Organisations prioritise cyber initiatives but lack fundamentals, says ReliaQuest

In partnership with Ponemon Research, ReliaQuest has announced publication of a survey report detailing the needs and priorities of cybersecurity leaders in the United States and United Kingdom.

The report, “Making Security Possible and Achieving a Risk-oriented Security Posture,” shows that organisations are prioritising strategic security programs but missing the foundational capabilities they need to make meaningful changes to their security posture. Among the roadblocks to achieving a risk-oriented posture are ineffective security metrics, operational inefficiencies, and the lack of full visibility across their dynamic IT environment.

“This research offers insights into the priorities of security leaders, the day-to-day struggles they face and their ambition to support the business through change,” said Ashok Sankar, Vice President of Product and Solutions Marketing at ReliaQuest. “While it’s positive to see more leaders engaging in strategic approaches to securing their organisation, as they look to implement programs like Zero Trust – which can be a multi-year journey – it’s important to keep their energy focused on the fundamentals of cybersecurity. Visibility, metrics and process aren’t sexy, but they are the building blocks of a resilient security program.”

Sankar added: “As organisations seek to digitally transform their business and adapt to hybrid work, it’s critical that security teams are not only aligned on goals, but also have the proper resources to drive resilient security operations, setting the enterprise up for long-term success.”

Key insights include:

Security leaders are committed to a stronger risk-based security posture

  • 57% of respondents are prioritising securely migrating applications to the cloud.
  • Almost half (49%) of security leaders are enabling DevSecOps best practices.
  • 48% of organisations surveyed are prioritising implementing Zero Trust principles as part of their security strategy.

Security teams are not aligned on their security program or metrics

  • The primary obstacle to implementing an IT security risk management program is a lack of standardised metrics to measure progress (64%), followed by the lack of a risk management strategy and decision-making structure (58%).
  • 58% of respondents say that the lack of a well-defined security and risk management program is what makes their organisation most vulnerable to attacks, but only 31% consider developing a risk-reduction program a top security priority.
  • Only a third (37%) of those surveyed believe that their teams are tracking the right security metrics and that it is easy to communicate them to business executives and board members.
  • Only about half (49%) rate developing business goal–oriented metrics as one of the top priorities for the next year.

Security teams are inhibited by process and operational inefficiencies

  • 31% of respondents report their security staff spends at least 3 hours a day manually administering and managing (optimisation, writing rules, integrating) tools.
  • The majority (57%) of organisations have one staff member managing more than four tools in their organisations. Only 17% have one staff member assigned to manage a single tool.
  • 52% agree that their team is spending too much time on data collection activities instead of threat detection and analysis.

Poor enterprise-wide visibility is the main culprit behind risk exposure

  • Only 13% say they have more than 75% visibility across all security tools, including on-premises and the cloud. 69% believe they have less than 50% visibility across all security tools, including on-premises and the cloud.
  • 56% believe they could achieve better threat detection and response efficiency with better visibility by integrating and providing a singular view across tools.
  • 60% state their top challenge in implementing effective threat detection is a lack of integrated visibility into cloud and on-premises sources.
  • Only about one-third (36%) say they are measuring visibility across the environment, including on-premises and the cloud.

The full report is available to download here.


Related posts

Scroll to Top