Cybersecurity leaders under pressure to change jobs

Share post:

Cybersecurity leaders are facing increasing pressure, with 50% of them predicted to change jobs by 2025, according to Gartner.

The pressure is coming from a number of factors, including the increasing sophistication of cyberattacks, the shortage of skilled cybersecurity professionals, and the high-stakes nature of the work. As a result, many cybersecurity leaders are feeling burned out and stressed. Some are even leaving the field altogether.

Gartner’s Craig Porter said that the situation is “unsustainable” and that organizations need to do more to support their cybersecurity teams.
“Cybersecurity leaders can change the rules of engagement through collaborative design with stakeholders, delegating responsibility and being clear on what’s possible and what’s not, and why,” he said. He added that organizations should also make privacy a competitive advantage by leveraging their privacy advancements.

Gartner also predicted that by 2025, half of leaders will not use cyber risk quantification for decision making. It went to to say by 2026, 10% of large enterprises will have a comprehensive zero-trust program, compared to less than 1% currently.

The sources for this piece include an article in TechRepublic.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 20, 2024 -Ransomware gang claims it hit a Canadian internet provider

A ransomware gang claims it hit a Canadian internet provider. Welcome to Cyber Security Today. It's Monday May 20th,...

Resignations at OpenAI. Hashtag Trending for Friday, May 17, 2024

The question changes from “where’s Ilya” to what took so long?  Did Musk’s Neuralink team know there might...

Google does the unthinkable – reportedly erasing a 125 billion dollar pension fund

It's reported that Google inadvertently erased the Google Cloud account of UniSuper, an Australian pension fund valued at...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways