51% say automation will result in job loss for IT security pros
.jpg)
For IT security professionals, automation is reducing stress levels in the short term but threatening job security in the future.
A majority of companies are still having a hard time finding and keeping qualified IT security people, according to a new survey by the Ponemon Institute and DomainTools. At the same time, 51% of respondents believe that automation will cut the headcount in the security department, up from 30% in last year's study.
Also, 37% of respondents think they will lose their jobs in the next four years.
"The 2020 Study on Staffing the IT Security Function in the Age of Automation" found a strange reality that combined hiring challenges and some positive impacts of automation with predictions of smaller security teams in the near future.
The survey of 1,027 IT security professionals in the US and the UK found that short-handed security teams are glad to have help in triaging the increasing amount of daily alerts, which was 407 in 2019 but up to 468 in 2020.
Seventy-four percent of respondents said automation allows staff to focus on more serious vulnerabilities and overall network security. Only 42% said automation helps with time intensive, manual processes that are mission critical but not a good use of staff time.
Among the 24% of companies that are not using automation, the top two reasons were a lack of in-house expertise and a heavy reliance on legacy IT.
James Litton, CEO and co-founder of Identity Automation, said that artificial intelligence and machine learning are not ready to take over most security tasks.
"In terms of serious decision making, it's nowhere close to being able to take one the role of making good pragmatic decisions for business," he said.
Fifty-four percent of survey respondents agreed, stating that automation will never replace human intuition and hands-on experience.
Litton said the best application he sees for AI and ML is increased authentication based on a user's habits. An algorithm could monitor an individual's behavior and flag actions that stray outside the normal routine.
"If a user doesn't usually access Oracle financials in the middle of the month, and you see that occur, it could raise a red flag for further authentication," he said.
The 2020 survey asked IT pros about the pros and cons of automation as well as what solutions they are using to protect company assets.
Benefits of automating IT security
On the bright side, 60% of respondents say automation is helping to reduce the stress on the security team. Also, 43% said automation is reducing the rate of false positive and false negative reports.
The security work most likely to be automated now or to become automated in the next three years includes:
- Log analysis 68%
- Threat hunting 60%
- Malware analysis 57%
- Pen testing 47%
- Incident response 40%
In the 2019 survey, only 15% of respondents said that DevOps was a likely candidate for automation but this year that was up to 37%.
Respondents said these were the top 5 benefits of automation:
- Increases productivity
- Reduces false positives and false negatives
- Increases the speed of analyzing threats
- Improves the ability to prioritize threats
- Accelerates the containment of infected endpoints/devices/hosts
Drawbacks of automation
In this year's survey, more respondents said automation will reduce the headcount of the IT security team at 51% up from 30% in 2019.
Also, fewer people agreed with the idea that automation would increase the need to hire people with more advanced technical skills, 43% in 2019 as compared to 35% in 2020.
Slightly more people think automation will make jobs more complex, 50% in 2020 vs. 47% in 2019. More people said automation is not capable of performing certain tasks that humans can do, 74% in 2020 and 68% in 2019.
Finally, 10% more respondents said automation is not able to catch certain threats, 45% in 2020 and 35% in 2019.
About the online poll
The Ponemon Institute, with sponsorship from DomainTools, conducted an online survey of 1,027 IT and IT security practitioners in the US and the UK who are responsible for hiring, promoting and retaining IT security employees. Respondents have been at their current position for an average of 6.5 years and have an average of 9.3 years of relevant experience.
source techrepublic
Industry: Cyber Security

Latest Jobs
-
- Identity Channel Partner Manager | London
- London
- N/A
-
Identity Channel Partner Manager | London Location: South East UK (commutable to London) We are working with a Cyber Security business who are looking for a Channel Partner Manager to drive and grow relationships across their identity ecosystem. Prior experience working within VARs, distributors, vendors or resellers in the identity space is essential. You must have experience working with technologies such as CyberArk, Sailpoint, Okta etc Responsibilities will include, but not be limited to: Build, maintain and develop strong relationships with channel partners. Work closely with partner sales teams to support growth drive sales opportunities. Identify and onboard new partners while strengthening existing partnerships. Act as the key point of contact for all channel-related activity. If you are an experienced channel professional, with experience in the Identity space and are ready for your next challenge, apply today.
-
- Microsoft Security Operations Analyst | Bracknell | SC Clearable | SC-200
- Reading
- N/A
-
Senior SOC Analyst Level 2 / 3. Microsoft Security stack | SC Clearable Location: Hybrid remote | Berkshire SC-200 Senior SOC Analyst Level 2 / 3 to join a specialist Managed Security Services business. You will be responsible for advanced threat hunting / triage, incident response etc with a strong focus on the Microsoft Security Stack. Key Responsibilities: Lead and resolve complex security incidents / escalations Conduct advanced threat hunting using the Microsoft Security Stack. Build, optimise and maintain workbooks, rules, analytics etc. Correlate data across Microsoft 365 Defender, Azure Defender and Sentinel. Perform root cause analysis and post-incident reporting. Aid in mentoring and upskilling Level 1 and 2 SOC analysts. Required Skills & Experience: The ability to achieve UK Security Clearance (SC) - existing clearance ideal. (Sorry no visa applications) Must have current experience working with a SOC environment Key experience must also include, but not be limited to Development and tuning of custom analytic rules. Workbook creation and dashboarding. Automation using Playbooks and SOAR integration. Kusto Query Language (KQL).