MORE

A State of Insecurity

Nothing worries security executives more than the things they do not know. They fear that breaches are going undetected and that detected breaches go unaddressed. And most are not effective enough at preventing breaches.

What are the threats that have them so concerned? Theft of personally identifiable information (PII) about customers and employees, Distributed Denial of Service (DDoS) attacks, and breaches of customer information are considered most dangerous to reputation and financial performance. Yet preparedness for these attacks does not match threat levels.

Manual processes, a lack of resources, and insufficient data quality are among the top barriers that interfere with the ability to protect against, detect, and respond to security issues.

0%
are highly concerned that detected security breaches are going unaddressed
0%
are highly concerned breaches are going undetected
0%
are highly effective at preventing security breaches

UNPREPARED FOR
TOP THREATS

Few CISOs rate themselves as highly effective
at protecting against top threats:
Breaches of personal information about customers
0%
Distributed Denial of Service by criminals, governments, or hacktivists
0%
Watch and wait attacks
0%

HURDLES TO SECURITY
SUCCESS

0%
manual processes
0%
lack of resources

seriously hamper their organization’s ability to protect against, detect, and respond to security breaches

Automation on the Rise

Automating security tasks is an essential approach to dealing with the onslaught of alerts and potential breaches. The technology lets security executives prioritize alerts based on business criticality, respond more quickly to incidents, and anticipate future dangers. It also helps mitigate shortages of skilled workers and frees security staffers to do higher-value work.

The pace of automation is quickening, and the tasks being automated are increasingly sophisticated as well. But no matter how many tasks are done by machines, automation must be combined with process changes and effective talent strategies to deliver its full value.

The quality and quantity of the data available are critical, too, and a lot of that data flows from IT. Increasing automation could improve the flow of data between functions and speed response times.

MORE TASKS WILL BE AUTOMATED

automate at least 40% of processes in 2017
0%
will automate at least 40% of processes in 2020
0%

INCREASING AUTOMATION
OF STRATEGIC TASKS

Automating in 2017
Will automate by 2020
Prioritizing incidents based on business criticality
0%
0%
Aggregate incident reporting by day/week/month
0%
0%
Trend reporting
0%
0%
Contextualizing and identifying the business criticality of threats
0%
0%
Aggregation of alerts or incidents from multiple security tools
into a single system
0%
0%
Threat intelligence research
0%
0%

Security Response Leaders
Get Better Results

We identified an elite group of respondents who rate themselves as highly effective at protecting against most types of attacks. These Security Response Leaders:

  • Are more focused on increasing automation to make the security function successful, and are automating more strategic tasks.
  • Say strong relationships between IT and security are important to the success of their security function; they also report tight integration with other areas of the business such as operations, strategy and planning, and finance.
  • Rate the prioritization of security alerts in the larger context of the business as critical to the success of their security function.

MEET THE SECURITY RESPONSE LEADERS

SECURITY RESPONSE LEADERS
EMBRACE AUTOMATION...

0%
Leaders
0%
Non-leaders

Automate more than 30% of security processes in 2017

0%
Leaders
0%
Non-leaders

Will automate more than 30% of security processes by 2020

...AND GET MORE VALUE FROM TECH INVESTMENTS

Percent of leaders who say technology drives substantial
or transformational value in this area
Percent of non-leaders who say technology drives substantial
or transformational value in this area
Prioritizing security incidents based on
the needs of the larger business
0%
0%
Remediating security breaches more rapidly
0%
0%
Detecting security breaches more rapidly
0%
0%