Top 4 industries for cybersecurity jobs - Security Boulevard

Top 4 industries for cybersecurity jobs

Defending against cybercrime

Cybercrime bears tremendous costs for organizations, with some estimates showing the annual cost of cybercrime to reach $6 trillion by 2021. But while there’s no shortage of cybercriminals, the growing cybersecurity talent gap means employers have to work hard to attract top workers. In the United States, the average supply-to-demand ratio across all industries is five to one, versus only two to one for cybersecurity — and geographically, the shortage is the same across the country. 

With no industry immune to cyberattacks, you can find a job just about anywhere as a cybersecurity analyst, engineer or any other number of cybersecurity specialties. Still, some sectors may feel more attractive or have a stronger need for talent. Here’s a list of the top industries for cybersecurity jobs (not listed in any order of ranking).

Healthcare sector: Big magnet 

Healthcare organizations face a double whammy: Not only are they a bigger target but they also have higher costs of data breaches. 

In 2019, the healthcare industry had the second-highest number of publicly reported data breaches — 525 out of 1,473, according to the Identity Theft Resource Center. The highest was the business sector, with 644 breaches, but it could be argued that the business sector definition is broad and encompasses a variety of verticals.

As for costs, the 2019 Cost of a Data Breach Report by IBM Security showed that it cost healthcare organizations globally 65 percent more for data breaches than the average for all industries. Compliance is one of the factors driving up the costs, as the Healthcare Insurance Portability and Accountability Act (HIPAA) mandates a variety of patient data privacy safeguards and imposes steep fines for noncompliance.

These factors — as well as other unique concerns such as the proliferation of connected medical devices (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Rodika Tollefson. Read the original post at: