Companies Boost Budgets to Fight Evolving Cyberattacks
Companies worldwide expect to boost their cybersecurity investments by 34% in the next fiscal year, after raising them by 17% the previous year, according to a just-released study covering 467 firms across industries and based in 17 countries. About 12% of companies surveyed plan to bolster their cybersecurity investments by over 50%.
These increases come in the face of growing annual losses from cyberattacks, which for companies surveyed averaged $4.7 million in the last fiscal year—with more than one in ten firms losing over $10 million. That average loss equates to 0.114% of revenue across all firms surveyed. Losses are more severe for mid-sized companies than for large and very large companies, which have already taken greater action to secure their businesses.
Many executives believe that their cybersecurity investments are paying off. Firms report a decline in the impact of untrained staff, social engineers, and unsophisticated hackers over the last nine months. ESI ThoughtLab’s survey shows that the impact of cyberattacks from malware, phishing, and mobile phone apps also decreased over that period. Yet the escalation in overall reported cyber losses highlights that cybersecurity is an ever-evolving struggle, as hackers target not just individual companies but whole industries, searching for any vulnerability.
Although the impact from certain types of attacks has fallen, the survey shows a rise in others, such as incursions through company supply chains and ecosystems. “This is an example of what we call the ‘balloon effect’ in cybersecurity, where squeezing down on risks in one place causes others to appear elsewhere,” said Lou Celi, ESI ThoughtLab’s chief executive officer. “Thanks to improved cybersecurity, companies are more effectively mitigating risks from unintentional and less sophisticated threat actors, but more advanced adversaries are still finding a way in.”
The research shows that to combat evolving risks, companies need to take a proactive, multi-layered defence. Firms are responding by allocating the biggest share of their budgets to technology while seeking the right balance between investments in people and process. They are also focusing more on risk identification to address emerging vulnerabilities and are investing more in resilience to ensure they can respond quickly to successful attacks.
Other calls to action from the study include:
- Make sure you are investing enough in cybersecurity. Some industries, such as media and consumer markets, are allocating less and may be more exposed to cyber risks.
- Think of cybersecurity like any other existential threat to your business. The risks are not just about privacy, liability, and stealing data; they also can create huge operational risks if the business is interrupted and can have reputational impacts that can hurt market positions.
- Pay attention to risks from partners and your supply chain. As firms draw on ecosystems of third parties to drive digital transformation, they increase their vulnerabilities to cyber risks.
- Be aware that legal and regulatory risks are also rising substantially. Companies that do not comply with new standards face hefty penalties and legal consequences.
- Implement rigorous incident training. To do so, put key stakeholders through a strong scenario exercise to prepare them for events when they occur, and to plan on how to respond quickly.
- Measure your full losses, costs, and returns. When hit by a successful cyberattack, you need to understand all your costs—direct and indirect, tangible and intangible.
ESI ThoughtLab and WSJ Pro Cybersecurity carried out the survey in the spring of 2019 as part of a global research initiative titled The Cybersecurity Imperative. The current survey is a follow-up to a more comprehensive survey of 1,300 companies conducted in the fall of 2018. The latest survey was developed to track how executives’ investments, plans, and perspectives have changed over the last nine months. Learn more about our 2018 research initiative The Cybersecurity Imperative.
The Cybersecurity Imperative program was conducted with a coalition of leading organizations with expertise across the cybersecurity space, including Baker McKenzie, CyberCube, HP, KnowBe4, Opus, Protiviti, the Security Industry Association, and Willis Towers Watson. Each organization is an expert in its own field and provided valuable insights to help guide our research methodology and scope.
Industry: Cyber Security
- SOC Manager. SC Clearance. Immediate opportunity.
Permanent SOC Manager. SC cleared / clearable, London / Birmingham. SOC Manager needed to replace a SOC contractor I placed into a client who is due to complete their assignment at the end of March. The ability to achieve SC clearance is essential. Looking for someone that is a blend of strategic stakeholder engagement with strong technical skills. The role will sit in a relatively new SOC environment. The position is to setup, implementation and management of resources to help with the initial and on-going stages of a new SOC. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-manager-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- Security engineer. Financial Services. UK. Permanent
CH7863 Security engineer. End User . Financial Services Security Engineer needed to monitor and manage a security suite of tools within an End User environment. The Security Engiener will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-
- DevSecOps - Security design / review consultant. SC Clearance. London
CH7858 London £70,000 DevSecOps - Security design / review consultant. DevSecOps - Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
- CONTRACTOR Cyber Vulnerability Analyst, NESSUS, Rapid 7, SC clearance required.
Cyber Vulnerability analyst NESSUS, Rapid 7, needed for IMMEDIATE 3 month contract MUST have / be able to achieve UK SC clearance role to work within a live environment within a public sector department. The individual must have experience in using various security methods and tools such as Rapid7 and NESSUS scan for / identify vulnerabilities, prioritise them according to risk and raise appropriate tickets for remediation / follow up. In depth experience utilising Nessus highly beneficial. Current cyber public sector experience highly desirable.