A Roadmap to Address Burnout in the Cybersecurity Profession: Outcomes from a Multifaceted Workshop
- URL: http://arxiv.org/abs/2502.10293v1
- Date: Fri, 14 Feb 2025 16:55:13 GMT
- Title: A Roadmap to Address Burnout in the Cybersecurity Profession: Outcomes from a Multifaceted Workshop
- Authors: Ann Rangarajan, Calvin Nobles, Josiah Dykstra, Margaret Cunningham, Nikki Robinson, Tammie Hollis, Celeste Lyn Paul, Charles Gulotta,
- Abstract summary: It is imperative to explore the causes and consequences of burnout through a socio-technical lens.
Nearly 46% of cybersecurity leaders contemplating departure from their roles.
Central to the analysis is an empirical study of former National Security Agency (NSA) tactical cyber operators.
- Score: 1.0188519086606078
- License:
- Abstract: This paper addresses the critical issue of burnout among cybersecurity professionals, a growing concern that threatens the effectiveness of digital defense systems. As the industry faces a significant attrition crisis, with nearly 46% of cybersecurity leaders contemplating departure from their roles, it is imperative to explore the causes and consequences of burnout through a socio-technical lens. These challenges were discussed by experts from academia and industry in a multi-disciplinary workshop at the 26th International Conference on Human-Computer Interaction to address broad antecedents of burnout, manifestation and its consequences among cybersecurity professionals, as well as programs to mitigate impacts from burnout. Central to the analysis is an empirical study of former National Security Agency (NSA) tactical cyber operators. This paper presents key insights in the following areas based on discussions in the workshop: lessons for public and private sectors from the NSA study, a comparative review of addressing burnout in the healthcare profession. It also outlines a roadmap for future collaborative research, thereby informing interdisciplinary studies.
Related papers
- Open Problems in Machine Unlearning for AI Safety [61.43515658834902]
Machine unlearning -- the ability to selectively forget or suppress specific types of knowledge -- has shown promise for privacy and data removal tasks.
In this paper, we identify key limitations that prevent unlearning from serving as a comprehensive solution for AI safety.
arXiv Detail & Related papers (2025-01-09T03:59:10Z) - A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals [0.0]
This study investigates the prevalence and underlying causes of work-related stress and burnout among cybersecurity professionals.
44% report experiencing severe work-related stress and burnout, while an additional 28% are uncertain about their condition.
The demanding nature of cybersecurity roles, unrealistic expectations, and unsupportive organizational cultures emerge as primary factors fueling this crisis.
arXiv Detail & Related papers (2024-09-18T15:18:33Z) - Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19 [1.2354076490479515]
We analyze six critical lessons from COVID-19, outlining key considerations for successful preparedness.
We emphasize the need for developing similar doctrine and skill sets for cyber threats.
arXiv Detail & Related papers (2024-08-15T20:59:23Z) - Cyber-sensorium: An Extension of the Cyber Public Health Framework [0.5852077003870417]
We draw parallels between the digital network and a biological nervous system essential to human welfare.
Cyberattacks on this system present serious global risks, underlining the need for its protection.
arXiv Detail & Related papers (2024-06-09T22:44:49Z) - Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns [13.075370397377078]
We use ongoing work on the Cyber Security Body of Knowledge (CyBOK) to help elicit and document the responsibilities and ethics of the profession.
Based on a literature review of the ethics of cybersecurity, we use CyBOK to frame the exploration of ethical challenges in the cybersecurity profession.
Our findings indicate that there are broad ethical challenges across the whole of cybersecurity, but also that different areas of cybersecurity can face specific ethical considerations.
arXiv Detail & Related papers (2023-11-16T19:44:03Z) - Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment [100.1798289103163]
We present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP)
Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier"
This article aims to provide a reference point for the algorithmic and design decisions within the realm of privacy, highlighting important challenges and potential research directions.
arXiv Detail & Related papers (2023-04-14T05:29:18Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Pedagogic Challenges in Teaching Cyber Security -- a UK Perspective [0.0]
Cyber security has become an issue of national concern in the UK, USA and many other countries worldwide.
We explore the issues relating to student expectations and the CSI effect in students entering cyber security.
We highlight the science vs tools debate to bring focus to some of the pedagogic tensions between students/industry and the academics who teach on the degree courses.
arXiv Detail & Related papers (2022-12-13T13:55:21Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.