![ThreatQuotient:安全自動化應(yīng)用態(tài)勢_第1頁](http://file4.renrendoc.com/view11/M02/3F/1F/wKhkGWVixMWAXziVAAIIuIZyERU935.jpg)
![ThreatQuotient:安全自動化應(yīng)用態(tài)勢_第2頁](http://file4.renrendoc.com/view11/M02/3F/1F/wKhkGWVixMWAXziVAAIIuIZyERU9352.jpg)
![ThreatQuotient:安全自動化應(yīng)用態(tài)勢_第3頁](http://file4.renrendoc.com/view11/M02/3F/1F/wKhkGWVixMWAXziVAAIIuIZyERU9353.jpg)
![ThreatQuotient:安全自動化應(yīng)用態(tài)勢_第4頁](http://file4.renrendoc.com/view11/M02/3F/1F/wKhkGWVixMWAXziVAAIIuIZyERU9354.jpg)
![ThreatQuotient:安全自動化應(yīng)用態(tài)勢_第5頁](http://file4.renrendoc.com/view11/M02/3F/1F/wKhkGWVixMWAXziVAAIIuIZyERU9355.jpg)
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認(rèn)領(lǐng)
文檔簡介
2023
STATEOF
CYBERSECURITY
AUTOMATION
ADOPTION
INTRODUCTION
ThisisthethirdeditionofThreatQuotient’sannualsurveyofseniorcybersecurityprofessionals,exploringthetopicofcybersecurityautomationadoption.Seven
hundredandfiftyseniorexecutivesintheUK,US,andAustraliasharedtheirviewsontheprogresstheyaremakingtowardadoptingcybersecurityautomation,itskeyusecases,andthechallengestheyface.Inadditiontoidentifyingtrendsovertime,thisyear’sstudyexploreswiderissuessuchasthecriticalfeaturescybersecurity
CONTENTS
2Introduction
2Methodology
3Foreword
5HighLevelFindings
8
RegionalVariations
10VerticalSnapshot
13RoleBased
Comparisons
15Recommendations
17Question
Responses
professionalswanttoseeinautomationsolutions,thetopicofwellbeingamongcybersecurityteams,andhowitcanbeimproved.
ReadthisreporttounderstandhowCISOsandseniorcybersecurityprofessionalsarehandlingtheincorporationofcybersecurityautomationintotheirstrategiestoprotectthecomplex,extendedenterprise–andtheiranalystteams–fromthepressuresofescalatingcyberthreats.
METHODOLOGY
Leadingsecurityoperationsplatforminnovator,ThreatQuotient,commissioneda
survey,undertakenbyindependentresearchorganization,OpinionMatters,inJune2023.SevenhundredandfiftyseniorcybersecurityprofessionalsintheUK,USAandAustraliafromcompaniesemploying2,000+peoplefromfiveindustriestookpart,
including:CentralGovernment,Defense,CriticalNationalInfrastructure–EnergyandUtilities,Retail,andtheFinancialServicesSector.
2
FOREWORD
Thepressureoncybersecurityteamsshowsnosignsofabating.Whiletheglobal
healthcrisisisbehindus,thepast18monthshavebroughtaworldwideeconomicuncertaintyandgeopoliticaltensionatalevelnotseenfordecades.Theresultingenergycrisis,supplychainimpacts,andeffectsonemploymentaresending
shockwavesthroughoutthephysicalanddigitalworld,and–whereverthereis
disruption–cybercriminalsandnation-stateactorsarealwaysonhandtocapitalizeonthesituation.Rightnow,theyareleveragingnewtools,suchasautomation
andgenerativeartificialintelligence(AI),tomakeattacksmoresophisticatedanddeceptive.Asthevolumeandvarietyofcyberthreatsincreaseexponentially,and
skilledcybersecurityworkersremaininshortsupply,seniorcybersecurityleadersfacearelentlessresourcechallenge:howtoprotecttheorganizationinanenvironment
wherebudgetsandpersonnelareunderpressure.
Overthethreeyearsthatwehaveundertakenthissurvey,wehavetrackedthe
adoptionofcybersecurityautomationasasolutiontothisproblem.Our2023StateofCybersecurityAutomationAdoptionresearchfindsthatorganizationsareleaningonautomationtohandleagrowingpercentageofcybersecurityusecaseswiththegoalofincreasingefficiency,respondingtoregulationandcompliancerequirements,andincreasingproductivity.Overall,theyconsiderautomationtobeimportantintheir
organization,andtheyarecontinuingtocommitbudgettoautomationprograms–
eventhoughtheyarehavingtocutbackinotherareastodoso.However,ourstudyalsoshowsthattheproblemshighlightedinpreviousyearsremain–infact,they
havegrown.Everyrespondentsaidtheyhadexperienceddifficultiesofsomekind
whenimplementingcybersecurityautomation.Theserangefromalackoftrustintheoutcomesofautomatedprocesses,slowadoptionbyusers,baddecisionsresultingfromautomation,andalackofskillamongusers.
Thereisundoubtedlyadegreeofdisenchantmentaroundautomationevidentin
thisyear’sstudy,withasensethatithasn’tyetdeliveredonitspromise.Thismirrorsthefindingsofotherindustrywatchersandreflectsthefactthatthemarketisstill
relativelyimmature.Usersarestillworkingtofindtheirfeetandimplementthe
solutionsthatwillsolvetheirchallengesanddelivertherightkindofROI.Atthesametime,vendorsarecontinuingtoinnovateandadvancetheirsolutionsfrombotha
technicalandusabilityperspective,sotheycanachievetheirpotential.
3
ROIisfirmlycenteredonemployeewellbeing
Lastyear,respondentsweredividedonthebestwaytodeterminecybersecurity
automationROI,butthisyearstrongconsensushasemerged.61.5%saythatROIismeasuredbyhowwelltheyaremanagingtheteamintermsofemployeesatisfactionandretention.Lessthanhalfthatfigure(29%)sayROIisdeterminedbyhowwellthesolutionisperforminginsecurityterms.
Thispointstoasignalshiftinwhatorganizationsviewasthe“point”ofinvestingin
cybersecurityautomation–theprimemotivationistoimprovetheexperienceof
employees.Byallowingautomationtoshouldertheburdenoflowervalue,repetitiveactivities,andreleaseanalystsformoreinterestingandfulfillingwork,companiescanimproveemployeesatisfactionandreducechurn.Thestudyfoundthathighteam
61.5%saythatROIismeasuredbyhowwell
theyare
managingtheteamintermsofemployee
satisfactionandretention.
memberchurnrateswereamongthetopthreechallengesfacingrespondentsin
centralgovernmentandcriticalnationalinfrastructureorganizations.ItwasalsothebiggestissuefacingAustralianrespondentsandthoseinaCISOrole.
ThisfindingonROIhasimportantimplicationsforautomationsolutionvendors,
too.Typically,vendorsdesignsolutionsontheassumptionthatbuyersarelookingforconventionalROIbasedonsecurity,accuracy,efficiency,andproductivitygains.However,thisfindingshowsthatnon-traditional,human-focusedmeasuresare
equally,andsometimesmore,important.WithROImeasuredonthebasisofteamsatisfactionandretention,vendorsneedtoincorporatethehumanbenefitsoftheirsolutionintoproductdesignandmessaging.Thereareseveraldevelopmentson
thehorizonthatshouldrespondtothisneed,includingtheadvancementsofAIandgreaterrolloutoflowandno-codesolutions.Byimprovingusabilityandmaking
automationmoreaccessibleforawidercohortofworkers,itshoulddelivermoreusersatisfactionwhilesimultaneouslyachievingtheaccuracyandefficiencyitwasoriginallydesignedfor.
HereatThreatQuotient,weknowthatdata-drivenautomationcanplayakeyroleinhelpingorganizationsdealwiththetechnicalandhumanchallengesofcybersecurity.Ourrecommendationswillassistorganizationsinavoidingthepitfallsandreapingtherewardsofeffectivecybersecurityautomation.
Wehopethatyoufindthisreportinterestingandvaluable.
4
HIGHLEVELFINDINGS
100%
Haveexperiencedproblemswhen
tryingtoautomatecybersecurity
99.9%
Haveincreased
budgetsfor
cybersecurity
automation
75%
SayITcybersecurityautomationis
importanttotheirorganization
61.5%
MeasureROIonthebasisofhowwelltheyare
managingtheteamandemployeesatisfaction/retention
Theimportanceofcybersecurityautomationrisesoverall–buttherearesignsofdisenchantmentinsomeregions
Three-quartersofthecybersecurityprofessionalssurveyedsaidthatcybersecurity
automationisimportanttotheirorganization,withalmostone-third(32%)sayingitisveryimportant.RespondentsfromtheUSandAustraliashoweda17.5%and14%increase
respectivelyinthepercentageofrespondentsratingcybersecurityautomationimportant,upat82.5%and82%,comparedtolastyear.
IntheUK,however,therehasbeenadecreaseof9%,with61%sayingitisimportantto
theirbusinessthisyear.Thisdrophasbeenledbyfinancialservices,defense,andcentralgovernmentrespondents.UKrespondentsweremorelikelythanthoseintheUSand
Australiatosaythattheyhadexperiencedbaddecisionsandslowuseradoptionresulting
5
fromtheirattemptstoimplementcybersecurityautomationandthatit“causesmore
problemsthanitsolves”.Thishasgeneratedalevelofdissatisfactionthatreflectsthe
maturityoftheUKmarket–earlierautomationsolutionshaveprovedtobecomplexandhardtouse,whichwouldcertainlytranslateintoslowadoption.
Automationisbeingmorewidelyusedacrossallusecases
Comparedtolastyear,ahigherpercentageofrespondentsareautomatingkeyareasoftheircybersecurityprogram.Themostnotableincreaseisinalerttriage–anareawhereThreatQuotientresearchidentifiedanopportunitylastyear–where30%arenowusingautomationcomparedtoonly18%in2022.Overall,respondentsarearound5%morelikelytobeautomatingprocessesacrosstherangeofcybersecurityactivitiesthantheywerelastyear.
Interestingly,vulnerabilitymanagementandprioritizationarenowakeyusecaseamong37%ofUSorganizations,anditisalsomoreprevalentamongcompanieslargerthan
10,000employees(42.5%)andthoseinthecriticalnationalinfrastructuresector(37%).Inourexperience,thesearetypicallymorematureorganizationswhenitcomesto
automation,indicatingthatwemayseevulnerabilitymanagementriseuptheagendainother,lessmature,organizationsinfuture.
Greateradoptionissurfacinggreaterchallengesandalackoftrustiskeyamongthem
Theresultisunanimous:implementingcybersecurityautomationisneverproblem-
free.Themoreorganizationsuseautomation,themorechallengestheyareuncovering.Everyonetakingpartintheresearchsaidtheyhadencounteredproblems,withthemostcommontroublingareabeingalackoftrustintheoutcomesdeliveredbyautomated
processes–anissuefor31%.Closebehindis“slowuseradoption”–whichisnot
surprisingifusersdon’ttrustwhattheyareseeing.“Baddecisions”,suchasincorrectlyblockingsuspicious-lookingdomainnamesthatareactuallybenign,orblockinganemailtotheCEOthatturnsouttobegenuine,andlackofskillsmakeupthetopfourissues.
Incombination,theseissuespointtoanenvironmentwheretherealityofdeploying
automationsolutionsisn’tmatchingexpectations.Asvendorsbuildnewfeaturesand
functionalityintotools,thereisadistinctneedtofocusonusabilityandtransparency,soteamscanbuildconfidenceandreapthebenefitsofautomation.
Finance,regulatoryconcerns,andteamchurnarethetopthree
cybersecurityteamchallenges
Wewantedtogetabroaderperspectiveontheissuescybersecurityleadersarefacing
amongtheirteamsandherewefoundevidencethatthemacroeconomicpictureis
havinganimpact.Almostaquarterofrespondents(24%)said“insufficientbudget”wasintheirtopthreebiggestchallenges,reflectingtheeconomicpressuresfacingbusinesses.Thesamepercentage(24%)pointedto“growingcompliancerequirements”asregulatorsincreasinglyintroducemandatorycybersecurityresilienceandrecoveryrequirements
intodraftlegislationandregulations.
6
Highteammemberchurnratewastiedatthirdamongtherespondents’concerns,
indicatingthatthegeneraldisruptionintheemploymentmarketthatfollowedthe
pandemicisaffectingcybersecurityteamsjustasmuchasotherjobroles.Employee
churncausesproblemsasdepartingteammemberstakevaluableskillsandcompany-specificexpertiseawaywiththem,whicharehardtoreplaceinthecurrentemploymentenvironment.Notably,CISOsratehighteammemberchurnastheirmostpressingissue–andtheyarealsomostlikelytosaythatincreasingheadcountwouldhavethebiggesteffectoncybersecurityanalystwellbeing.
Budgetscontinuetorise,buteconomicpressuresarebeingfelt
Allbutonerespondentreportedthattheirbudgetforcybersecurityautomationhas
increased,ariseto99.9%from98.5%lastyear.However,comparedtolastyear,budgetisfarlesslikelytobenetnewallocations–only18.5%hadanetnewbudgetthisyear
comparedto34%thathaditlastyear.Instead,budgetisbeingallocatedfromoutside
thesecurityteamorfromothertools.There’saslightdropinbudgetbeingreallocated
fromheadcountcomparedtolastyear,whichmayshowthatbusinessesarestilltryingtobolstertheirsecurityteamnumbers.
Thelevelofconsensusacrosscountriesandindustriesonthebudgettopicwasincrediblystrong.Economicheadwindsarebeingfelteverywhere,forcingbusinessestobecreativeabouthowandwhattheyfund.Thegoodnewsisthatcybersecurityautomationclearlyholdsacriticalpositionwithinthestrategiesofthesebusinesses,totheextentthattheyarepreparedtocutotherbudgetstoensurecontinuedinvestment.
Multipledatasourceintegration,training,andautomatedreportingtoolstopthewishlist
Whenselectingcybersecurityautomationsolutions,organizationsprimarilywantthe
facilitytointegratewithmultipledatasources–andasthenumberandformatofsourcesgrows,thiswillsurelybecomemoreimportantasteamsseektomakesenseofincreasingvolumesofdata.Nextonthelististraining–essentialasteamsseektogrowtheirskills–andautomatedreporting.CISOsarekeenontheavailabilityoftraining,rankingthisa
longwayaheadofotherissues.
Smartertools,moreflexibility,andhigherheadcountwouldhavethebiggestpositiveimpactonwell-being
Asreportedearlier,ourrespondentsarenowclearonhowtheymeasureROI,with61.5%sayingitcomesdowntohowwelltheyaremanagingtheteamintermsofemployee
satisfactionandretention.Knowingthatmanycybersecurityleadersarestrugglingwithemployeewellbeingandburnout,wewantedtolearnwhattheyfeltwouldhavethe
biggestimpactonwellbeingandemployeeretention.
7
Topofthelistwassmartertoolsthatwillsimplifywork(31%),whilegreaterflexibilityover
workinghoursandlocationfollowedclosebehind,atthesamerateasincreasingteamheadcount(both28%).Thisindicatesthatcybersecurityprofessionalsseetechnology
andhumanfactorsasequallyimportantinimprovingemployeeexperience.The
pandemiccreatednewexpectationsaroundworkflexibilitythatemployeesareunwillingtorelinquish,whilenewerindustryentrantsaredigitalnomadswithhighexpectationsaroundflexiblework.Leadersarealsobeginningtoseethepotentialofinnovations
inareassuchasAIandlow-orno-codetobuildsmartertoolsthatmakeworkmorefulfilling.TheseareareasthatThreatQuotientwillcontinuetodrawoninthefuture.
REGIONALVARIATIONS
Onceagain,wesurveyedequalnumbersofcybersecurityprofessionalsintheUS,UK,andAustraliatolearnhowtheirexperienceofcybersecurityautomationischanging.
RespondentsfromtheUSandAustraliaaremorelikelytosaycybersecurityautomationisimportanttotheircompanythantheywereayearago,with82.5%and82%respectivelysayingitisimportant.USrespondentsarethemostenthusiastic–46%sayitisvery
importanttotheirbusinesscomparedwith26%ofAustralianrespondentswhosay
itisveryimportant.RespondentsintheUKcontinuedtobecomelesspositiveabout
cybersecurityautomation,withthepercentagesayingitisimportanthavingfallento
61%,adropfrom70%ayearagoand77%twoyearsago.Thisfallhasbeendrivenbyfinancialservicesanddefenserespondents,registeringadropof28and26percentagepointsrespectively.Afifth(21%)ofUKrespondentssaycybersecurityautomationisnotimportanttotheirorganization.
Driversandusecasesforcybersecurityautomationvary
TheUSandAustraliaseeefficiency-howwelltheyuseresourcessuchastime,
moneyandskilltogetthejobdone-asthetopdriverforautomation(48%and39%
respectively).IntheUKhigherproductivity-theamountofworkthatindividualsand
teamscangetthroughinagivenamountoftime-isthemainbenefitsought(36%).Thisisconsistentwithlastyear’sfindings.
Theregionsvaryonwhichkeyusecasestheyareautomating.IntheUS,theproportionofrespondentsautomatingvulnerabilitymanagementhasleaptby13percentagepoints.IntheUKandAustralia,thedominantusecaseisphishinganalysis,withthreatintelligencemanagementinsecondplaceintheUKandalerttriagetakingsecondspotinAustralia.
AlerttriagealsotooksecondplaceintheUS,followedbyincidentresponse.Ingeneral,USrespondentsshowedagreaterlikelihoodofautomatingusecasesofallkinds.
Everycountryreportedproblemsimplementingcybersecurityautomation.Thetop
issueintheUKis“baddecisions”resultingfromautomatedprocesses-suchasblockingdomainnamesthatlooksuspiciousbutareinfactbenign,orblockinganemailtothe
8
CEOthatturnsouttobegenuine.Thisproblemwasreportedby36%ofUKrespondents.Itwasfollowedbyslowuseradoption(35.5%)andlackoftrustinoutcomes(31.5%).ForUSrespondents,theirchallengeslayinalackoftrustinoutcomes(32.5%andaparticularproblemforUSdefenserespondents),withalackofskillandbaddecisionsalsocausingdifficulties.InAustralia,lackoftrustinoutcomesisalsothetopissue,withAustralian
financialservicesthemostskepticalinthisarea.SlowuseradoptionandalackofskillsarealsokeybarriersforAustralianrespondents.
Regulatoryandcompliancechallengesareacommonproblem
Intermsofthetopthreebroaderchallengesfacingcybersecurityteams,themainareaofagreementwasaroundgrowingregulatory/compliancerequirements,whichfeaturedinthetopthreeforallcountries.USrespondentsaremostconcernedaboutinsufficientbudget(26.6%),whilehighteammemberchurnrate(25.2%)isthenumberoneconcerninAustralia.
Choosingfromarangeofstatementstheonethatbestmatchedtheirorganization’s
currentviewofcybersecurityautomation,USrespondentsweremostlikelytosayitis
“alreadycentraltotheircybersecuritystrategy”,whileAustralianrespondentssay,“itwillbecomemoreimportantastheygetbetteratexpandingit”.UKrespondentsare,perhapsunsurprisingly,themostlikelytosaythat“itiscausingmoreproblemsthanitsolves”.
Theglobaleconomicpictureisaffectingbudgetsinallregions
Onthetopicofbudget,therewasverylittlevariationbetweenthecountries,
demonstratingtheglobalnatureoftheeconomicuncertaintywe’reexperiencing.Allcountriesaredivertingbudgetfromotherareastobolsterautomationprograms;onlyaround18.5%weregettingnetnewbudget.
Thecountriesagreeonthemostimportantfeatureofcybersecurityautomationtools:theabilitytointegratemultipledatasources.TheUKistheonlycountrytofeaturelowtotalcostofownership(TCO)initstopthreefeatures,perhapsindicatingthatUKbusinessesarebeginningtoworkmoreonoptimizingsolutionsnow,astheirimplementation
cyclematures.Theavailabilityoftrainingisinthetopthreeforallcountries,andUS
respondentsarealsolookingforvisualizationtools,whileAustralianrespondentswantautomatedreporting.
RespondentsfromallregionsconcuronusinghowwelltheyaremanagingtheteamintermsofsatisfactionandretentionasthemainmetricformeasuringROI.TheUKislesslikelythanotherregionstobeassessingROIintermsofhowwellthejobisbeingdone(23%usethiscomparedwith33%intheUSand30%inAustralia).
Intermsofwhatwouldmakethebiggestdifferencetothreatintelligenceanalyst
wellbeing,theregionsvariedacrossthethreeareasofpeople,processandtechnology.Australianrespondentswantmorepeople,UKrespondentswantmoretraining(process),andUSrespondentswantsmartertechnology.
9
ThreatQuotientTake:
Theintensifyingregulatory/complianceenvironment,inconjunctionwithchallengingeconomic
conditions,arethetwocommonfactorsaffectingallthreecountriessurveyed.Beyondthis,theregionsdifferonthetopusecasesandthefactorsthatwouldmakethebiggestdifferencetowellbeing.ThereisalsoadecidedvariationbetweentheUKandotherregionsontheimportanceofcybersecurity
automationandsatisfactionwithit,particularlyamongUKdefenseandfinancialservicesrespondents.Thereasonsforthisarenotimmediatelyclearandoutsidethescopeofthisreport,butitwillbe
interestingtoseehowsentimentchangesinthenexteditionofthestudy.
VERTICALSECTORSNAPSHOT
Ingeneral,therehasbeenariseintheimportancethatindustriesplaceoncybersecurityautomation.Theonlyexceptionisthefinancialservicessector,wherethepercentage
ratingitimportanthasdroppedfrom75%to69%.
20222023
CentralGovernment
71%
75%
Defense
67%
73%
CriticalNationalInfrastructure-EnergyandUtilities
71%
82%
Retail
FinancialServices
55%
75%
77%
69%
ThreatQuotientTake:
Thefinancialservicessectoristypicallymorematurethanothersectorsontheroadtocybersecurity
automation,havingbeenanearlyadopter.Assuch,itencounteredthechallengeswehavedocumentedoverthetimewe’vebeenconductingthissurveyatanearlierstagethanthoseinothersectors.Nowitisstrivingtomitigatethemandoptimizeautomationdeployments.Otherindustries,earlierintheadoptioncycle,arebenefitingfromadvancesinautomationsolutionssomayfindtheyhaveaneasierjourney.
10
Industriesagreethatefficiencyisthemaindriverforadopting
cybersecurityautomation,butvaryonthekeyusecases
There’sconsensusacrossthedifferentsectorsonthemaindriverforadoptingmore
cybersecurityautomation:efficiencyistheprimarygoal.Theonlyoutlieriscritical
nationalinfrastructure,whereproductivitytopsthelist.Buttheroutetoachieving
theseefficiencyandproductivitygainsvariesintermsofthemostcommonusecases
forautomationineachsector.Forcentralgovernmentrespondents,thetopusecase
isphishinganalysis(35%),whilefordefenserespondents,incidentresponseandthreat
intelligencemanagementtieat34%.Criticalnationalinfrastructurerespondentsaremostlikelytobeusingitforvulnerabilitymanagement/prioritization(37%),whileinfinancial
servicesalerttriageisthemostpopularapplication.Intheretailsectoritisnotsurprisingthatpasswordresetisthetopusecase(32%).
Whenanalyzingtheproblemsexperiencedbyverticalsector,wefindthatslowuser
adoptionisthemainissueinfinancialservicesandcriticalnationalinfrastructure.
However,fordefenseandretailrespondents,themainissueislackoftrustinoutcomes.Incentralgovernmentbaddecisionsandalackofskillareequallychallenging.
Thetopthreechallengesforcybersecurityteamsvarybetweenverticals
Central
Government
Defense
Critical
National
Infrastructure
Retail
Financial
Services
1
2
3
Highteammemberchurnrate
Threatenvironmentis
escalatingfasterthan
ourdetection/defense
capability
Cybersecuritytool
sprawliscausing
inefficiencies=
Insufficientbudget
Lackoftime
Insufficientbudget
Growing
regulatory/compliancerequirements
Highteam
memberchurn
rate
Lackoftime
Alertfatigue
(toomanyalerts
foranalysts
tohandle
effectively)
Growing
regulatory/compliancerequirements
Alertfatigue(too
manyalertsfor
analyststohandle
effectively)
Lackofskills
=insufficient
budget
Growing
regulatory/
compliance
requirements
Insufficientbudget
Threat
environmentis
escalatingfaster
thanourdetection/
defensecapability
Highteammemberchurnrateisparticularlytroublingincentralgovernmentandcriticalnationalinfrastructureorganizations,especiallygiventhelengthyvettingprocessesandindustry-specificknowledgerequiredinthesesectors.Thefactthatretailandfinancial
servicescompaniesrankregulatoryandcompliancedemandsastheirbiggestchallengereflectsthefast-growingswatheofprivacyandsecurityregulationsthatthesesectorsaresubjectto.
11
Financialservicesanddefenseorganizationsarestrugglingwithautomation
Whenlookingathowsectorsviewcybersecurityautomation,thefinancialservices
storycontinuestoplayout.Oneinfiverespondentsinthissectorsaycybersecurity
automationiscreatingmoreproblemsthanitissolving,andthoseinthedefensesectorshareasimilarview.Thesearebothlikelytobefurtherintheirautomationjourney
andstrugglingmorewithchallengesandtryingtooptimizetheirdeployments.Central
governmentrespondentsaremostlikelytosayitwillgetmorefundamentaltotheir
approachastheygetbetteratexpandingitsuse.Criticalnationalinfrastructureandretailrespondentsarepositiveandplanningtorolloutmoreautomationinthecomingyear.
Thereisstrongconsensusacrosssectorsonthequestionofbudget,withthemajoritydivertingbudgetfromotherteamsandtoolsinordertopursueautomation.
Intermsofthefeaturesthey’relookingtoacquireviacybersecurityautomationsolutions,thefacilitytointegratemultipledatasourcesisthetoprequirementformost.However,forcriticalnationalinfrastructurerespondentstheavailabilityoftrainingtopsthelist,andforfinancialserviceslowtotalcostofownershipisthemainrequirement–againshowinghowthissectorisintheoptimizationphaseofdeployment.
SectorsagreethatteamsatisfactionandretentionarethebestwaytomeasureROI,butthereisvariationwhenconsideringthebestwaytomakeapositiveimpactonwellbeing:
CriticalNational
Infrastructure
Topchoiceforbiggestimpactonwellbeing
Investmentinsmartertoolsto simplifywork
Greater
flexibilityover
workinghours/
location
Consolidationof
existingtoolsto
simplifywork
Increasing
headcountAND
moreeffective
cybersecurity
automation
Moretechnicaltraining
sotheybecomemore
skilledatusingthetools
wehave
Central
Government
FinancialServices
Defense
Retail
ThreatQuotientTake:
Thevariationsbetweendifferentverticalsectorssuggestthatitisimportantthatbothvendorsandbuyersunderstandwherethebusinessisonitscybersecurityautomationmaturityjourneybeforeembarkingonthenextphase.Conductingamaturityassessmentwillallowbothpartiestodesignmoreeffectivesolutionsthataccuratelyaddressprevailingchallengesandbuildanachievableroadmapformoresuccessful
automationinfuture.Thefocusmustbeonpartnershipoverthelongterm,ratherthanattempting“fitandforget”stylesolutionsthatcanultimatelyleadtomorepainfurtherdowntheline.Cyberthreatsevolveallthetime,andsomustautomation.
12
ROLE-BASEDCOMPARISONS
Wesurveyedvariousrole-holderswithinthecybersecurityprofessionalcohort,includingCISOs,HeadsofCyberThreatIntelligence,HeadsofSOC,HeadsofIncidentResponse,
HeadsofITSecuritySoluti
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年亞洲合作框架協(xié)議
- 2025年公共設(shè)施清潔與保養(yǎng)合同
- 2025年倉儲場地租用策劃合同樣本
- 2025年海洋服務(wù)項目規(guī)劃申請報告模范
- 2025年獨家代理授權(quán)合同文件
- 2025年企業(yè)復(fù)印紙張采購合同范文
- 2025年合同爭議上訴狀
- 2025年個體挖掘機租賃合同格式
- 2025年光纖系統(tǒng)維護勞務(wù)分包協(xié)議
- 2025年企業(yè)租車合作協(xié)議樣本
- 投標(biāo)流程及注意事項(課堂PPT)
- 日照功率半導(dǎo)體項目投資計劃書范文
- 統(tǒng)編版三年級語文下冊第三單元《綜合性學(xué)習(xí):中華傳統(tǒng)節(jié)日》教案
- 兒童注意力測試表
- 大學(xué)生預(yù)征對象登記表
- EN50317-2002-鐵路應(yīng)用集電系統(tǒng)受電弓和接觸網(wǎng)的動力交互
- 人教版美術(shù)八下課程綱要
- 項目部組織機構(gòu)框圖(共2頁)
- 機動車登記證書
- 鉭鈮礦開采項目可行性研究報告寫作范文
- 小升初數(shù)學(xué)銜接班優(yōu)秀課件
評論
0/150
提交評論