Burnout: My Invisible Adversary
This talk explores the psychological and operational impact of burnout on incident response and digital forensics teams. It identifies key stressors such as lack of control, unclear mission, and resource starvation that lead to both situational and chronic burnout. The speakers provide practical management strategies, including the implementation of blameless postmortems and rotation policies, to maintain team resilience and long-term expertise.
Why Your Incident Response Team Is Failing (And How to Fix It)
TLDR: Operational security teams are often the final line of defense, yet they are frequently crippled by burnout that stems from systemic issues rather than individual failure. This post breaks down the specific stressors—lack of control, unclear mission, and resource starvation—that degrade response quality during high-pressure incidents. By adopting strategies like blameless postmortems and structured rotation policies, organizations can build the resilience necessary to handle real-world threats without burning out their best talent.
Burnout in the security industry is usually treated as a personal problem. We tell analysts to take a vacation, practice mindfulness, or "unplug" after a long shift. While those things are fine for a weekend, they do nothing to address the fact that our operational environments are often designed to break people. If you are a lead or a founder, you need to stop looking at your team’s exhaustion as a lack of grit and start looking at it as a failure of your security architecture.
Operational responders are the final security control. When your firewalls, EDR, and cloud-native protections fail—and they will—the human element is the only thing left standing between an attacker and your data. If that human is exhausted, distracted, or cynical, your security posture is effectively zero.
The Two Faces of Burnout
Research into incident response teams reveals two distinct types of burnout: situational and chronic. Situational burnout is the immediate, intense fatigue that hits during a major incident. Think of the early days of a massive zero-day response, like the Log4j vulnerability (CVE-2021-44228). The volume of data is overwhelming, the stakes are high, and the path to remediation is unclear.
Chronic burnout, however, is the slow erosion of a responder’s passion. It happens when the "emergency" never ends. When every ticket is marked "P0," nothing is actually a priority. This leads to a state where responders stop caring about the quality of their work, stop hunting for root causes, and start just "clearing the queue."
The Three Pillars of Operational Stress
Most teams fail because they ignore the systemic drivers of this fatigue. The first is a lack of control. Responders are often forced to work with broken tools or rigid, outdated playbooks that don't match the reality of the threat. If an analyst cannot fix a broken parser or update a detection rule without jumping through three layers of bureaucratic approval, they lose the agency required to do their job effectively.
The second driver is an unclear mission. We often lose sight of the fact that at the end of every network connection is a real person. When teams get bogged down in the minutiae of compliance paperwork or low-value alerts, they forget they are there to protect users. If your team spends 80% of their time on tasks that don't contribute to the core mission, they will eventually disengage.
The third driver is resource starvation. The "if they aren't busy, they aren't working" mentality is a relic of the industrial age that has no place in modern security. Responders need downtime to decompress, learn new skills, and work on side projects. If you keep your team at 100% utilization, you are not maximizing productivity; you are manufacturing a crisis.
Building Resilience Through Process
To fix this, you must treat your team like the critical infrastructure they are. Start by implementing blameless postmortems. When a mistake happens—and it will—the goal is to identify the systemic failure that allowed it, not to punish the person who made it. If a responder is afraid to report a mistake, they will hide it, and you will never fix the underlying vulnerability in your process.
Second, enforce rotation policies. No one should be on the front lines of incident response indefinitely. Rotate your team members into different roles, such as threat hunting, tool development, or even red teaming. This prevents the "tunnel vision" that comes with staring at the same alert dashboard for months on end. It also ensures that your team has a diverse set of skills, making them more effective when a real crisis hits.
Finally, be transparent about the "why." When you change a process or implement a new tool, explain the reasoning. If you are asking your team to work extra hours, be honest about the stakes. If the situation doesn't warrant a "heroic" effort, don't demand one. Heroism is not a sustainable security strategy.
The Bottom Line
Security is a marathon, not a sprint. If you are burning out your team, you are not just losing good people; you are creating blind spots in your defenses that attackers will eventually exploit. Stop focusing on the "cyber threat actors" and start focusing on the people who have to deal with them every day. Give them the tools, the autonomy, and the downtime they need to do their jobs. If you don't, you shouldn't be surprised when your team—and your security—eventually collapses.
All Tags
Up Next From This Conference

A Security RISC? The State of Microarchitectural Attacks on RISC-V

REDIScovering HeadCrab: A Technical Analysis of a Novel Malware and the Mind Behind It

TsuKing: Coordinating DNS Resolvers and Queries into Potent DDoS Amplifiers
Similar Talks

The Dark Side of Bug Bounty

How Not to Do a Physical Security Penetration Test

