Edge UOL

    Discover how we transform IT and strengthen the security of the top companies in the market.

    Who we are Careers News

    Cyber Defenseseta

    Integrated security to detect, prevent, and respond to threats.

      Security Operations Center (SOC) Brand Protection | CTI Incident Response Web Application Protection (WAF) Firewall as a Service (FWaaS) Network Access Security Vulnerability Management Patch Management Endpoint Protection Pentest

    Cyber Resilienceseta

    Continuity and recovery to keep your business always running.

      Disaster Recovery as a Service (DRaaS) Anti-ransomware Data Protection Secure Desktops Access Management Data Loss Prevention (DLP)

    Cyber Governanceseta

    Compliance and security culture to elevate your company’s cyber maturity.

      Governance, Risk and Compliance Consulting Security Awareness & Training CIS Controls Maturity Assessment

    ManageEngineseta

    Take control of your company’s IT with integrated and secure management tools.

      Identity and Management Access Service Management Unified Endpoint and Security Management IT Operations Management Security Event Management Analytics

    Hybrid Cloud & Infrastructureseta

    Hybrid and integrated infrastructure to support the evolution of your business.

      Hybrid Cloud | Private Cloud Hosting | Colocation Network Segmentation & Integration

    Edge VMware Cloudseta

    Use hybrid cloud with the security of having the support of one of the most important players in the market.

      Disaster Recovery as a Service (DRaaS) Secure Desktops Edge Computing Network Segmentation & Integration

    IT Servicesseta

    Specialized services to operate and evolve your IT efficiently.

      Cloud Services Intelligent Monitoring and Observability Database, Operating Systems and Network Management ITSM and IT Governance Integration and DevSecOps SAP Basis Consulting Squads

    Private Networksseta

    Provide your company with Private Network solutions that only an end-to-end integrator can offer.

      Consulting Network Management Private Network Implementation (4G and 5G)

    Hosting and Colocationseta

    Outsource efficiently, maintaining control over everything your company needs.

      Colocation

    Payment Solutionsseta

    Handle payment and invoice issuance with credibility, efficiency, and data security.

      BPag - Payment gateway Notanet - Invoice issuing platform
Partners Cases

    Tech Insights

    Tech Insights seta

    Articles, events, and information to go beyond and dive deep into each technology. Be inspired to transform your company.

    Articles E-books Events Web series

    Tech Universe seta

    Learn about technological innovations and how they can benefit your company.

Contact Us EN
  • EN - Inglês
  • BR - Português (Brazil)
Article/

The Cybersecurity Professional and the Hunt for Gold

October 13th, 2023
Career Cybersecurity
By Fabio Augusto
The Cybersecurity Professional and the Hunt for Gold

Finding that “Expert” Cybersecurity professional may no longer be a company’s dream, but rather its nightmare! Indeed, the situation could get worse.

In a study conducted by (ISC)², the “ISC2-Cybersecurity-Workforce-Study-2021”, it was estimated that there are a total of 4.19 million professionals working in cybersecurity worldwide. The study also makes a long-term recommendation, suggesting a 65% growth in these same professionals.

Brazil ranks first in terms of professional scarcity, with an estimated gap of 441,000, followed by the USA with 377,000 and Mexico with 260,000.

Real Consequence of Staff Shortage, https://www.isc2.org//-/media/ISC2/Research/2021/ISC2-Cybersecurity-Workforce-Study-2021.ashx

This gap represents a major cyber risk for companies and society as a whole. It is due to the lack of people in these roles that business systems — or those supporting critical infrastructure like hospitals and energy companies — will become even more vulnerable. The accelerated pace of technological innovation, adaptations in business systems, and new remote work models (WFH – working-from-home and working-from-anywhere) expose companies to a high potential for cyber risk.

The same (ISC)² research points out that the lack of professionals leads to real consequences, such as misconfigured systems, a lack of opportunity to assess and manage cyber risks, as well as an increase in time spent on software patch remediation, among other less representative issues.

The Global Cybersecurity Gap by Country, https://www.isc2.org//-/media/ISC2/Research/2021/ISC2-Cybersecurity-Workforce-Study-2021.ashx

“Security control provisioning” represents a 48% real need for focused personnel, followed by 47% for Analysis, Protection, and Defense. This is a gap widely exploited by attackers while they assess and execute attacks on organizations. Corporate inefficiency in vulnerability and cyber risk management extends the window of opportunity for security breaches to be exploited with more ease.

We know that companies need to meet delivery schedules — the famous “Deploy” of new systems — or even make changes/adaptations to technological environments already in production. However, it is in these moments that potential security breaches are created if there are no qualified people to provision controls.

The global need for Cybersecurity professionals may still represent a significant challenge for companies with opportunities in Brazil — a country that, compared to others, is becoming less attractive due to currency devaluation, quality of life, safety, and/or the possibilities of “work-from-home (WFH)” or “working-from-anywhere (WFA)” models.

 

Tags:
CibersegurançaCyber DefenseTechnology

Related

Brand Protection | CTI Cyber Defense Cybersecurity

VirusTotal: The "X-Ray" of Files and Links in the Digital World

Clayton Oliveira
Cyber Defense Cybersecurity

Cyber Threat Intelligence (CTI): The Intelligence Behind Your Digital Protection

Clayton Oliveira
Business

The importance of active listening in pre-sales

Adrielle Santana
Infrastructure Services IT Services Managed Services

AI Operations: The Real Transformation of IT Services for Business

Leonardo Schumacher

Get in touch

Our team of experts is ready to support your company with solutions that enhance performance and security.

Contact usseta
Logo Edge UOL

Edge UOL

Who we are Careers News

Partners

Case Studies

Solutions

Cyber Defense Cyber Resilience Cyber Governance Hybrid Cloud & Infrastructure IT Services Payment Solutions

Tech Universe

Cybersecurity Cloud Computing Payment Gateway ITSM and IT Governance Autonomous Operations Digital Transformation

Tech Insights

Articles E-books Events Web series

Contact Us

Grupo UOL
Privacy Policy
Terms of use
Information security
Quality management policy
Accessibility
facebook Edge UOL linkedin Edge UOL youtube Edge UOL instagram Edge UOL
© Edge UOL - 2021 - 2026 - All rights reserved
Logo LVT