Feeds

Boom times ahead for IT security profession

Big bucks for fighting bad guys

  • alert
  • submit to reddit

Security for virtualized datacentres

Boom times are ahead for security pros. The information security workforce will expand by an estimated 13.7 per cent annually to reach 2.1m workers by 2008. Approximately 680,000 of this expanded workforce will work in Europe.

The (ISC)2 2004 Global Information Security Workforce Study found the wider use of internet technologies, a dynamic threat environment and increasingly stringent government regulations are driving the growth of the profession. The 1.3m information security professionals currently employed will see their ranks swell by more than 60 per cent within five years, according to IDC, which conducted the study on behalf of security certification body (ISC)2.

Show me the money

IDC analysed responses from 5,371 full-time information security professionals in 80 countries worldwide, with nearly half employed by organisations with $1bn or more in annual revenue. The web-based study is described as the first major study of the global information security profession ever undertaken.

On average survey respondents had 13 years work experience in IT and seven years specialised security experience. This wealth of skill is often well rewarded. Around 10 per cent of the survey participants in both the US earned more than $125,000 per annum; 22 per cent of US residents who took part in the survey earned between $100,000-$120,000 a year (Europe 16 per cent). At the other end of the scale, five per cent of security pros in the states and nine per cent in Europe earn less than $50,000. In Asia, 60 per cent of security professionals earn less than $50,000.

Gizza job

Managers hiring security professionals (93 per cent) said certification was important in choosing potential recruits; but commercial awareness is also becoming increasingly important.

"The study shows a shift in the information security profession, indicating that business acumen is now often required along with technology proficiency," said Allan Carey, the IDC analyst who led the study. "This widening responsibility means information security professionals not only have to receive a constant refresh of the best security knowledge but also must acquire a solid understanding of business processes and risk management to be successful in their roles."

"With competing demands on industry and government to expand access to services and information, the highly trained and experienced information security professional must now be an active participant to fulfil stringent regulatory requirements and provide proactive solutions to circumvent emerging risks," he added. ®

Related stories

Public sector snaps up IT pros
Bosses warned on employment 'myths'
Top security graduates offered bursaries
Big.biz struggles against security threats

Remote control for virtualized desktops

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.