HomeCII/OTCybersecurity Professionals Facing Burnout Due to Increased Weekly Hours

Cybersecurity Professionals Facing Burnout Due to Increased Weekly Hours

Published on

spot_img

Cybersecurity Workforce Faces Increased Demands and Challenges Amid Workforce Strain

According to a recent survey conducted by Sapio Research, cybersecurity professionals in the United States are logging an alarming average of 10.8 extra hours each week, exceeding their contracted work schedules. This additional workload essentially translates to an extra sixth workday for a significant portion of those in the field. The study, which surveyed 300 cybersecurity and IT leaders, revealed that nearly half of the respondents are committing more than 11 hours of overtime per week, with one-fifth reporting more than 16 hours of additional work.

This escalating demand is taking a toll on mental health. Nearly 50% of those surveyed conveyed that their jobs are emotionally exhausting more often than they find them rewarding—a sentiment particularly acute among C-level executives. Many cybersecurity professionals reported facing significant backlogs upon returning from any time off, which has led to heightened stress levels. Moreover, approximately one-third of the respondents experience anticipatory anxiety regarding the upcoming week’s work every single week.

Despite the considerable pressure and stress, an overwhelming 94% of the respondents affirmed that they would still choose a career in cybersecurity if given the opportunity again. The majority of individuals expressed unwavering enthusiasm for their current career path, indicating a passion for the field that outweighs the burdens they face.

A Shift Toward Interpersonal Skills

As the landscape of cybersecurity evolves, so too does the skill set required for success. Over 80% of cybersecurity leaders indicated that the importance of human-centric skills—such as communication, influence, and stakeholder management—has increased notably over the past five years. The rapid adoption of AI tools appears to be a driving force behind this shift, as leaders report feeling an increased need to bolster their interpersonal and business skills in response to these technological advancements.

Interestingly, the emphasis on interpersonal skills is more pronounced in smaller organizations compared to larger enterprises. Most respondents noted that their roles increasingly demand cross-functional collaboration and alignment with overarching business strategies, changing the way cybersecurity is perceived within organizations.

Emerging Priorities in Cybersecurity Roles

When asked to identify the competencies that will shape the future of cybersecurity professionals, AI oversight and governance emerged as the most critical element, with 73% of leaders prioritizing it. In the rankings that followed, technological engineering proficiency, cross-functional communication, and strategic leadership all garnered equal attention, mentioned by around half of the participants.

The data suggests a noticeable shift away from manual technical execution, indicating that practitioners are expected to assume greater management roles. These roles include overseeing automated systems, auditing AI outputs, and ensuring that security measures align with organizational objectives.

However, many organizations are assigning AI governance responsibilities to existing security leaders without redefining job roles or responsibilities. Ravid Circus, the Chief Product Officer at Seemplicity, emphasized that adding AI oversight responsibilities without restructuring teams merely exacerbates burnout. He advocates for the establishment of dedicated AI governance functions that integrate into security teams, complete with defined accountability and decision frameworks that clarify human intervention requirements.

Budget Constraints Versus Training Shortfalls

While nearly two-thirds of respondents reported that their organizations have adequate budgets to implement AI technologies—confidence being especially pronounced among smaller businesses—more than half expressed concerns regarding the sufficiency of the training available for effective human-AI collaboration. Circus articulated this disconnect, stating that budget limitations are not the core issue; rather, organizations are purchasing tools without investing in practical training tailored to specific roles.

Organizations are currently deploying AI tools without equipping their personnel with the necessary training to manage these systems effectively. This gap results in cybersecurity leaders shouldering governance burdens through manual efforts rather than benefiting from structured training initiatives. The lack of clarity regarding accountability and decision-making workflows contributes to operational friction, which, in turn, heightens stress levels among team members.

Building Trust Through Transparency

Cybersecurity leaders indicate that consistent, measurable accuracy over time is paramount for trusting AI systems. They also value clear accountability, human override controls, and transparency in decision-making processes. Interestingly, leaders exhibit significantly more trust in their internal teams than in third-party vendors. In fact, 87% expressed either complete or mostly strong trust in their internal teams to utilize AI responsibly, whereas only 77% expressed similar trust in external vendors.

To bridge this trust gap, Circus suggests that vendors should enhance their products by incorporating explainability features, complete with audit trails and effective human override controls. By fostering openness about where AI models may falter, vendors can help security leaders manage the complexities of governance.

In conclusion, as the cybersecurity landscape continues to evolve with increasing complexity and AI integration, organizations are urged to adapt their structures and training frameworks accordingly. The need for greater interpersonal skills, defined governance roles, and effective training will be crucial for addressing the pressure faced by cybersecurity professionals and ensuring the overall efficacy and reliability of their roles within organizations.

Source link

Latest articles

Surviving Ransomware: Top Strategies to Protect Your Business

Understanding Ransomware: Key Steps for Business Preparedness In the ever-evolving landscape of cybersecurity, the phrase...

ACI Connect for Cards Unifies Card, A2A Payments, and Fraud Management on a Single Platform

ACI Worldwide Unveils ACI Connetic for Cards: A Groundbreaking Card Payments Solution ACI Worldwide recently...

Cybersecurity Leadership in Identity, Access, and Complexity

CEOs and CISOs on Coping with the Challenges of a...

Google Prepares Quantum-Safe Chrome Certificates

Google Enhances Chrome Security with Transition to Merkle Tree Certificates In a significant move towards...

More like this

Surviving Ransomware: Top Strategies to Protect Your Business

Understanding Ransomware: Key Steps for Business Preparedness In the ever-evolving landscape of cybersecurity, the phrase...

ACI Connect for Cards Unifies Card, A2A Payments, and Fraud Management on a Single Platform

ACI Worldwide Unveils ACI Connetic for Cards: A Groundbreaking Card Payments Solution ACI Worldwide recently...

Cybersecurity Leadership in Identity, Access, and Complexity

CEOs and CISOs on Coping with the Challenges of a...