2015: Time to Rethink Enterprise IT Security

 
CONTINUE READING
Previous       Next

blackhat.com

July 2015                                                                            Previous              Next

2015 Black Hat Attendee Survey                                                       Previous              Next

2015: Time to                                                                            Previous            Next

Rethink Enterprise                                                                              Download

IT Security
In first-ever survey, sophisticated security professionals say enterprise security
priorities don’t address the most serious threats                                               Subscribe
Register
 Previous          Next

                                                                                                                                             2015 Black Hat Attendee Survey

 Previous                    Next

 Previous                   Next

                                          SYNOPSIS
                                                        Survey Name The 2015 Black Hat Attendee Survey

      Previous                     Next
                                                        Survey Date July 2015

                                                        Region North America
            Download
                                                        Number of Respondents 460

                                                        Purpose To gauge the attitudes and plans of one of the IT security industry’s most experi-
                                                        enced and highly-trained audiences: attendees of the Black Hat conference.
             Subscribe
                                                        Methodology In June 2015 Dark Reading and Black Hat conducted a survey of the Black Hat
                                                        USA conference attendees. The online survey yielded data from 460 management and staff
ABOUT US                                     RESEARCH   security professionals, predominantly at large companies, with 64% working at companies
For more than 17 years, Black
                                                        with 1,000 or more employees.
Hat has provided attendees
with the very latest in informa-
tion security research, devel-                          The greatest possible margin of error for the total respondent base (N=460) is +/- 4.5
opment, and trends. These                               percentage points. UBM Tech was responsible for all programming and data analysis. These
high-profile global events and                          procedures were carried out in strict accordance with standard market research practices.
trainings are driven by the
needs of the security commu-
nity, striving to bring together
the best minds in the industry.

More information is available
at: http://www.blackhat.com.

www.blackhat.com                                                                                                                                                  July 2015 2
Register
 Previous          Next

                                                                                                                                                       The 2015 Black Hat Attendee Survey

 Previous                 Next

 Previous                 Next
                                     2015: Time to Rethink Enterprise IT Security
      Previous              Next
                                    Executive Summary                                  cludes responses from 460 top-level secu-
                                    In 2015, enterprises will spend more than          rity experts, including some of the most IT
                                    $71.1 billion on information security – more       security-savvy professionals in the industry.
                                    than they have ever spent before, according        More than 61 percent of the respondents
            Download                to Gartner Group figures. Yet, the incidence       carry a full-time “security” job title, and 25
                                    of major data breaches – as evidenced by           percent are managers of the security effort
                                    compromises at corporations such as An-            in their organization. Nearly two-thirds of
                                    them, Sony, and many others – shows no             the respondents have received credentials
                                    signs of abating. As enterprises continue to       as Certified Information Systems Security
             Subscribe
                                    struggle with online attacks and data leaks,       Professionals (CISSP), and many also hold
                                    many are asking one common question:               other advanced credentials. Nearly half (47
                                    What are we doing wrong?                           percent) of the respondents work in organi-
                                      This year, we decided to put this ques-          zations that have 5,000 employees or more.         In short, the survey indicates that most en-
                                    tion – and many more – to one of the most             Clearly, these are the individuals who make   terprises are not spending their time, bud-
                                    security-savvy audiences in the industry:          information security happen in large organi-     get, and staffing resources on the problems
                                    those who have attended the annual Black           zations – the people who spend their days        that most security-savvy professionals con-
                                    Hat USA conference. Black Hat, a forum that        examining online exploits and data leaks         sider to be the greatest threats.
                                    features some of the most advanced security        and who develop and implement enterprise           In the study, the vast majority of security
                                    research in the world, is a destination for dis-   defenses. Yet, the 2015 Black Hat Attendee       professionals – 57 percent – cited sophis-
                                    cussion among top security minds, including        Survey reveals a disturbing gap between the      ticated, targeted attacks as their greatest
                                    leading ethical hackers, IT security manage-       priorities and concerns of these security-sav-   concern (Figure 1). Yet, only 26 percent of
                                    ment, and technology developers.                   vy individuals and the actual expenditure of     respondents indicated that targeted at-
                                      The 2015 Black Hat Attendee Survey in-           security resources in the average enterprise.    tacks were among the top three IT security
www.blackhat.com                                                                                                                                                                July 2015 3
Register
 Previous          Next

                                                                                                                                                                  The 2015 Black Hat Attendee Survey
                                                                                       Figure 1
 Previous                 Next
                                                                                        Of the following threats and challenges, which are of the
 Previous                 Next      spending priorities in their organization, and      greatest concern to you?
                                    only 20 percent of respondents said that tar-        Sophisticated attacks targeted directly at the organization
                                                                                                                                                                                             57%
                                    geted attacks were among the top three tasks         Phishing, social network exploits or other forms of social engineering
      Previous              Next
                                    where they spend the most time. Social en-                                                                                            46%
                                    gineering attacks, which were cited as a top         Accidental data leaks by end users who fail to follow security policy
                                                                                                                                   21%
                                    concern by 46 percent of respondents, are            Polymorphic malware that evades signature-based defenses
                                    similarly shortchanged in time and budget.
            Download                                                                                                             20%
                                                                                         Espionage or surveillance by foreign governments or competitors
                                    And potential threats posed by the Internet
                                    of Things, which ranked as the greatest con-                                                 20%
                                                                                         Security vulnerabilities introduced by my own application development team
                                    cern two years from now, are barely being                                                    20%
                                    addressed in current time or budget expen-           Data theft or sabotage by malicious insiders in the organization
                                    ditures.                                                                               17%
             Subscribe                                                                   Attacks or exploits on cloud services, applications, or storage systems used by my organization
                                      The 2015 Black Hat Attendee survey also re-                                        16%
                                    veals a serious shortage of IT security resourc-     Internal mistakes or external attacks that cause my organization to lose compliance with industry
                                    es in the days ahead. While nearly three quar-       or regulatory requirements
                                                                                                                     14%
                                    ters (73 percent) of respondents think it likely     Security vulnerabilities introduced through the purchase of off-the-shelf applications or systems
                                    that their organizations will have to deal with                                13%
                                    a major data breach in the year ahead, a ma-         Attacks on suppliers, contractors, or other partners that are connected to my organization’s network
                                                                                                                 12%
                                    jority also feel that they do not have enough        Data theft, sabotage, or disclosure by “hacktivists” or politically-motivated attackers
                                    budget, staff, and training to handle the load.                              12%
                                      And, for good or ill, this shortage of staff-      Surveillance by my own government
                                    ing and skilled resources has created a seller’s                       9%
                                                                                         Attacks or exploits brought into the organization via mobile devices
                                    market for the most security-savvy profession-                       8%
                                    als. Some 94 percent of security professionals       Digital attacks on non-computer devices and systems – the Internet of Things
                                    believe they would have little trouble finding                     7%
                                    another job, and while most are happy in their       Note: Maximum of three responses allowed
                                                                                         Data: UBM survey of 460 security professionals, June 2015

www.blackhat.com                                                                                                                                                                             July 2015 4
Register
 Previous          Next

                                                                                                                                                             The 2015 Black Hat Attendee Survey

 Previous                    Next

 Previous                    Next      current positions, nearly two thirds (63 per-        cent), vulnerabilities in software developed      the most time, and only 31 percent said that
                                       cent) say they would listen to a job opportu-        in-house (20 percent), polymorphic malware        social engineering attacks are among their
                                       nity posed by another employer.                      (20 percent), and cyber espionage (20 per-        top three tasks.
      Previous                 Next
                                         This report summarizes some of the results         cent) finished a mixed bag of third concerns        Similarly, IT security spending priorities
                                       from the survey and offers some insight on           (respondents were allowed to choose up to         differ significantly from the level of concern
                                       how the industry’s most knowledgeable se-            three). The data suggests that Black Hat at-      among security-savvy professionals. Just
FAST FACT                              curity professionals regard the current state        tendees are aware of potential exploits and at-   26 percent of respondents ranked targeted
            Download
57%
                                       of the industry – and their own situations.          tacks that could be created by outsiders, and     attacks as one of their top three priorities
                                       Clearly, the IT security industry has some sig-      this knowledge causes significant concern.        for spending. Accidental leaks (26 percent),
                                       nificant challenges ahead.                             Yet, when asked which defensive tasks           potential regulatory compliance issues (25
Consider sophisticated
                                                                                            consume the most time in the course of            percent), and security vulnerabilities intro-
attacks to be one of their
             Subscribe                 Priorities and Resources: A Troubling                their workday, security professionals offered     duced by internally developed applications
3 greatest concerns.
                                       Disparity                                            a very different picture. In response to this     (23 percent) also ranked most frequently
                                       As organizations struggle to find better, more       question, more than a third of Black Hat at-      among the top three spending priorities.
                                       efficient defenses against attack, perhaps the       tendees said that their most time-consum-         The widespread range of spending priori-
                                       most significant result from the 2015 Black          ing tasks are in addressing vulnerabilities       ties in the survey shows that budgets may
                                       Hat Attendee survey is the disparity between         introduced by internally developed software       be failing to keep up with the latest threats,
                                       the threats that keep security professionals         (35 percent) and vulnerabilities introduced       and that security professionals are not able
                                       awake at night and the tasks that keep them          by off-the-shelf software (33 percent). The       to tune that spending to meet their most
                                       occupied during the day.                             data suggests that application flaws across       current concerns. (Figure 3)
                                         At 57 percent, the list of security pros’ great-   the enterprise consume a great deal of time         Many security professionals feel that the
                                       est concerns was headed by sophisticated             for the IT staff, yet are seldom considered the   perception of current threats – both in the
                                       attacks targeted directly at the organization.       greatest threats. (Figure 2)                      media and among their managers and su-
                                       Phishing and social engineering constituted            By contrast, only 20 percent of security        pervisors — is different from their own. Close
                                       the second-greatest concern at 46 percent.           professionals counted targeted attacks as         to half (41 percent) of respondents believe
                                       Issues such as accidental data leaks (21 per-        one of the top three areas where they spend       that the media has overplayed the issue of
www.blackhat.com                                                                                                                                                                      July 2015 5
Register
 Previous          Next

                                                                                                                                                                 The 2015 Black Hat Attendee Survey
                                                                                       Figure 2
 Previous                 Next
                                                                                        Which consume the greatest amount of your time during
 Previous                 Next      domestic government surveillance, and more          an average day?
                                    than a quarter (27 percent) say the media fo-        Security vulnerabilities introduced by my own application development team
                                                                                                                                                                                                 35%
                                    cuses too heavily on hacktivists and politically     Security vulnerabilities introduced through the purchase of off-the-shelf applications or systems
      Previous              Next
                                    motivated attackers. Among management,                                                                                                                 33%
                                    security professionals perceive a high rate of       Phishing, social network exploits or other forms of social engineering
                                                                                                                                                                                    31%
                                    concern (29 percent) over malicious insiders,        Internal mistakes or external attacks that cause my organization to lose compliance with industry
                                    which was a top concern for only 17 percent of
            Download                                                                     or regulatory requirements
                                                                                                                                                                                   30%
                                    security professionals. And while many securi-
                                                                                         Accidental data leaks by end users who fail to follow security policy
                                    ty professionals believe their management has
                                                                                                                                                                      26%
                                    mirroring concern for targeted attacks (44 per-      Sophisticated attacks targeted directly at the organization
                                    cent) and social engineering (29 percent), they                                                                    20%
                                    still indicate a difference between their own        Polymorphic malware that evades signature-based defenses
             Subscribe                                                                                                                  14%
                                    level of concern and those of their managers.        Attacks or exploits on cloud services, applications, or storage systems used by my organization
                                      Similarly, many Black Hat attendees feel that                                           11%
                                    key threats are being overlooked. Twenty-six         Attacks or exploits brought into the organization via mobile devices
                                                                                                                    8%
                                    percent of respondents say that phishing and         Attacks on suppliers, contractors, or other partners that are connected to my organization’s network
                                    social engineering do not get enough atten-                                     8%
                                    tion in the media and at industry events. Acci-      Espionage or surveillance by foreign governments or competitors
                                                                                                                    8%
                                    dental data leaks by end users and new vulner-       Data theft or sabotage by malicious insiders in the organization
                                    abilities introduced by off-the-shelf software                              7%
                                    are also areas that are do not receive adequate      Data theft, sabotage, or disclosure by “hacktivists” or politically-motivated attackers
                                                                                                             6%
                                    attention, respondents said.
                                                                                         Digital attacks on non-computer devices and systems – the Internet of Things
                                      And the disparity between security profes-                             6%
                                    sionals’ concerns and mainstream concerns            Surveillance by my own government
                                    will likely continue to be significant, accord-               2%
                                    ing to survey data. More than a third of re-         Note: Maximum of three responses allowed
                                                                                         Data: UBM survey of 460 security professionals, June 2015

www.blackhat.com
Register
 Previous          Next

                                                                                                                                                                       The 2015 Black Hat Attendee Survey
                                                                                            Figure 3
 Previous                 Next
                                                                                             Which consume the greatest portion of your IT security
 Previous                 Next      spondents (36 percent) said they believe that            spending or budget?
                                    threats borne by non-computer devices – the               Accidental data leaks by end users who fail to follow security policy
                                                                                                                                                                                         26%
                                    Internet of Things (IoT) – will be among their            Sophisticated attacks targeted directly at the organization
      Previous              Next
                                    top concerns two years from now. Yet at the                                                                                                          26%
                                    moment, only 6 percent of respondents say                 Internal mistakes or external attacks that cause my organization to lose compliance with industry or
                                                                                              regulatory requirements
                                    IoT security constitutes a top security prior-                                                                                                      25%
                                    ity in time spent, and only 3 percent say it’s a
            Download                                                                          Security vulnerabilities introduced through the purchase of off-the-shelf applications or systems
                                                                                                                                                                               23%
                                    budget priority. (Figure 4)
                                                                                              Phishing, social network exploits or other forms of social engineering
                                                                                                                                                                            22%
                                    Increasing Threats Highlight Shortage                     Security vulnerabilities introduced by my own application development team
                                    of Security Resources                                                                                                                21%
                                       How likely is it that a particular enterprise will     Polymorphic malware that evades signature-based defenses
             Subscribe                                                                                                                                    15%
                                    experience a major breach in the coming year?             Data theft or sabotage by malicious insiders in the organization
                                    Business executives may continue to hope to                                                                   13%
                                    remain unscathed, but security professionals              Attacks or exploits on cloud services, applications, or storage systems used by my organization
                                                                                                                                              12%
                                    are facing the hard reality that their organiza-          Attacks or exploits brought into the organization via mobile devices
                                    tions probably will be next. Some 73 percent of                                               9%
                                    Black Hat attendees say it is likely that they will       Espionage or surveillance by foreign governments or competitors
                                    have to respond to a significant compromise in                                    6%
                                                                                              Attacks on suppliers, contractors, or other partners that are connected to my organization’s network
                                    the coming year: 13 percent say they have “no                                     6%
                                    doubt” about it, 24 percent say that it’s “highly         Data theft, sabotage, or disclosure by “hacktivists” or politically-motivated attackers
                                                                                                                  5%
                                    likely,” and 36 percent say that it’s “somewhat
                                                                                              Digital attacks on non-computer devices and systems – the Internet of Things
                                    likely.” Many security experts use the phrase,                        3%
                                    “It’s not a matter of if, but when.”                      Surveillance by my own government
                                       What will be the most likely point of entry?                    2%
                                    Nearly a third (33 percent) of security-savvy             Note: Maximum of three responses allowed
                                                                                              Data: UBM survey of 460 security professionals, June 2015

www.blackhat.com                                                                                                                                                                                  July 2015 7
Register
 Previous          Next

                                                                                          Figure 4                                                                  The 2015 Black Hat Attendee Survey

 Previous                 Next
                                                                                            Which do you believe will be of greatest concern two years
 Previous                 Next      IT pros say that “end users who violate secu-           from now?
                                    rity policy and are easily fooled by social engi-       Digital attacks on non-computer devices and systems – the Internet of Things
                                                                                                                                                                                            36%
                                    neering attacks” are the weakest links in the IT        Sophisticated attacks targeted directly at the organization
      Previous              Next
                                    security chain of defense. Interestingly, how-                                                                                                    33%
                                    ever, one-fifth of respondents are also worried         Espionage or surveillance by foreign governments or competitors
                                    about their own defense strategies, citing “a                                                                                  26%
                                                                                            Attacks or exploits on cloud services, applications, or storage systems used by my organization
                                    lack of security architecture and planning that
            Download                                                                                                                                       24%
                                    goes beyond firefighting” as their weakest link.        Attacks or exploits brought into the organization via mobile devices
                                    This attitude is also pervasive in IT security dis-                                                                  22%
                                                                                            Polymorphic malware that evades signature-based defenses
                                    cussions: A sense that the “layering” of single-                                                                     22%
                                    purpose technologies and solutions might be             Phishing, social network exploits or other forms of social engineering
                                    leaving too many cracks for attackers to get                                                                         22%
             Subscribe                                                                      Surveillance by my own government
                                    through. (Figure 5)                                                                                   15%
                                       A key reason for security professionals’ con-        Attacks on suppliers, contractors, or other partners that are connected to my organization’s network
                                    cerns about future attacks is the shortage of                                                   13%
                                                                                            Data theft, sabotage, or disclosure by “hacktivists” or politically-motivated attackers
                                    resources that they feel in their own orga-                                                  12%
                                    nizations. In the Black Hat Attendee Survey,            Security vulnerabilities introduced through the purchase of off-the-shelf applications or systems
                                    only 27 percent of respondents said they feel                                          10%
                                                                                            Accidental data leaks by end users who fail to follow security policy
                                    their organization has enough staff to de-
                                                                                                                           10%
                                    fend itself against current threats; nearly a           Data theft or sabotage by malicious insiders in the organization
                                    quarter (22 percent) described their security                                       9%
                                    departments as being “completely underwa-               Internal mistakes or external attacks that cause my organization to lose compliance with industry
                                                                                            or regulatory requirements
                                    ter.” (Figure 6) Similarly, only one third (34                                  8%
                                    percent) of security pros said their organi-            Security vulnerabilities introduced by my own application development team
                                    zation has enough budget to defend itself                                    7%
                                    against current threats; 21 percent said they            Note: Maximum of three responses allowed
                                                                                             Data: UBM survey of 460 security professionals, June 2015
www.blackhat.com                                                                                                                                                                                July 2015 8
Register
 Previous           Next

                                                                                                                                                                          The 2015 Black Hat Attendee Survey

 Previous                        Next

 Previous                        Next      are “severely hampered” in their defenses        Figure 5
                                           by a lack of funding.
                                             Even among security pros themselves,             What is the weakest link in today’s enterprise IT defenses?
      Previous                     Next
                                           there is a sense that a shortage of skills and     End users who violate security policy and are too easily fooled by social engineering attacks
                                           training may impair the ability to respond                                                                                                         33%
                                           to current threats. While 36 percent said          A lack of comprehensive security architecture and planning that goes beyond “firefighting”
                                                                                                                                                           20%
FAST FACT                                  they have the skills they need to do their
            Download                                                                          Mobile device vulnerabilities

36%
                                           jobs, some 55 percent said they could use                                         9%
                                           some training. Nine percent said they feel         Cloud services and cloud application vulnerabilities
                                                                                                                      7%
                                           they are ill-prepared to handle future at-         Signature-based security products that can’t recognize new and zero-day threats
Predict that IoT security will
                                           tacks or exploits they may encounter in the                                7%
be a top concern in two years.                                                                Vulnerabilities in internally-developed software
             Subscribe                     near future.
                                                                                                                  6%
                                             The central message that comes across in         An overabundance of security information and event data that takes too long to analyze
                                           all of these questions is that while sophisti-                      5%
                                           cated security professionals are increasingly      Vulnerabilities in off-the-shelf software
                                                                                                            4%
                                           convinced that a major breach is inevitable,
                                                                                              Web-based threats and the failure of SSL and digital certificates
                                           most of those security pros do not feel they                 3%
                                           have the resources and training they need          Single-function security tools and products that don’t talk to each other
                                           to defend their organizations. The combina-                  3%
                                                                                              PC, Mac and endpoint vulnerabilities
                                           tion of these responses should ring warning                  3%
                                           bells to the industry that security defense        Data: UBM survey of 460 security professionals, June 2015
                                           strategies and resources need serious re-
                                           thinking, and that the people who walk the       Enterprise Security Equals Job Security                       market for advanced security talent such as
                                           walls and guard the doors are not confident      The combination of a growing threat, per-                     those who attend Black Hat. Some 94 percent
                                           in their ability to keep online adversaries      ceived weaknesses in cyber defenses, and a                    of survey respondents feel that, should they
                                           out of enterprise systems and data.              shortage of skilled people has created a seller’s             need to make a change, they could get anoth-
www.blackhat.com                                                                                                                                                                                    July 2015 9
Register
 Previous          Next

                                                                                                Figure 6                                                                         The 2015 Black Hat Attendee Survey

 Previous                     Next
                                                                                                 Does your organization have enough security staff to defend
 Previous                     Next      er job “without too much trouble.” This indicates
                                                                                                 itself against current threats?
                                                                                                                                                                What staff?
                                        that many security professionals feel secure and
                                        mobile in their careers.                                                                                        5%                      Yes
                                                                                                 No, we are completely underwater
      Previous                  Next
                                          Interestingly, however, most security pros are
                                                                                                                                              17%                27%
                                        happy where they are – in fact, only 12 percent of
                                        respondents described themselves as actively job-
FAST FACT                               hunting today. 58 percent are not even updating
            Download
24%
                                        their resumes, and nearly a quarter (24 percent)                                                                  51%                    No, we could use a little help
                                        say they are happy in their jobs and it would take
                                        a lot to get them to change positions. (Figure 7)
are happy in their jobs and
                                          A key reason for their job satisfaction may be
have no plans to change.                                                                          Data: UBM survey of 460 security professionals, June 2015
             Subscribe                  the support security pros are getting from their
                                        management. As mentioned earlier, most of the           Figure 7
                                        survey respondents felt that their management
                                        had roughly the same priorities as they do. Near-
                                                                                                 Do you have plans to seek an IT security position anytime in
                                        ly a third of respondents described their non-IT         the near future?
                                        counterparts as supportive of IT security initia-         I am an indentured servant and would 1%
                                                                                                                                                                              Yes, I am actively looking for
                                                                                                         be beheaded if I tried to escape
                                        tives, and 81 percent indicated that they have                                                                                        employment right now
                                                                                                                                                                12%
                                        at least some support from non-IT management                       I really love my job and my           24%
                                        who “get” the security problem. This is a signifi-                 employerand it would take
                                                                                                              a LOT to get me to move
                                        cant shift from a few years ago, when many stud-                                                                                                No definite plans, but I am
                                                                                                                                                                      30%
                                        ies indicated that non-IT managers did not under-                                                                                               always updating my resume
                                                                                                                                                                                        and looking for a better post
                                        stand the security problem or how to support it.                                                              33%
                                                                                                 I’m not doing any active job research,
                                          In general, most security pros also feel that their    but if some other company called me,
                                        management is offering a growth path for their                                    I would listen
                                        careers. Some 38 percent said they know the next
                                                                                                  Data: UBM survey of 460 security professionals, June 2015
www.blackhat.com                                                                                                                                                                                                  July 2015 10
Register
 Previous          Next

                                                                                                                                                                                The 2015 Black Hat Attendee Survey

 Previous                 Next

 Previous                 Next      level they can reach on the corporate ladder           Figure 8
                                    and are actively working toward it. Another
                                    42 percent said they feel they know their op-            Do you have a clear, upward career growth path in your current
      Previous              Next
                                    tions and are pretty sure they “will be here for         place of employment?            I can’t type because I’m smashed up against this glass ceiling
                                    a while.” These figures suggest that only 20
                                    percent of security pros are looking for a new                                                                        3%
                                    position; with numbers like these, it seems
            Download                                                                                                                                                             Yes, I know the next step or level I can
                                    likely that it will continue to be difficult to find       No, I can’t see any clear path for
                                                                                                 growth and I’m thinking about               17%                                 get to and I am working toward it now
                                    security job candidates on the open market                            looking for another job
                                    for some time to come. (Figure 8)                                                                                              38%
                                                                                             I’m not sure, but I think I’m doing          11%
                                                                                                     a good job and I think my
             Subscribe              Conclusions                                                  employer will take care of me
                                    The 2015 Black Hat Attendee Survey offers                                                                             31%
                                    several takeaways that indicate a need to re-
                                    think the current enterprise IT security model.                                                                                      No, but I have some ideas about my options
                                                                                                                                                                         and I’m pretty sure I’ll be here a while
                                    Perhaps the most important of these is that
                                                                                              Data: UBM survey of 460 security professionals, June 2015
                                    security pros are not spending their time and
                                    budget in a manner that is commensurate                continuous pressure on security staffs and                             Finally, the shortage of available security
                                    with their concerns about current threats.             departments, even in the largest and most                            talent will likely continue in days to come.
                                    While issues such as compliance and appli-             security-savvy organizations. Most security                          While most security pros feel confident in
                                    cation security take a significant amount of           pros feel that they do not have enough peo-                          their ability to change jobs, the vast majority
                                    their time, they need greater leeway to focus          ple, budget, or training to handle the current                       are happy in their current positions and feel
                                    on emerging threats such as targeted attacks           threat, and most have not yet begun to ad-                           they are well-supported by management.
                                    and social engineering exploits that pose the          dress what security pros believe will be their                       Finding sophisticated professionals, such as
                                    greatest danger to their organizations.                greatest concern two years from now: the In-                         those in the Black Hat attendee base, will not
                                      The growing online threat also is putting            ternet of Things.                                                    be easy in the future.
www.blackhat.com                                                                                                                                                                                                July 2015 11
You can also read