SlideShare a Scribd company logo
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph
STKI 2017 Cyber Ratios
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph
FTE ratios are not trivial – cyber roles map
Cyber
guidance
Cyber
analysts
Infrastructure
development
Service desk
HR
NOC
outsourcing
cyber department
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph
Cyber roles map
Regulations
Top management
cyber risk management
high level policy
awareness
Cyber
guidance
Cyber
analysts
Infrastructure
development
Service desk
HR
analyst - response team,
define siem rules
‫בקרים‬
practical policy
(development, suppliers,
identity)
permission (operations - not policy)
cyber tools: FW, dlp, encryption,
DBMS FW, EPP (AV), deception
cyber related tools: patch
management, networking, hardening,
privileged account management, email
security, data masking, authentication
NOC
outsourcing
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph
IT from Mars, Finance (regulated) from Venus
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 5
Cyber personnel
• Number of employees divided to total number of cyber related IT
personnel for non-regulated orgs (regulations is less than 50% of cyber
budget):
• First level soc personnel not included (mainly soc service in non-
regulated orgs.)
Source: STKI
# employees / #
cyber personnel
Per FTE
65625 percentile
1125Median
179275 percentile
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 6
Cyber personnel: operational/guidance
• Number of operational cyber personnel divided to cyber guidance
personnel for non regulated orgs (regulations is less 50% of cyber
budget):
Source: STKI
# operational / #
guidance
Per FTE
1.5825 percentile
2.00Median
2.7575 percentile
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 7
Cyber personnel
• Number of employees (that use computers) divided to total number of cyber related
IT personnel for regulated orgs (regulations over 50% of cyber budget):
• Cyber personnel include: guidance, cyber analysts, cyber operations, permissions
team
• First level soc personnel not included, insurance agents (not employees) are not
included
Source: STKI
# employees / #
cyber personnel
Per FTE
10625 percentile
133Median
15875 percentile
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 8
Cyber personnel - guidance
• Number of employees (that use computers) divided to total number
of cyber guidance personnel for regulated orgs (regulations over
50% of cyber budget):
Source: STKI
# employees /
# cyber
guidance
Per FTE
33825 percentile
410Median
109575 percentile
Insurance agents (not employees) are not counted but still get service
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 9
Cyber personnel – first level SOC
• Options for first level SOC operations mode:
– In sourcing : 1-2 FTE at work hours, 1 FTE at night. Total is about 6-9 FTE
– In sourcing: 1-2 FTE at work hours, at night - part of NOC. Total is about
3-4 FTE
– Outsourcing mode - 0 FTE.
Source: STKI
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 10
Cyber personnel – cyber analysts
• Number of employees (that use computers) divided to total number of
cyber analysts personnel for regulated orgs (regulations over 50% of
cyber budget):
• Regulated organizations will have minimum 2 cyber analysts (part of
SOC or guidance). External response team might be used when needed.
Source: STKI
# employees / #
cyber analysts
Per FTE
60025 percentile
667Median
100075 percentile
Insurance agents (not employees) are not counted but still get service
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 11
Cyber personnel - operations
• Number of employees (that use computers) divided to total number of cyber
operations personnel for regulated orgs (regulations over 50% of cyber budget):
• Example for cyber operations activities: FW, network security, email security, DBMS
firewall, encryption, authentication, security patches, hardening, etc.
• In many cases part of infrastructure technology teams (networking, sytem, PC, etc).
Source: STKI
# employees / #
cyber operations
Per FTE
21725 percentile
285Median
50075 percentile
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 12
Cyber personnel – permissions team
• Number of employees (that use computers) divided to total number of
permissions team personnel for regulated orgs (regulations over 50%
of cyber budget):
• Permissions team might be part of service desk, security guidance or
security operations
Source: STKI
# employees / #
permissions team
Per FTE
46525 percentile
600Median
66775 percentile
Insurance agents (not employees) are not counted but still get service

More Related Content

PDF
Ratios 2016 v1
PDF
Summit 2017 cyber delivery v4 long version
PDF
Stki summit2013 infra_pini sigal_mega_v10 final
PDF
Pini sigal Summit 2014 final
PDF
Positioning stki pini 2015 v1
PPTX
Galit Fein IT governance for slideshare 2016
PDF
Sigal summit 2014 final
PPTX
How IT will disrupt in 2016: The ITaaS imperative
Ratios 2016 v1
Summit 2017 cyber delivery v4 long version
Stki summit2013 infra_pini sigal_mega_v10 final
Pini sigal Summit 2014 final
Positioning stki pini 2015 v1
Galit Fein IT governance for slideshare 2016
Sigal summit 2014 final
How IT will disrupt in 2016: The ITaaS imperative

What's hot (14)

PPTX
DevOps 101
PPTX
DevOps 101+: From collaboration to microservices
PPTX
Cloud Computing Gets Put to the Test
PDF
Israel IT trends and positioning in infrastructure and development (delivery...
PDF
The intricacies of cloud integration
PDF
The influence of consumerization on enterprise apps
PPTX
Accelerating SDLC for Large Public Sector Enterprise Applications
PPTX
Office 365 Monitoring Best Practices
PDF
Money Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
PDF
Online Memory Leak Detection in the Cloud-based Infrastructures
PDF
Doing DevOps for Big Data? What You Need to Know About AIOps
PDF
Doing DevOps for Big Data? What You Need to Know About AIOps
PDF
The Future of the Data Center Network in a Multi-Cloud World
PPTX
How to add security in dataops and devops
DevOps 101
DevOps 101+: From collaboration to microservices
Cloud Computing Gets Put to the Test
Israel IT trends and positioning in infrastructure and development (delivery...
The intricacies of cloud integration
The influence of consumerization on enterprise apps
Accelerating SDLC for Large Public Sector Enterprise Applications
Office 365 Monitoring Best Practices
Money Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
Online Memory Leak Detection in the Cloud-based Infrastructures
Doing DevOps for Big Data? What You Need to Know About AIOps
Doing DevOps for Big Data? What You Need to Know About AIOps
The Future of the Data Center Network in a Multi-Cloud World
How to add security in dataops and devops
Ad

Viewers also liked (20)

PDF
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
PDF
STKI 25th Annual Israel IT Market Study 2017
PDF
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
PDF
The Algorithm of Magical Customer Experiences
PDF
Delivery positionnig 2016 v1
PDF
It delivery 2016 v5
PDF
Galit feins presentation v7 for summit
PDF
STKI Israeli IT market study 2016 V2
PDF
Galit fein product positioning
PDF
How does Big data empower marketing?
PDF
Bots: from dream to reality
PDF
The Journey to Customer Journeys
PDF
Are bots the future of customer engagement?
PDF
What is Data Driven Marketing?
PDF
2016 positioning apps_analytics_final
PDF
Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...
PDF
Delivery 2015 pini
PDF
Stki ratios 2015 v1
PDF
How does the CIO contribute to other CxOs
PDF
Why are we talking about data?
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
STKI 25th Annual Israel IT Market Study 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
The Algorithm of Magical Customer Experiences
Delivery positionnig 2016 v1
It delivery 2016 v5
Galit feins presentation v7 for summit
STKI Israeli IT market study 2016 V2
Galit fein product positioning
How does Big data empower marketing?
Bots: from dream to reality
The Journey to Customer Journeys
Are bots the future of customer engagement?
What is Data Driven Marketing?
2016 positioning apps_analytics_final
Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...
Delivery 2015 pini
Stki ratios 2015 v1
How does the CIO contribute to other CxOs
Why are we talking about data?
Ad

Similar to Cyber ratios 2017 v1 (20)

PDF
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
PPTX
How to Build a Winning Cybersecurity Team
PPTX
Exploring Careers in Cybersecurity Field
PPTX
Cybersecurity careers options for Career Starter
PDF
Explore Cybersecurity jobs in IT industry
PDF
Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
PDF
How to become a cyber security expert in India.pdf
PPTX
cybersecurityandthe importance of the that
PDF
Career Opportunity in Cyber Security | The Knowledge Academy
PDF
Cybersecurity-Protecting-Our-Digital-Future.pdf.pdf
PDF
Cyber Security -Career and Job Opportunities after Msc.it
PDF
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
PPTX
New Horizons SCYBER Presentation
DOCX
Cybersecurity is a field of IT concerned with reducing.docx
PPTX
Cybersecurity Metrics: Reporting to BoD
PDF
Why Cyber Security is Crucial for Business Continuity
PDF
Essential Skills for Cybersecurity Professionals in 2024
PDF
How to Become a Cyber Security Analyst in Delhi_ Career Roadmap.pdf
PPT
Roadmap To Cybersecurity master as a guide .ppt
PDF
Cyber security course in Trivandrum.ppt.
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
How to Build a Winning Cybersecurity Team
Exploring Careers in Cybersecurity Field
Cybersecurity careers options for Career Starter
Explore Cybersecurity jobs in IT industry
Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
How to become a cyber security expert in India.pdf
cybersecurityandthe importance of the that
Career Opportunity in Cyber Security | The Knowledge Academy
Cybersecurity-Protecting-Our-Digital-Future.pdf.pdf
Cyber Security -Career and Job Opportunities after Msc.it
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
New Horizons SCYBER Presentation
Cybersecurity is a field of IT concerned with reducing.docx
Cybersecurity Metrics: Reporting to BoD
Why Cyber Security is Crucial for Business Continuity
Essential Skills for Cybersecurity Professionals in 2024
How to Become a Cyber Security Analyst in Delhi_ Career Roadmap.pdf
Roadmap To Cybersecurity master as a guide .ppt
Cyber security course in Trivandrum.ppt.

More from Pini Cohen (20)

PDF
Cto 2021 markets v2
PDF
Workato integrators corrections stki Israeli VAS market research 2020 v1
PDF
It procurement 2019 v3
PDF
STKI summit CTO presentation 2019
PDF
STKI IT Delivery staffing ratios 2018 v3
PDF
Stkisummi18 i taa_s_cybergov_long_version_v2
PDF
Dev trends 18_q1
PDF
Stkisummi18 i taa_s_cybergov_long_version_v1
PDF
Delivery positionnig 2017 v2
PDF
IT procurement cloud (and other) recommandations
PDF
IT procurement v2
PDF
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
PDF
STKI staffing ratios ratios 2014
PDF
STKI Summit 2014 - Trends and Positioning - Delivery domain
PPTX
STKI Summit 2014 - How does CIO deliver?
PDF
Stki summit2013 ratios
PDF
Stki summit2013 infra_pini sigaltechnologies_v5 final
PDF
Big data 2012 v1
PDF
Teaching IT one trick or two
PDF
Cmdb intro 2012 v1
Cto 2021 markets v2
Workato integrators corrections stki Israeli VAS market research 2020 v1
It procurement 2019 v3
STKI summit CTO presentation 2019
STKI IT Delivery staffing ratios 2018 v3
Stkisummi18 i taa_s_cybergov_long_version_v2
Dev trends 18_q1
Stkisummi18 i taa_s_cybergov_long_version_v1
Delivery positionnig 2017 v2
IT procurement cloud (and other) recommandations
IT procurement v2
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI staffing ratios ratios 2014
STKI Summit 2014 - Trends and Positioning - Delivery domain
STKI Summit 2014 - How does CIO deliver?
Stki summit2013 ratios
Stki summit2013 infra_pini sigaltechnologies_v5 final
Big data 2012 v1
Teaching IT one trick or two
Cmdb intro 2012 v1

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Monthly Chronicles - July 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm

Cyber ratios 2017 v1

  • 1. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph STKI 2017 Cyber Ratios
  • 2. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph FTE ratios are not trivial – cyber roles map Cyber guidance Cyber analysts Infrastructure development Service desk HR NOC outsourcing cyber department
  • 3. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph Cyber roles map Regulations Top management cyber risk management high level policy awareness Cyber guidance Cyber analysts Infrastructure development Service desk HR analyst - response team, define siem rules ‫בקרים‬ practical policy (development, suppliers, identity) permission (operations - not policy) cyber tools: FW, dlp, encryption, DBMS FW, EPP (AV), deception cyber related tools: patch management, networking, hardening, privileged account management, email security, data masking, authentication NOC outsourcing
  • 4. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph IT from Mars, Finance (regulated) from Venus
  • 5. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 5 Cyber personnel • Number of employees divided to total number of cyber related IT personnel for non-regulated orgs (regulations is less than 50% of cyber budget): • First level soc personnel not included (mainly soc service in non- regulated orgs.) Source: STKI # employees / # cyber personnel Per FTE 65625 percentile 1125Median 179275 percentile
  • 6. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 6 Cyber personnel: operational/guidance • Number of operational cyber personnel divided to cyber guidance personnel for non regulated orgs (regulations is less 50% of cyber budget): Source: STKI # operational / # guidance Per FTE 1.5825 percentile 2.00Median 2.7575 percentile
  • 7. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 7 Cyber personnel • Number of employees (that use computers) divided to total number of cyber related IT personnel for regulated orgs (regulations over 50% of cyber budget): • Cyber personnel include: guidance, cyber analysts, cyber operations, permissions team • First level soc personnel not included, insurance agents (not employees) are not included Source: STKI # employees / # cyber personnel Per FTE 10625 percentile 133Median 15875 percentile
  • 8. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 8 Cyber personnel - guidance • Number of employees (that use computers) divided to total number of cyber guidance personnel for regulated orgs (regulations over 50% of cyber budget): Source: STKI # employees / # cyber guidance Per FTE 33825 percentile 410Median 109575 percentile Insurance agents (not employees) are not counted but still get service
  • 9. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 9 Cyber personnel – first level SOC • Options for first level SOC operations mode: – In sourcing : 1-2 FTE at work hours, 1 FTE at night. Total is about 6-9 FTE – In sourcing: 1-2 FTE at work hours, at night - part of NOC. Total is about 3-4 FTE – Outsourcing mode - 0 FTE. Source: STKI
  • 10. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 10 Cyber personnel – cyber analysts • Number of employees (that use computers) divided to total number of cyber analysts personnel for regulated orgs (regulations over 50% of cyber budget): • Regulated organizations will have minimum 2 cyber analysts (part of SOC or guidance). External response team might be used when needed. Source: STKI # employees / # cyber analysts Per FTE 60025 percentile 667Median 100075 percentile Insurance agents (not employees) are not counted but still get service
  • 11. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 11 Cyber personnel - operations • Number of employees (that use computers) divided to total number of cyber operations personnel for regulated orgs (regulations over 50% of cyber budget): • Example for cyber operations activities: FW, network security, email security, DBMS firewall, encryption, authentication, security patches, hardening, etc. • In many cases part of infrastructure technology teams (networking, sytem, PC, etc). Source: STKI # employees / # cyber operations Per FTE 21725 percentile 285Median 50075 percentile
  • 12. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 12 Cyber personnel – permissions team • Number of employees (that use computers) divided to total number of permissions team personnel for regulated orgs (regulations over 50% of cyber budget): • Permissions team might be part of service desk, security guidance or security operations Source: STKI # employees / # permissions team Per FTE 46525 percentile 600Median 66775 percentile Insurance agents (not employees) are not counted but still get service