Is cybersecurity recession-proof? – TechTarget

kras99 – stock.adobe.com
During periods of economic uncertainty, the outlook often seems to change daily. In a single week, a great jobs report or slowing interest rate hikes might offset disappointing earnings reports — that is, until major companies start announcing massive layoffs.
In such turbulent times, prudent cybersecurity professionals might well question how a recession would affect their job security and the field at large.
The good news is that a full-blown recession is unlikely to have a major effect on cybersecurity job security and the cybersecurity industry at large for the following two reasons:
Considering these factors, it is hard to imagine a recession would seriously threaten cybersecurity job security at the macro level.
On the other hand, these professionals are responsible for challenging, high-stakes work and face substantial day-to-day risk, irrespective of economic conditions. Unfortunately, some security practitioners are likely to take the fall if — or, increasingly, when — an attack adversely affects their companies. On the micro level, cybersecurity job security may, therefore, be less assured, relative to other fields.
Of course, all the above is not to say a recession would have no effect on cybersecurity. Consider the following possible impacts.
A recession would likely influence the cybersecurity job market, if relatively indirectly. For instance, a worsening economy could push nonsecurity professionals to move into the field, due to declining job security in their previous positions.
Such an influx of newcomers could increase the comparative market value of longtime, experienced cybersecurity practitioners and their skill sets. To fully capitalize on this advantage, however, these professionals might need to be flexible about where they are willing to work geographically and how they practice their security trade. For example, professional opportunities could increase significantly in security consulting and educating and training those interested in pursuing security careers.
In a recession, even companies that survive have to deal with constrained budgets. And, while virtually everyone agrees security is essential, it is not always easy to demonstrate the ROI of any specific security product or process.
Security professionals’ best plan of attack is to build data-driven reports that clearly demonstrate the following:
The more specific, concrete benefits security managers can demonstrate in their reports, the better chance they have of justifying their budgets.
Increased budget pressure would drive security managers to look for ways to do more with less. As such, demand for the following security technologies would likely increase in a recession:
Note that one technology not on the above list is quantum computing. While there has been a lot of talk lately about its promise and potential for breaking existing encryption schemes, machines large enough to do so are years away. Quantum is, therefore, unlikely to have any near-term effects on enterprise security, in a recession or otherwise.
With help from automation and AI, self-healing networks promise to detect, remediate and even predict network problems. But can …
SD-WAN technology has its fair share of risk factors, some of which include cost reduction and management. Find out how your IT …
This analysis by SD-WAN Experts compares some of the major single-vendor SASE options in the market, looking at strengths, …
The EU’s Digital Markets Act will be fully in effect by March 2024. Companies that fail to comply could receive fines of up to …
In uncertain times, CIOs need to take appropriate measures to improve IT efficiency. These practical strategies can also …
IT investments underpin an organizational performance and help businesses gain a competitive edge. That’s why CIOs and IT leaders…
Each organization’s cost to migrate to Windows 11 will be slightly different depending on existing licenses, so IT teams should …
The end-user experience monitoring market is chock-full of options that can be confusing to keep track of. Take a look at nine …
When organizations look for software and services that can help monitor users, customers and IT system functionality, they need …
Without proper planning, an organization could end up feeling trapped in its relationship with a cloud provider. Follow these …
A cloud-first strategy has its fair share of advantages and disadvantages. Learn how to avoid risks and build a strategy that is …
Google Cloud lets you use startup scripts when booting VMs to improve security and reliability. Follow these steps to create your…
Researchers have found evidence of a broad Russian disinformation campaign targeting Arabic-speakers in the Middle East and North…
Ukrainian police have arrested members of a cyber crime gang who stole and embezzled millions of pounds from victims across Europe
Generative AI will play a central role over the next 10 years as the digital and physical world become more and more integrated
All Rights Reserved, Copyright 2000 – 2023, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information

source

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *