版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
Security’sLament:ThestateofcybersecurityintheUK2“Thefuturebelongstoorganisationswithastrongcybersecurityfoundation”3 iomartCyberSecurityReport October2022WelcomefromReeceWelcometotheiomartStateofCyberSecurityReport2022.Thechangeswe’veallexperiencedinthelastthreeyearshaveleftalastingmarkonthebusinesslandscape.Therearefewplaceswe’reseeingthatmoreprevalentlythancybersecurity.Organisationsarefacingagreaternumberofthreatsthaneverbefore.Thatmuchisevidentfromtheresponsesanddatagatheredinoursurvey,withthenumberofbreachesbeinghigherthanevenIexpected.What’smore,thethreatswenowfacearefarmorecomplexanddifficulttodefendagainst.So,rightnowthere’sagreatdealofuncertaintyallaroundus.Thisuncertaintycanmakeyourlifeasadecisionmakerprettychallenging.Wehaveworkedwithindependentresearchexperts,OxfordEconomics,toproducethiscybersecurityreport.OuraimwastosurfacewhatotherUKbusinessleadersareexperiencing,howthey’renavigatingchallenges,andgiveyouabitofclarityonthecybersecuritylandscape.Itcanfeelprettytoughwhenyou’refacingcybersecurityissuesalone.It’sdifficulttobenchmarkyourstrategyamongstyourpeers.Orevengetclarityaroundthebesttechnologytouse–andhowtoattracttherighttalenttoproperlyusethattechnology.Fromthereport,you’llfindthat,whilecybersecurityiscomplexandchallenging,itcanalsobeusedasabusinessenabler–toattractmorecustomersanddifferentiateyourselffromthecompetition.Alongwithvaluableinsightintohowotherbusinessesaretacklingthisnewthreatlandscapesuccessfully.Wehopeyoufinditreallyinterestinganduseful.Thanks,ReeceDonovanCEOiomartGroupplc1ContentsIntroduction. 3Part1:Theconstantpressuretokeepupwithevolvingthreats 4Part2:Sourcingtherighttechnologyandtalenttocombatthreats. 6Part3:Theorganisationsthataredoingcybersecurityreallywell 8Conclusion 112 iomartCyberSecurityReport October2022IntroductionThethreatlandscapehasneverbeensocomplexandchangeableThethreatlandscapecontinuestoevolveatadizzyingpace.Assoonasthemarkethascomeupwithanewtechnologysolutiontodeterbadactors,theygettoworkfindinganotherwayin.Theoldhackerstereotypesdon’tringtrueanymoreeither.It’snolongerafewhackersinadimlylitbasement–manybadactorsnowruntheiroperationsasfullyfledgedbusinesses.They’rewellresourced,well-fundedandoftenhighlyskilled.Insomecases,theyevenhavecustomerservicedepartmentsforfellowhackersstrugglingtousethemalicioussoftwarethey’vepurchased.ThefuturebelongstoorganisationswithastrongcybersecurityfoundationFromourreportonethingisclear.Acybersecurityincidentisamatterof‘when’ratherthan‘if.’Somakingsureyouhavearobustsecuritypostureisessentialtomitigateagainst,anddealwith,threats.It’snotjustaboutprotectingyourselfthough.OurreportalsoshowsthatmanyCyberSecurityStrategyLeadersareusingtheirstrategiestosupportinnovation,attractbusinessandenablerevenuegrowth.Todothis,theytakeaholisticapproachtosecurity–aligningtheirsecurityplanswiththeirITandbusinessstrategies.Noteveryonewesurveyedisquitetherethough.Asitcanbechallengingtopivotyourentirebusinesstowardaholisticandjoinedupcybersecurity
ThebestperformingorganisationshaveafewthingsincommonThere’salottojuggle(andcontendwith).Butourreporthasfoundtheorganisationsdoingitright,fullyunderstandtheoperational,financialandreputationaldamagethatcanbedonebyasingleincident.Andtheseorganisationshaveafewkeythingsincommon:Theyknowwheretheyarevulnerabletothreats(fromwithinandoutsidetheirorganisation).Theyfosteracross-functionalcultureofsecurity.Theyincludesecurityexpertiseontheirboard.Theyprocure,train,andupskilltherightemployees.Theystrategicallyinvesttomodernisecybersecurityoperations.UnderstandinghowUKorganisationsareimplementingtheirstrategiesDuetoitsnature,cybersecurityisoftenplayedwithcardsclosetothechest.Andunderstandablyso.Thismakesithardfordecisionmakerstobenchmarktheircybersecurityapproachagainstotherorganisations.So,tohelpyoubetterunderstandhowcybersecuritydecisionmakersareimplementingtheirplans,OxfordEconomicsandiomartsurveyed500executivesresponsiblefortheirorganisation’scyberstrategy.Thesamplecomprisesexecutivesfromarangeofindustries—mostwithmorethan1,000employees—allbasedintheUK.
Thesurveyrevealedthesekeytakeaways:Securityincidentsareontherise,butfewarepreparedExecutivesarereportinghighnumbersofcybersecurityincidents(andthosearejusttheonestheyknowabout).Fewfeelconfidentincombattingtheirtopchallengeslikephishingandmalware,andalackofskilledemployeesmakesitevenhardertoovercometheseobstacles.Keepingupwithevolvingthreatscontinuestobedifficult,evenmoresowhenthetalenttodealwiththesechallengesisinshortsupply.Cyberprotectioncan’tjustbebought,itneedstobemanagedWithsomanycybersecurityproductsonthemarket,itcanbeoverwhelmingtofindwhichbestsuityourexistinginfrastructure.Investingintechnologytoanticipateandstopattacksintheirtracksiscrucial.Buthavingateamthatknowswhichproductsareneeded,andhowtoimplementandinterprettheiroutput,isevenmorecritical.EliteorganisationsshowawayforwardAselectgroupofrespondentswecallCyberSecurityStrategyLeadersaremorelikelythanotherstoeffectivelymanagecyberattacks,leveragedata,andallocatetalenttoimplementtheirstrategy.LearningfromtheseLeadersmaybecrucialtocombattingcyberincidentsandreachingorganisationalgoalsgoingforward.approach.Manyrespondents’securitystrategiesareaworkinprogress.AndtheseUKbusinessesfindthemselvesdeveloping,updatingandexecutingtheirplanswhilesimultaneouslycombattinganunprecedentednumberofattacks.Furtherchallengesarisewhenyouaddintheconstantlyevolvingthreatlandscape,alongsidemergersandacquisitions,allwhilelookingfortherightsolutionsinanoisycybersecuritymarketplace.
Methodology/demographicsandkeydefinitionsSample:Cybersecuritystrategydecisionmakers(n=500).Executivetitles:CTO,CIO,CISO,CFO,COO,ChiefDigitalOfficer,CEO,ChiefRiskOfficer,ChiefDataOfficer.Sectorscovered:Software,Professionalservices,Legal,Finance,Not-for-profit,Government,Insurance,HealthcareManufacturing,Retail,Transportation,Oil,gas&utilities,Consumerproducts.Companysizesrepresented:Mostrespondentshavemorethan1,000employees.15%have£250m–£499minrevenue,21%have£500m–£999minrevenue,24%have£1bn–£4.99bninrevenue,18%have£5bn–£9.99bninrevenue,23%havemorethan£10bninrevenue.Locationscovered:RespondentsareallfromtheUK.Datesfielded:JulyandAugust2022.3Part1:Theconstantpressuretokeepupwithevolvingthreats55%usesecurityasabasisforinnovation
Financesawthehighestrateofincidents,withanaverageof41,followedcloselybyInsuranceat40,andHealthcareat39incidents.Tomakemattersworse,thepandemicforcedsomeorganisationstochoosebetweenimprovingcybersecurityorkeepingtheiroperationsgoing.Almosthalfagreetherapidchangesinducedbythepandemicledtheirorganisationtosacrificecybersecuritytokeepthelightson,withGovernmentrespondentsmostExecutivesrecognisethevalueofstrongcybersecurityMostrespondentsagreethatastrongsecurityposturecanhelpwithstandexternalthreatsaswellasbuildafoundationforinnovation.Morethanhalfexpecttoseetheirreputationsimprove(56%).And55%usesecurityasabasisforinnovation.Anevenlargernumber(64%)agreethatastrongcybersecurityfoundationcanweathercurrentandemergingthreats.
KeepingpacewithvastnumbersofthreatsisanendlesschallengeOurrespondentsexperiencedanaverageof24incidentsinthepastyear.Whilerespondentsunderstandtheimportanceofasolidstrategy,thenumberofincidentsreportedisstillalarminglyhigh(andthosearejusttheonestheyknowabout).Infact,almosthalfagreecybersecuritythreatsfrombadactorshaveintensifiedinfrequencyoverthepasttwoyears.
likelytosaythis(57%agreed).Fromphishingtoransomware(andeverythingelseinbetween)therelentlessnatureofemergingthreatsprovebothalarmingandchallengingforanyone.Andwecanclearlyseefromrespondentsthat,keepingupwiththepaceofthesethreats,presentsuniquechallenges,andfewareconfidentaboutovercomingthem.Fig.1AllindustriesexperiencedalarminglyhighlevelsofcyberincidentsApproximatelyhowmanycybersecurityincidentshasyourorganisationexperiencedoverthelastyear?Numberofcybersecurityincidents
FinanceInsuranceHealthcareProfessionalServicesLegalSoftwareRetailTransportationOil,Gas,UtilitiesGovernmentNot-for-profitManufacturing605550453530201510504 iomartCyberSecurityReport October2022ConfidenceinthreatresponseremainslowamongexecutivesCybersecurityisnoteasy.Theinabilitytosuccessfullyanticipateandcombatacyberincidenthasledtodisruptedoperations(66%ofrespondents),increasedcoststoremediate(57%),andnegativereputationalimpact(50%).Executivesneedtobridgethesegapstopreventirreversibledamage.Phishing(62%),stilloneofthemostcommonwaysbadactorsluretheirvictims,andmalware(57%)arethecybersecuritythreatsmostofourrespondentsareworriedabout.Butonlyabouthalfsaytheyareconfidentintheirorganisation’sabilitytohandleeach(51%phishingand49%malware).Andonly23%saythey’reconfidentlypreparedforransomware,athreatthat’sdominatedheadlinesforthedestructionanddisruptionithascaused.
ExecutivesflagalackofinternalskillsandresourcesasamajorchallengeTomakethingsworse,nearlyhalfsaytheireffortsarehamstrungbyalackofinternalskillsandresources.Andmanyarelostamongstthefloodofcybersecurityproductsandservicesonthemarket.Morethanone-thirdofrespondents(36%)sayithasgrownharderandmoreexpensivetofindandretaincybersecuritytalent.Andnearlyhalf(47%)citeskillsshortagesasthetopchallengewhenitcomestomeetingtheircybersecuritygoals.Thislabourshortagehasmadeithardertomovepastpandemic-eraproblems.Theincreasedvolumeofdata(49%),changingbusinessmodels(45%),andincreasedpaceoftechnology(43%)continuetocomplicateorganisations’abilitytoprotectthemselvesfromcyberthreats.23%canconfidentlyhandlearansomwareattackFig.2SkillsshortagestopofmindforexecutivesWhatarethetopchallengestomeetingyourorganisation’scybersecuritygoals?5Part2:SourcingtherighttechnologyandtalenttocombatthreatsFig.3LingeringdemandsandchallengesfromthepandemiccloudthepictureTowhatextenthavethefollowingeffectsofthepandemiccomplicatedyourorganisation’sabilitytoprotectitselffromcyberthreats?NavigatingafloodofdifferentcybersecurityofferingsWithawidearrayofcybersecurityproductsonthemarket,executivesarefindingitdifficulttonavigatetheofferingsandgetthemostfromtheirinvestments.Respondentsfoundit’snotenoughtounderstandhowtomanagethreatsintheory–theyalsoneedtoassembletherightteamtogetthejobdone.Oursurveyfoundmanyexecutiveshavetroublesortingthroughthe
pandemicaddedextracomplexityasitpushedmanyexecutivestopivotontheirstrategy.Respondentssaythepandemicbroughtwithitapressingneedtomanageanunprecedentedamountofdata,alongwithfastchangingbusinessmodels,allwhilekeepingupwiththepaceoftechnology.Executivesjugglingthisalongsidetheirorganisation’scybersecuritystrategysayithascomplicatedtheirabilitytoprotecttheirorganisationfromcyberthreats.39%struggletosiftthroughthenoiseofsecurityplayersandproductsnoisefrommanydifferentsecurityplayerstofindtherightfitfortheirneeds—nearlytwoinfive(39%)saytheystrugglewiththis.Butit’snotjustaboutfindingtherightcybersecurityplayer.The
Hiring,trainingandretainingtherighttalentisthekeytocybersuccessWhilemostofoursurveyrespondentshavetakenthecriticalstepofinvestinginnewproductsto6 iomartCyberSecurityReport October2022Fig.4MosthavetakenthefirststepWhatstepshasyourorganisationtakentoprotectitselffromcyberattacks?Whatdoesitplantodointhenexttwoyears?supportastrongercyberstrategy,fewsaytheseinvestmentshaveactuallybeeneffective.Morethanthreequartershaveinvestedincybersecurityservices(80%)andproducts(78%),butlessthanhalf(43%)saythey’vereapedthebenefits.Thismightbebecausemanaginganarrayofproducts,manypurchasedwithoutaclearstrategy,isadauntingtask.Andawidespreadskillsshortagemakesthetaskevenmoredifficult.Almosthalfsayalackofinternalskillsisatopchallengetomeetingtheircybersecuritygoals,andthesamesaytheuptickindatavolumecomplicatesthesecuritypicture.Withoutsomeonetosortthroughthenoise,usefulinsightscanbelost.GettingthemostfromyourcybersecurityinvestmentsOrganisationsneedtherightpeopletomanagetheshifttonewertechnologies.Executivesarestartingtounderstandthis,butit’seasiersaidthandone.
Morethanonethirdofrespondents(36%)sayithasgrownharderandmoreexpensivetofindandretaincybersecuritytalent.Toclosesomeofthesegaps,mosthavealreadyupskilledemployees(77%)andbroughtonmanagedserviceproviders(70%).Butexecutivesalsoseemtobelookingatnon-traditionalsourcesoftalenttoovercomeskillsshortages,with64%planningtoprovideinternshipsandapprenticeshipsoverthenexttwoyears.Half(51%)plantostockboardswithmemberswhohavecybersecurityexpertiseandinvestinthirdpartyconsultantsinthenearfuture(52%).Butbringingmorepeopleondoesn’thavetobetheonlysolutiontoaskillshortage–AIandautomationcanpullsomeweighttoo.Futuretechnologyinvestmentswillfocusonprivatecloud(81%),automation(77%),andAI(72%)–thelasttwoofwhichcouldhelpwithskillsgaps,alertfatigue,andburnout.51%plantobringonboardmemberswithcybersecurityexpertise7Part3:Theorganisationsthataredoingcybersecurityreallywell46%saykeepingupwiththepaceofevolvingthreatsistheirbiggestchallengeWeidentifiedagroupofsurveyrespondentswhoareusingtechnologyandtalenttogetthemostfromtheircybersecuritystrategies.WecallthemourCyberSecurityStrategyLeaders.Thiselitegroup(n=126,approximately25%ofthesample)isdefinedbythefollowingcriteria:They’veimplementedinitiativeslikeemployeeawarenesstraining,hiringin-housespecialistsandthirdpartyconsultants,usingmanagedserviceproviders,usingtechnologieslikeAIandautomation,andaligningtheirstrategywithbusinessandIT.They’remoreconfidentcomparedtootherrespondentsinhandlingthreatslikemalware,phishing,andransomware.They’veimplementedastrongertalentstrategy,likeimprovingemployeeskillsandhiringconsultants,andarefindingthiseffective.
Theymanagedatabetterthanotherrespondents—almostallareconfidentinkeepingupwithdataregulations,maintainingcustomertrustandusingdatatoinformdecisionmaking.They’vemadepurposefulinvestmentsintechnology—mosthaveinvestedincloudandupdatedinfrastructure,aswellasAIandautomation,whichcanhelpclosetheskillsgap.They’reoutperformingtheircompetitors—whilewecannotestablishaclearcausallinkbasedonourcurrentdataset,mosthaveimprovedprofitability,companyreputation,revenue,andinnovationpotentialfarmorethanotherrespondents.TakinglessonsfromthebestpracticesoftheseLeaderscouldgivemanycybersecurityexecutivesalegupgoingforward.8 iomartCyberSecurityReport October2022LearningfromtheCyberSecurityStrategyLeadersFig.5LeadersarereapingthebenefitsoftheireffortsWhichofthefollowingoutcomeshaveyouseenasaresultofyourcybersecuritystrategies?Increasedinnovationpotential38%55%Improvedrevenue77%82%Improvedinternalefficiency50%75%Improvedcompanyreputation37%60%Improveprofitability/costsavings68%72%24%TotalCreationofnewrevenuestreamsLeaders37%ImplementingcybersecuritywithclearstrategyandintentionCyberSecurityStrategyLeadersareadoptingadvancedtechnologies,leveragingthemeffectively,andmakingtheirrobustsecuritypostureintegraltocustomertrust.Tomeettheirfunctionalandorganisationalgoals,executivesneedtoimplementtheirstrategywithfinesse.It’saboutfiguringouttherightbalanceofpeople,processandtechnologyforyourorganisationinparticular.Andunderstandingthatjustbecauseanewtechnologyhascreatedabuzzinthemarket,doesn’tmeanit’srightforyourorganisation’ssecuritystrategy.
SupportedwiththerightexpertisetomakedecisionsExecutivesshouldchoosetheirsecuritysolutionswithintention,supportedbyateambackingthatdecision.Leadersseemtohaveabetterhandleonthisthannon-Leaders.AsLeadersarelesslikelytosaytheyhavetroublesortingthroughanoisycybersecuritymarketplacetofindtherightfitfortheirorganisation.Andthisisprobablybecausetheyhavein-housespecialistsandthird-partyconsultantstohelpthemnavigatedecisionmaking.Leadersarealsomorelikelytohavetakenstepstobuildateamthathelpsguidetheircybersecurity82%ofCyberSecurityStrategyLeadersareupskillingworkers9strategy.Three-quartershaveadoptedemployeetraining(vs.44%total),82%areupskillingworkers(vs.77%total),andhalfhavehiredin-housespecialists(19%total)andthird-partyconsultants(37%total)tomaximisetheirinvestments.Bridgingthecyberskillsgapinnon-traditionalwaysTheseleadersarerealisingtheopportunitiesinbridgingskillsgapswithnon-traditionalsources.Almostthree-quartershavebroughtonboardmemberswithcybersecurityexpertise(vs.39%total)orusemanagedserviceproviders(vs.70%total),and69%useprofessionalservices(vs.33%total).Resultsshowthey’realsolookingtoAIandautomationtolendahand—89%areusingAIatscaleorinsomefunctions(vs.72%total),and97%saythesameforautomation(vs.77%total).NailingthebasicssoyoucanfocusonmorecomplexissuesWhileourLeadersstillfacechallenges,theirprioritieshaveshiftedawayfrompuretechnologyissues.Lessthanathirdsaytoomanycybersecurityproductsonthemarketisachallenge(vs.45%total).Andonlyaquartersaytheyhavedifficultyfindingtherightcybersecurityprovider(vs.36%total)orlackinternalskills(vs.47%total).Theirgreatestchallengesarekeepingupwiththepaceofevolvingthreats(46%)andintegratingcybersecurityintoinfrastructure(44%).Thebasics
aren’tasbigofachallengeforourLeaders.Sothey’vebeenabletomoveontohandlingmorecomplexissues.CybersecuritystrategyLeadersperformbetteroverallDespitethechallengestheyface,Leadersperformbetteroverallthantheremainingthreequartersofrespondents.They’remoreconfidentthannon-Leadersinhandlingtheirtopcyberthreats,managingdata,maintainingcustomertrust,andleveragingdatainsights.Theyaddresstopcyberattacksbetterthannon-Leaders,with57%sayingthey’rehighlyormoderatelyconfidentinhandlingphishing(51%total),while31%saythesameforransomware(vs.23%total).Andwithdedicatedteamstohandledata,they’remanagingtheirdatabetterthannon-Leaders.Almostall(93%)areconfidentinkeepingupwithchangingdataregulations(vs.78%total),64%maintaincustomertrustindataprivacy(vs.58%),andthreequartersusedatatoinformdecisionmaking(vs.62%).Theseeffortsmaywellbelinkedtotheirsuperiorperformanceacrossarangeofbusinessmetrics.Leadershaveimprovedprofitability,efficiency,companyreputation,revenue,andhaveincreasedinnovationmorethantheircounterparts.Fig.6LeadersaddressmorecomplexissuesWhatarethetopchallengestomeetingyourorganisationscybersecuritygoals?ToomanycybersecurityproductsandservicesonthemarketLackofinternalskillsandresources(e.g.,nodedicatedfunctionor24/7capability)KeepingupwiththepaceofevolvingthreatsDifficultyintegratingcybersecurityintoinfrastructureDifficultyfindingtherightcybersecurityprovider
10 iomartCyberSecurityReport October2022Inconclusion–it’sabouttherightbalanceofpeople,processandtechnologyInacomplexcyberenvironment,thebestperformingorganisationswillimplementtechnology,processandtalentstrategieswithi
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年留置導管項目申請報告模板
- 2024-2030年中國潤滑脂行業(yè)運營態(tài)勢及發(fā)展前景預測報告版
- 2024-2030年中國海洋微藻行業(yè)需求趨勢及發(fā)展風險研究報告版
- 2024-2030年中國泡桐木原木行業(yè)運行形勢及發(fā)展規(guī)劃研究報告
- 2024-2030年中國瀝青膠泥行業(yè)十三五需求及投資戰(zhàn)略分析報告
- 2024-2030年中國汽車皮坐墊項目可行性研究報告
- 2022年大學生物科學專業(yè)大學物理二期中考試試卷-附解析
- 2022年大學水產(chǎn)專業(yè)大學物理二期中考試試題B卷-附解析
- 2023年高考一輪多維練小題-地球運動的地理意義(解析版)
- 個人道歉信合集8篇
- 閑魚玩法實戰(zhàn)班課件
- 中考作文指導:考場作文擬題(共23張PPT)
- 人體解剖學:神經(jīng)系統(tǒng)課件
- 六年級上冊數(shù)學課件-6.2 百分數(shù)的認識丨蘇教版 (共24張PPT)
- 【精品主題班會】高三家長會(共30張PPT)
- 四年級上冊書法課件- 10蘭葉撇 |通用版 (共10張PPT)
- 消防水池 (有限空間)作業(yè)安全告知牌及警示標志
- 大學政府采購項目驗收報告(貨物服務類)
- 港口碼頭常用安全安全警示標志
- 熱質(zhì)交換原理與設備復習題(題庫)(考試參考)
- 海上風電施工船舶安全管理辦法
評論
0/150
提交評論