{"id":188,"date":"2020-12-08T19:36:42","date_gmt":"2020-12-08T19:36:42","guid":{"rendered":"http:\/\/bosframework.com\/blog\/?p=188"},"modified":"2020-12-08T19:39:53","modified_gmt":"2020-12-08T19:39:53","slug":"the-security-expert-is-dead-long-live-the-security-expert","status":"publish","type":"post","link":"https:\/\/bosframework.com\/blog\/the-security-expert-is-dead-long-live-the-security-expert\/","title":{"rendered":"The security expert is dead. Long live the security expert."},"content":{"rendered":"\n<p>If 2020 has proven anything, it\u2019s that the expert-driven model for cloud engineering and business software security is dead. It simply cannot scale with the demand of our times.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"319\" height=\"214\" src=\"https:\/\/i0.wp.com\/bosframework.com\/blog\/wp-content\/uploads\/2020\/12\/Ask-an-expert.jpg?resize=319%2C214&#038;ssl=1\" alt=\"\" class=\"wp-image-197\" srcset=\"https:\/\/i0.wp.com\/bosframework.com\/blog\/wp-content\/uploads\/2020\/12\/Ask-an-expert.jpg?w=319&amp;ssl=1 319w, https:\/\/i0.wp.com\/bosframework.com\/blog\/wp-content\/uploads\/2020\/12\/Ask-an-expert.jpg?resize=300%2C201&amp;ssl=1 300w\" sizes=\"auto, (max-width: 319px) 100vw, 319px\" \/><\/figure><\/div>\n\n\n\n<p>The larger enterprises with the ability to pay an increasing market rate for experts continue to scoop up the available talent while the mid-market and below &#8211; without the experts &#8211; become the next best target for hackers. They can\u2019t find the talent, can\u2019t pay the talent, nor can they afford the massive consulting engagements that have traditionally serviced digital transformation needs.<\/p>\n\n\n\n<p>This has driven hackers to the mid-market and made it the fastest growing target of cyber attacks in 2020.&nbsp;<\/p>\n\n\n\n<p>At least weekly, I am reading about a new survey or research study or article that is describing the increasing demands and pressures on CIOs and CTOs that Covid has ignited. Here are just a few snippets I\u2019ve come across in the last couple of weeks:<\/p>\n\n\n\n<p><em>Ransomware attacks spiked more than 100% in 2020 \u2014most notably against healthcare organizations.<\/em><\/p>\n\n\n\n<p><em>Middle market companies, especially, have a unique challenge: They must learn to navigate the (digital transformation) journey without the more robust resources of their larger peers, nor the same level of flexibility and agility as their younger ones. They must start the journey today &#8211; and those that do are already behind.<\/em><\/p>\n\n\n\n<p><em>Small and medium-sized businesses simply don\u2019t have the resources or the technical acumen to understand the (ransomware) threat environment that they live in.<\/em><\/p>\n\n\n\n<p><em>Almost all (96%) of health systems, hospitals and physician organizations surveyed felt that data attackers are outpacing their medical enterprises.<\/em><\/p>\n\n\n\n<p><em>Nearly three quarters (75%) of health systems, hospitals and physician organizations surveyed reported that their infrastructures are unprepared to respond to attacks.<\/em><\/p>\n\n\n\n<p>And as a result:<\/p>\n\n\n\n<p><em><strong>2020 marks the first time in more than a decade that IT security skills have topped the list of global tech skills shortages.<\/strong><\/em><\/p>\n\n\n\n<p>Let\u2019s be clear about something: this isn\u2019t just a job shortage. The combination of the security skills gap, the growth of cyber attacks, and the fact that every company is now a software company is an existential threat to our economy. In fact, 60% of small businesses are out of business within 6 months of an attack.&nbsp;<\/p>\n\n\n\n<p>To meet this new reality, we must approach cloud engineering and security differently. We must reduce our dependence on individual experts and find ways to scale their knowledge more efficiently and effectively. We have to automate where possible the engineering principles and practices of the experts and make those available to a broader audience. In other words, we need to transform business software the way software has transformed nearly every other business.&nbsp;<\/p>\n\n\n\n<p>If we don\u2019t change our approach, if we don\u2019t make enterprise-grade cloud engineering and security available to more businesses, everyone but the largest enterprises are merely crossing their fingers and hoping not to be attacked. This is a gamble businesses shouldn\u2019t have to make.<\/p>\n\n\n\n<p>To learn more about how BOS can help, drop us an email: contact@BOSframework.com\u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>__<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/www.csoonline.com\/article\/3597928\/top-covid-19-security-stats.html?utm_campaign=IDG%20Insider\">https:\/\/www.csoonline.com\/article\/3597928\/top-covid-19-security-stats.html?utm_campaign=IDG%20Insider<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/www.bdo.com\/insights\/business-financial-advisory\/strategy,-technology-transformation\/digital-transformation-survey\/business,-reinvented-pioneering-digital-transform\">https:\/\/www.bdo.com\/insights\/business-financial-advisory\/strategy,-technology-transformation\/digital-transformation-survey\/business,-reinvented-pioneering-digital-transform<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/www.csoonline.com\/article\/3575365\/ransomware-attacks-growing-in-number-severity-why-experts-believe-it-will-get-worse.html?utm_source=Adestra&amp;utm_medium=email&amp;utm_content=Title%3A%20Ransomware%20attacks%20growing%20in%20number%2C%20severity%3A%20Why%20experts%20believe%20it%20will%20get%20worse&amp;utm_campaign=IDG%20Insider&amp;utm_term=Editorial%20-%20IDG%20Insider&amp;utm_date=20201112162102&amp;huid=f0273d42-4396-4810-bb08-ba7ab0f38adb\">https:\/\/www.csoonline.com\/article\/3575365\/ransomware-attacks-growing-in-number-severity-why-experts-believe-it-will-get-worse.html?utm_source=Adestra&amp;utm_medium=email&amp;utm_content=Title%3A%20Ransomware%20attacks%20growing%20in%20number%2C%20severity%3A%20Why%20experts%20believe%20it%20will%20get%20worse&amp;utm_campaign=IDG%20Insider&amp;utm_term=Editorial%20-%20IDG%20Insider&amp;utm_date=20201112162102&amp;huid=f0273d42-4396-4810-bb08-ba7ab0f38adb<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">&nbsp;2020 State of the Healthcare Cybersecurity Industry Report<\/p>\n\n\n\n<p class=\"has-small-font-size\">&nbsp;2020 State of the Healthcare Cybersecurity Industry Report<\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/www.techrepublic.com\/article\/cybersecurity-skills-in-short-supply-as-covid-19-tests-resilience-of-businesses-and-employees\/\">https:\/\/www.techrepublic.com\/article\/cybersecurity-skills-in-short-supply-as-covid-19-tests-resilience-of-businesses-and-employees\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-cybercrime-magazine\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"SjIZ6VM2nM\"><a href=\"https:\/\/cybersecurityventures.com\/60-percent-of-small-companies-close-within-6-months-of-being-hacked\/\">60 Percent of Small Companies Close Within 6 Months of Being Hacked<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;60 Percent of Small Companies Close Within 6 Months of Being Hacked&#8221; &#8212; Cybercrime Magazine\" src=\"https:\/\/cybersecurityventures.com\/60-percent-of-small-companies-close-within-6-months-of-being-hacked\/embed\/#?secret=5dD9dGMmzw#?secret=SjIZ6VM2nM\" data-secret=\"SjIZ6VM2nM\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>If 2020 has proven anything, it\u2019s that the expert-driven model for cloud engineering and business&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7,8,2],"tags":[10,11,12,17],"class_list":["post-188","post","type-post","status-publish","format-standard","hentry","category-business","category-security","category-technology","tag-cloud-engineering","tag-cloud-engineering-platform","tag-cloud-security","tag-cybersecurity"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":6,"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":201,"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/posts\/188\/revisions\/201"}],"wp:attachment":[{"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/media?parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/categories?post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bosframework.com\/blog\/wp-json\/wp\/v2\/tags?post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}