Over half of enterprise firms don’t have a clue if their cybersecurity solutions are working
Over half of enterprise companies investing in cybersecurity tools and solutions to protect their business interests have no idea how well they are performing, research suggests.
On Tuesday, AttackIQ and the Ponemon Institute released new research on the current state of cybersecurity strategies and investment in the enterprise realm.
The report, "The Cybersecurity Illusion: The Emperor Has No Clothes," includes responses from 577 IT and IT security practitioners working for US enterprise companies and suggests that while security budgets are increasing, awareness around cybersecurity as a whole is not.
On average, enterprise firms are spending $18.4 million every year on cybersecurity and 58 per cent are planning to increase this level of investment by up to 14 per cent over the 2019 - 2020 period.
However, those surveyed admitted that after deployment, cybersecurity solutions monitoring is thin on the ground and a total of 53 per cent have no idea how well the tools and software implemented in corporate networks are performing.
With 47 cybersecurity solution deployments reported as an average, it is no wonder that IT staff have a tough time tracking and monitoring each tool.
A lack of visibility can muddy the water when it comes to a return on investment (ROI) and, furthermore, can mask any existing security holes which remain unresolved despite the implementation of cybersecurity solutions.
Only 39 per cent of survey respondents said that their organizations are receiving full value from their investments, but this in itself could indicate that monitoring and performance metrics are an issue when it comes to ROI.
Cybersecurity and IT staff included in the research also reported an interesting issue with false reports and inadequate barriers to their networks. In total, 63 per cent said they have experienced a security control reporting a threat blocked when in reality, the tool failed to stop malicious behaviour.
"When processes and solutions like this fail, many companies respond by throwing more money at the problem," Larry Ponemon, founder and chairman of the Ponemon Institute commented. "Further security spending needs to be put on hold until enterprise IT and security leaders understand why their current investments are not able to detect and block all known adversary techniques, tactics, and procedures."
The fog surrounding cybersecurity in enterprise networks also appears to be contributing to failures in preventing data breaches. In total, 58 per cent of respondents said a lack of visibility is a reason data breaches still occur at their companies, and only 41 per cent of IT professionals believe their teams are effective in finding and plugging security holes in corporate infrastructure.
When it comes to penetration testing, less than 60 per cent of those surveyed said routine tests take place, and close to one-third have no set dates or schedules in place. In addition, less than half -- 48 per cent -- of respondents said that a security validation (CSV) platform is used to monitor the security of their networks.
"Companies are spending far too much money on cybersecurity solutions without knowing if they are effective," said Brett Galloway, AttackIQ CEO. "More than half of the experts surveyed admit they are in the dark about how well the technologies they have are working and if they're truly effective, which is alarming considering companies are relying on these technologies to protect sensitive information including customer data."
Industry: Cyber Security
- Head of Penetration Testing
- United Kingdom
Head of Penetration Testing needed to join a security consultancy that are delivering client facing penetration testing services around Web app and Infrastructure. Looking for someone hands on that is able to manage a highly skilled technical team of testers. 50-60% of the time is expected to be hands on, other duties will include, but not be limited to; leading and managing the day to day running of the team, mentoring, team upskill, recruitment, reporting, escalation, process improvement etc. Flexible location although south east is preferred. Anyone with Check / CREST experience is highly desirable. MUST be able to achieve SC clearance. UK based role. All details kept in confidence.
- CONTRACT SOC Manager. London / Birmingham. URGENT Immediate role.
REF7847 Contract SOC Manager. SC cleared, London / Birmingham. Initial 3 month Contract. SOC Manager needed to for an URGENT 3-4 month CONTRACT. SC clearance is essential. The project is to aid in the setup, implementation and management of resources to help with the initial stand up stages of a new SOC within a greenfield site. This is a short term contract role whilst a permanent hire is brought on over the coming 3 to 4 months. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- SPLUNK Level 3 SOC Consultant, SIEM Splunk, London / Birmingham
REF CH7825 Level 3 SOC Consultant, SIEM Splunk, London / Birmingham £55,000 + Level 3 SOC Consultant, SIEM SPLUNK needed. Security Clearance. Permanent role Level 3 SOC Consultant, SIEM SPLUNK needed to join a public sector client. The ability to achieve SC clearance is essential. MUST have experience working with SPLUNK ideally to an Advanced Power User level. Splunk Enterprise Security (ES) knowledge and hands on experience highly desirable. The role will include, but not be limited to; managing and handling incidents end to end, supporting and mentoring level 1 / level 2 staff, supporting the SOC manager in the delivery of the SOC roadmap, engaging with the client stakeholders (other technical teams) as and where needed, use case development, advanced search and reporting etc. The individual MUST currently be living in the UK and be able to achieve UK security clearance. (SC) This is a permanent role To arrange a call with Chris Holt use this calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Chris.Holt@dclsearch.com
- Aspiring Cyber Partner. Business lead, market maker.
Aspiring Cyber Partner (management consultancy) with Cyber specialism into Healthcare, Utilities and or Public Sector. Working with new and existing clients to help them solve, transform or evolve their cyber capabilities. MUST have; A proven management consultancy background in cyber. A history of identifying and closing new business opportunities. Currently Revenue generating / must be able to demonstrate recent wins. Client facing to board level with international businesses. Team leadership / mentoring experience. Extensive cyber industry experience. Digital transformation, Start-up environments etc. Experienced presenter at industry events, to be the public face of a business / capability. Breadth of knowledge across Cyber security. Service definition / creation. Would consider a senior director with experience delivering the above looking to step up. All conversations kept in confidence. To arrange a discreet call book a time to speak in my diary via https://calendly.com/chris-holt/cyber-partner-call Chris.Holt@dclsearch.com