In today’s digital battlefield, knowledge is power. As threats evolve rapidly and the costs of security failures continue to rise, businesses must stay informed. The Big CISO Factbook uses facts and figures to highlight the challenges faced by IT and security teams worldwide.
The Factbook combines GYTPOL field insights, original market research, and third-party statistics to paint a data-driven picture of an evolving threat landscape. Ultimately this Factbook is meant to be a resource to help inform decision making and guide strategic planning.
It’s no secret that threat actors are constantly refining their tactics, making it increasingly difficult for businesses to defend themselves. With every organization now operating in a digital environment, the attack surface has expanded significantly. As the number of connected devices continues to grow and oversight is challenged by remote work, shadow IT, and configuration drift, the risks multiply and businesses are more likely to face disruption.
But perhaps the biggest issue is complacency. Despite existing in a state of persistent risk, some decision-makers think it acceptable – comforting themselves in the knowledge that their peers are just as vulnerable. They reason that with so many soft targets, they’re relatively safe; at least statistically speaking. So they allow themselves to be indolent.
Of course, in reality – statistically speaking – such an approach is foolish. And this Factbook stands as a powerful rebuttal of such rationalization. The truth is that that type of keeping down with the Joneses attitude results in a race to the bottom that sees everyone lose. It’s not just irresponsible, it’s downright dangerous.
Hardening is seldom easy, but when dealing with technical or design flaws, at least the fix is usually straightforward. When it comes to how technology is deployed however, it’s much more difficult. Existing at the operations level, it’s inherently a function of context. It’s hard to define, mired in human error, and cannot be solved with a patch.
All of which is why vendors generally steer clear of such issues and leave operators to their own devices (literally) – outfitted with little more than their careful attention-to-detail and manual best efforts. As far as methodologies go, it’s far from bulletproof. Case in point: 88% of data breaches are rooted in human error.
It can come from many places, too many to count in fact – from poorly defined processes, a lack of training, or simple overload (too many tasks and too little time), just to name a few. But no matter the source (and without casting any aspersion), you can always count on humans – especially stressed and overworked humans – to occasionally miss things, make mistakes, and exercise questionable judgment. It’s par for the course really. To wit, IDC found that companies with 500-1,499 employees never even investigate 27% of their security alerts.
Cyber fatigue, or the reluctance to take proactive measures due to the overwhelming nature of threats, affects up to 42% of companies. And even when there is a clear will to act, struggles with basic security hygiene compound the challenge and prevent operators from getting out from behind the eight ball.
In this sense, most organizations fail to get out of their own way. And the results are catastrophic:
The good news, if you can call it that, is that in most organizations the mess is not evenly spread across the enterprise. It’s pretty concentrated in fact – which means there are going to be some low-hanging fruit.
Consider, for example, the facts that:
To make matters worse, there’s a significant talent gap in the cybersecurity industry. With a global shortfall of 3.4 million cybersecurity professionals, businesses must find ways to maximize productivity without compromising their efficacy or security. And allocating 0.52% of their total budgets to cybersecurity, which is the current standard, just isn’t going to cut it.
If nothing else, let The Big CISO Factbook serve as a wakeup call. We need to be more vigilant and we need to rise to the challenge. We can’t afford to bury our heads in the sand.
To survive and thrive in the coming years, organizations will need to take a more proactive approach and invest in automation technologies that enhance hygiene and error-proof configuration security. It might not be easy, but I can promise you that it’ll be worthwhile.