Feeds

Japan needs 80,000 EXTRA info-security bods to stay safe

Chronic shortage of 'outstanding manpower' in the Far East

High performance access to file storage

Japan has an 80,000 shortfall in infosec professionals, and needs to provide extra training for more than half of those currently in the industry, if it’s to protect key IT systems from attack, according to the government.

A government panel of information security experts met back in June to draw up a long term plan to address Japan’s chronic shortage of trained infosec pros, according to Kyodo news agency.

The panel apparently concluded that aside from the 80,000 new recruits, some 160,000 of the 265,000 currently in the industry need additional training to bring them up to speed on the latest threats.

The strategy calls for a review of the current qualification system for info-security professionals as well as an update to university and other courses in the field.

The aim is apparently not only to boost numbers but to find “manpower with outstanding abilities” – which is easier said than done, especially when budgets are tight and graduates continue to favour other careers.

One way Japan is trying to overcome the shortage is through hacking competitions and training camps, according to Kyodo.

The Information-Technology Promotion Agency, overseen by the Ministry of Economy, Trade and Industry, is responsible for these and has also apparently been given budget to hire a dozen info-security grads every year.

It’s unclear how the government plans to encourage the tens of thousands more needed into the industry.

Cyber security skills shortages and gaps are endemic pretty much all over the developed world.

Certifications body ISC2 interviewed over 12,000 members to compile its sixth annual Global Workforce study, published in February. Some 56 per cent said there is a workforce shortage, compared to 2 per cent that believe there is a surplus, with "security analysts" (47 per cent) most in demand.

In the UK, the National Audit Office said in its Landscape Review report earlier this year that “it could take up to 20 years to address the skills gap at all levels of education”. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.