virtualization Analytical skills InfoSystems and security operations management Communications skills Platform or technology specific skills Architecture Engineering Data administration and management Software system development Business and business development skills Acquisition/Procurement (supply chain) 35% 34% 33% 26% 19% 18% 14% 12% Base: Filtered respondents (n=1,059). Q25. What are the skills and competencies that you will need to acquire or strengthen to be in position to respond to the threat landscape over the next three years? Select all that apply. Source: Frost & Sullivan 32 Demand for Training and Education in U.S. Government Demand for Training and Education 59% 62% Cloud computing Information risk management Incidence response Bring-your-own-device (BYOD) Certification and accreditation Mobile device management Forensics Security engineering Access control systems and methodology Applications and system development security Telecommunications and network security 51% 48% 49% 43% 44% 46% 42% 44% 41% 47% 41% 39% 40% 38% 36% 36% 35% 36% 35% 2015 2013 Base: Filtered respondents (n=1,826)/(n=1,821). Q23. In which areas of information security do you see growing demand for training and education within the next three years? Source: Frost & Sullivan 33 Cloud Computing 34 Prioritization of Cloud Computing Cloud Computing is a Priority 50% 37% Now (currently) In the near future (within two years) Base: Filtered Sample (n=1,171) Q57. To what extent is cloud computing a priority for your organization now and in the future? - Top two box scores Source: Frost & Sullivan 35 Cloud Migration Due to FedRAMP Cloud Migration Due to FedRAMP 64% 18% 18% Yes No Don't know Base: Filtered Sample (n=1,077) QG12. Have FedRAMP's baseline security controls enabled your agency to migrate systems more securely to the cloud? Source: Frost & Sullivan 36 New Skills for Cloud Computing New Skills for Cloud Computing 71% 69% 68% 61% 57% 53% 52% 51% 50% 50% 50% Application of security controls to cloud environments Knowledge of risks, vulnerabilities and threats An enhanced understanding of cloud security guidelines… Risk management Enhanced knowledge of multi-tenancy architecture Security engineering Knowledge of compliance issues Service level agreement skills Deal with dynamic infrastructures Audit Data/information centric approaches to security Manage services and service providers Enhanced data management skills Business stakeholder management and education Supply chain risk management Procurement skills 36% 33% 24% 23% 17% Base: Filtered respondents (n=810)) Q61c. What skills will be required for dealing with cloud computing? Select as many as apply. Source: Frost & Sullivan 37 U.S. Government Frequency of Security Scans on Application Frequency of Security Scans 61% 57% 44% Always 43% Sometimes 33% 7% 32% 33% 24% 24% Internally developed applications that are hosted in a public cloud environment Externally developed applications that are hosted in a public cloud environment 34% Never 9% Internally developed Externally developed applications that are applications that are hosted in your private hosted in private data data centers centers Base: Filtered respondents (n=1,059). Q40. Please indicate the frequency with which security scans are conducted on the following applications. - Always Source: Frost & Sullivan 38 Security Concerns in the U.S. Government When Implementing Cloud Top/High Concern in U.S. Government When Implementing Cloud Data loss prevention 72% Ensuring that existing IT security policy is replicated in the cloud 65% Ensuring that data and systems meet established COOP (continuity of operations) guidelines Integration of cloud and mobility 58% 36% Base: Filtered respondents (n=1,078)) QG10. How much of a security concern is each of the following for your government department agency when implementing cloud computing? - Top two box scores Source: Frost & Sullivan 39 SUMMARY OF CONCLUSIONS 40 The key conclusions offered by the 2015 U.S. government-specific findings include: • As predicted, the gap between the need for qualified information security professionals and the supply is having a negative impact on U.S. government security readiness and is only getting worse. • The U.S. government has spent a lot of time, money and effort on policies, programs and tools designed to improve its security posture, but thus far there has been little return on that investment. • Although procurement and acquisition are cited as moments of great vulnerability, there remains very little focus on applying security during the supply chain process. 41 Questions? 42