A baker’s dozen of cybersecurity challenges
Challenge 1: Inadequate identification of key risks
Automated solution: Use automated risk-assessment workflows to easily collect accurate information from users and deploy asset-aware risk scoring to focus on likely targets and monitor the most likely risk areas.
Challenge 2: Inadequate budget to ensure high-level cybersecurity
Automated solution: Heighten vigilance against threats with continuous monitoring to reduce gaps and expedite responses by orchestrating processes across tools and teams. Reveal the most important protection gaps using industry-standard MITRE ATT&CK recommendations so the budget has a higher impact. Stretch limited resources with automation whenever/wherever possible.
Challenge 3: Insufficient incident detection and response capabilities
Automated solution: Use analytics and AI to identify and respond to all manner of threats from basic to targeted, using automated playbooks to reduce human intervention or action. Eliminate manual steps and errors in intrusion investigations. Connect data and tools across teams for a complete picture. Reduce time to resolution. Replace uncertainty and delays with precision and continuous improvement.
Challenge 4: Lack of prioritization of cyber risk across organization
Automated solution: Simplify communication of potential risks and mitigations and relate them to the audience to engage and gain support of decision-makers. Automation within your systems can collect, analyze, and present risks, progress, and trends over time to demonstrate the positive impact of investments and decisions.
Challenge 5: Lack of executive support
Automated solution: This challenge and the previous one are symptoms of the same problem—decision-makers need to understand how the problem affects them in order to make cybersecurity a priority. Surveys can provide evidence and benchmarking to help, with your automated processes reliably providing data to associate actions with business goals and risk reduction.
Challenge 6: Rise of new technologies (such as IoT, cloud, and mobile technologies)
Automated solution: Automate discovery and passive assessment of new technologies and vulnerabilities to maintain an accurate profile of devices and software across your company’s IT attack surface. Use consistent risk scoring to evaluate diverse systems for risk and prioritize what to respond to. Include recommended fixes and details in communications between security and IT/OT (information technology/operational technology) partners who implement updates.
Challenge 7: Time needed to automate key workflows and processes
Automated solution: Security operations and vulnerability management technologies provide libraries of simple tasks and multistep workflows to accelerate process automation. Downloadable integrations replace in-house efforts to create and maintain data access from dozens of tools. Low-code app development tools let users create automated workflows quickly and easily.
Challenge 8: Increasing regulatory burden
Automated solution: Regulatory change management systems update frameworks used in compliance monitoring and reporting. Automated monitoring collects and reports compliance data with less effort and fewer spreadsheets.
Challenge 9: Shortage of skilled cybersecurity professionals
Automated solution: Slash workloads by eliminating manual steps. Use guided playbooks to shorten learning curves by tracking corporate policies and automating retrieval of up-to-date data from systems of record. That means less grunt work for human analysts, freeing them for more strategic tasks.
Challenge 10: Ineffective cybersecurity training programs
Automated solution: Embed approved cybersecurity policies and controls within existing processes and within email, browsers, chat, and mobile to make it easier to do the right thing (Outlook, for example, has a feature that allows for one-click reporting of suspicious phishing emails).
Challenge 11: Inadequate governance
Automated solution: Embed governance processes within day-to-day activities and shorten time to discovery of addressable issues. Easily gather timely and defensible evidence to satisfy C-level leaders and board governance committee members, who are increasingly accountable for security outcomes.
Challenge 12: Increasing supply chain vulnerabilities (tied for No. 12)
Automated solution: Perform faster and more thorough assessment of vendor and partner risks across cybersecurity, staffing, data management, and other processes. Reassess risk profile based on a schedule or changes reported by monitoring services. Trigger investigations when reports fail standards and allow for quick responses to mitigate potential risks.
Challenge 13: Functional silos (tied for No. 12)
Automated solution: Share data and workspaces across otherwise fragmented teams to make it easier to collaborate. Integrate and enrich data from different toolsets to improve the quality and relevance of each department’s decisions and actions. Turn policies and SLAs into technical controls and reports that automate day-to-day efforts involved in maintaining defenses.