2018 Cybersecurity: Perceptions and Practices Benchmark Survey

Foreword James Carder CISO & VP, LogRhythm Labs LogRhythm As uncertainties?—?cybersecurity and otherwise?—?swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions. From these insights, one thing that comes as a surprise is data that suggests that the U.S. may not be leading the cybersecurity industry in security maturity. In fact, respondents from organizations in the Asia-Pacific region clearly indicate that they are far more likely to have a security operations center (SOC) than their U.S. and U.K. counterparts. The Asia-Pacific region also boasts the largest percentage of IT budget allocation toward cybersecurity. Both of these findings suggest a cultural prioritization toward security investments?—?one that isn’t being matched by the U.S. or U.K. When prompted on workflow/employee efficiency, it appears evident that security professionals are wasting huge amounts of time and effort on false positives and inefficient processes. Of course, this isn’t news to us, but it’s important to note how the data acutely quantifies this problem. The majority of IT executives indicate that the average cybersecurity professional wastes as much as 10 hours a week due to software inefficiencies. In an industry already plagued by a shortage in qualified specialists, this is a reality that is not only unacceptable, but also avoidable. Containment of cyberthreats and breaches is a major challenge for all organizations. It takes time to understand the full scope of an incident and determine how best to neutralize it. This is exacerbated by a lack of resources (human, technology, intelligence) and then compounded when automation and orchestration are not efficiently leveraged to reduce the time necessary to complete the investigative processes. Now, more than ever, security teams need to be working more intentionally. Corroboration and qualification using threat intelligence and other technologies help teams make informed decisions. Establishing automation and orchestration processes, protocols, and procedures for the most prevalent classes of attacks will improve the efficiency and effectiveness of most any SOC. As security experts, it’s unlikely our constant state of being stretched thin will be relieved anytime soon. But this survey does shine a ray of hope: the majority of IT executives surveyed believe their C-suite is paying more attention to cybersecurity efforts than they did last year. That, combined with the availability of NextGen SIEM and end-to-end security solutions today, gives me optimism that cybersecurity organizations across the globe may soon increase fortification in the fight against cyberthreats. James Carder CISO & VP, LogRhythm Labs WWW.LOGRHYTHM.COM | 3 Key Findings The Current State of Security Maturity Many companies are focused on growing their security maturity?—?part of that growth is establishing a security operations center (SOC) within their organization. Special threat detection programs can be another indicator of security maturity. More than 70 percent of decision makers have programs in place to detect specific threats such as ransomware, insider or employee threats, and denial of service attacks. For those organizations that currently lack a formal SOC, most plan to add one within the next two years. Team size is another important indicator, as it can provide insight into an organization’s commitment to a well-staffed security program. In this survey, on average, respondents said they employ 12 cybersecurity professionals in their organization. More than half indicated that they employ 10 or fewer professionals on their teams. A huge majority of IT decision makers?—?95 percent?—?use security software to prevent and react to threats. More than a quarter deploy more than 10 security software solutions to manage security threats. Objective and Methodology The purpose of this study was to determine the cybersecurity perceptions and practices among organizations in the United States, United Kingdom, and AsiaPacific regions. The results of this report are from an online survey of 751 IT decision makers who indicated that cybersecurity was part of their responsibilities. Of these respondents, 250 came from the United States, 250 from the United Kingdom, and 251 from the Asia-Pacific region. The Asia-Pacific region was represented by decision makers in Australia, Singapore, Hong Kong, and Malaysia. These respondents indicated they were employed in mid- to large-sized companies (minimum 500+ employees). WWW.LOGRHYTHM.COM | 4
Please complete the form to gain access to this content