版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
2023
STATEOF
CYBERSECURITY
AUTOMATION
ADOPTION
INTRODUCTION
ThisisthethirdeditionofThreatQuotient’sannualsurveyofseniorcybersecurityprofessionals,exploringthetopicofcybersecurityautomationadoption.Seven
hundredandfiftyseniorexecutivesintheUK,US,andAustraliasharedtheirviewsontheprogresstheyaremakingtowardadoptingcybersecurityautomation,itskeyusecases,andthechallengestheyface.Inadditiontoidentifyingtrendsovertime,thisyear’sstudyexploreswiderissuessuchasthecriticalfeaturescybersecurity
CONTENTS
2Introduction
2Methodology
3Foreword
5HighLevelFindings
8
RegionalVariations
10VerticalSnapshot
13RoleBased
Comparisons
15Recommendations
17Question
Responses
professionalswanttoseeinautomationsolutions,thetopicofwellbeingamongcybersecurityteams,andhowitcanbeimproved.
ReadthisreporttounderstandhowCISOsandseniorcybersecurityprofessionalsarehandlingtheincorporationofcybersecurityautomationintotheirstrategiestoprotectthecomplex,extendedenterprise–andtheiranalystteams–fromthepressuresofescalatingcyberthreats.
METHODOLOGY
Leadingsecurityoperationsplatforminnovator,ThreatQuotient,commissioneda
survey,undertakenbyindependentresearchorganization,OpinionMatters,inJune2023.SevenhundredandfiftyseniorcybersecurityprofessionalsintheUK,USAandAustraliafromcompaniesemploying2,000+peoplefromfiveindustriestookpart,
including:CentralGovernment,Defense,CriticalNationalInfrastructure–EnergyandUtilities,Retail,andtheFinancialServicesSector.
2
FOREWORD
Thepressureoncybersecurityteamsshowsnosignsofabating.Whiletheglobal
healthcrisisisbehindus,thepast18monthshavebroughtaworldwideeconomicuncertaintyandgeopoliticaltensionatalevelnotseenfordecades.Theresultingenergycrisis,supplychainimpacts,andeffectsonemploymentaresending
shockwavesthroughoutthephysicalanddigitalworld,and–whereverthereis
disruption–cybercriminalsandnation-stateactorsarealwaysonhandtocapitalizeonthesituation.Rightnow,theyareleveragingnewtools,suchasautomation
andgenerativeartificialintelligence(AI),tomakeattacksmoresophisticatedanddeceptive.Asthevolumeandvarietyofcyberthreatsincreaseexponentially,and
skilledcybersecurityworkersremaininshortsupply,seniorcybersecurityleadersfacearelentlessresourcechallenge:howtoprotecttheorganizationinanenvironment
wherebudgetsandpersonnelareunderpressure.
Overthethreeyearsthatwehaveundertakenthissurvey,wehavetrackedthe
adoptionofcybersecurityautomationasasolutiontothisproblem.Our2023StateofCybersecurityAutomationAdoptionresearchfindsthatorganizationsareleaningonautomationtohandleagrowingpercentageofcybersecurityusecaseswiththegoalofincreasingefficiency,respondingtoregulationandcompliancerequirements,andincreasingproductivity.Overall,theyconsiderautomationtobeimportantintheir
organization,andtheyarecontinuingtocommitbudgettoautomationprograms–
eventhoughtheyarehavingtocutbackinotherareastodoso.However,ourstudyalsoshowsthattheproblemshighlightedinpreviousyearsremain–infact,they
havegrown.Everyrespondentsaidtheyhadexperienceddifficultiesofsomekind
whenimplementingcybersecurityautomation.Theserangefromalackoftrustintheoutcomesofautomatedprocesses,slowadoptionbyusers,baddecisionsresultingfromautomation,andalackofskillamongusers.
Thereisundoubtedlyadegreeofdisenchantmentaroundautomationevidentin
thisyear’sstudy,withasensethatithasn’tyetdeliveredonitspromise.Thismirrorsthefindingsofotherindustrywatchersandreflectsthefactthatthemarketisstill
relativelyimmature.Usersarestillworkingtofindtheirfeetandimplementthe
solutionsthatwillsolvetheirchallengesanddelivertherightkindofROI.Atthesametime,vendorsarecontinuingtoinnovateandadvancetheirsolutionsfrombotha
technicalandusabilityperspective,sotheycanachievetheirpotential.
3
ROIisfirmlycenteredonemployeewellbeing
Lastyear,respondentsweredividedonthebestwaytodeterminecybersecurity
automationROI,butthisyearstrongconsensushasemerged.61.5%saythatROIismeasuredbyhowwelltheyaremanagingtheteamintermsofemployeesatisfactionandretention.Lessthanhalfthatfigure(29%)sayROIisdeterminedbyhowwellthesolutionisperforminginsecurityterms.
Thispointstoasignalshiftinwhatorganizationsviewasthe“point”ofinvestingin
cybersecurityautomation–theprimemotivationistoimprovetheexperienceof
employees.Byallowingautomationtoshouldertheburdenoflowervalue,repetitiveactivities,andreleaseanalystsformoreinterestingandfulfillingwork,companiescanimproveemployeesatisfactionandreducechurn.Thestudyfoundthathighteam
61.5%saythatROIismeasuredbyhowwell
theyare
managingtheteamintermsofemployee
satisfactionandretention.
memberchurnrateswereamongthetopthreechallengesfacingrespondentsin
centralgovernmentandcriticalnationalinfrastructureorganizations.ItwasalsothebiggestissuefacingAustralianrespondentsandthoseinaCISOrole.
ThisfindingonROIhasimportantimplicationsforautomationsolutionvendors,
too.Typically,vendorsdesignsolutionsontheassumptionthatbuyersarelookingforconventionalROIbasedonsecurity,accuracy,efficiency,andproductivitygains.However,thisfindingshowsthatnon-traditional,human-focusedmeasuresare
equally,andsometimesmore,important.WithROImeasuredonthebasisofteamsatisfactionandretention,vendorsneedtoincorporatethehumanbenefitsoftheirsolutionintoproductdesignandmessaging.Thereareseveraldevelopmentson
thehorizonthatshouldrespondtothisneed,includingtheadvancementsofAIandgreaterrolloutoflowandno-codesolutions.Byimprovingusabilityandmaking
automationmoreaccessibleforawidercohortofworkers,itshoulddelivermoreusersatisfactionwhilesimultaneouslyachievingtheaccuracyandefficiencyitwasoriginallydesignedfor.
HereatThreatQuotient,weknowthatdata-drivenautomationcanplayakeyroleinhelpingorganizationsdealwiththetechnicalandhumanchallengesofcybersecurity.Ourrecommendationswillassistorganizationsinavoidingthepitfallsandreapingtherewardsofeffectivecybersecurityautomation.
Wehopethatyoufindthisreportinterestingandvaluable.
4
HIGHLEVELFINDINGS
100%
Haveexperiencedproblemswhen
tryingtoautomatecybersecurity
99.9%
Haveincreased
budgetsfor
cybersecurity
automation
75%
SayITcybersecurityautomationis
importanttotheirorganization
61.5%
MeasureROIonthebasisofhowwelltheyare
managingtheteamandemployeesatisfaction/retention
Theimportanceofcybersecurityautomationrisesoverall–buttherearesignsofdisenchantmentinsomeregions
Three-quartersofthecybersecurityprofessionalssurveyedsaidthatcybersecurity
automationisimportanttotheirorganization,withalmostone-third(32%)sayingitisveryimportant.RespondentsfromtheUSandAustraliashoweda17.5%and14%increase
respectivelyinthepercentageofrespondentsratingcybersecurityautomationimportant,upat82.5%and82%,comparedtolastyear.
IntheUK,however,therehasbeenadecreaseof9%,with61%sayingitisimportantto
theirbusinessthisyear.Thisdrophasbeenledbyfinancialservices,defense,andcentralgovernmentrespondents.UKrespondentsweremorelikelythanthoseintheUSand
Australiatosaythattheyhadexperiencedbaddecisionsandslowuseradoptionresulting
5
fromtheirattemptstoimplementcybersecurityautomationandthatit“causesmore
problemsthanitsolves”.Thishasgeneratedalevelofdissatisfactionthatreflectsthe
maturityoftheUKmarket–earlierautomationsolutionshaveprovedtobecomplexandhardtouse,whichwouldcertainlytranslateintoslowadoption.
Automationisbeingmorewidelyusedacrossallusecases
Comparedtolastyear,ahigherpercentageofrespondentsareautomatingkeyareasoftheircybersecurityprogram.Themostnotableincreaseisinalerttriage–anareawhereThreatQuotientresearchidentifiedanopportunitylastyear–where30%arenowusingautomationcomparedtoonly18%in2022.Overall,respondentsarearound5%morelikelytobeautomatingprocessesacrosstherangeofcybersecurityactivitiesthantheywerelastyear.
Interestingly,vulnerabilitymanagementandprioritizationarenowakeyusecaseamong37%ofUSorganizations,anditisalsomoreprevalentamongcompanieslargerthan
10,000employees(42.5%)andthoseinthecriticalnationalinfrastructuresector(37%).Inourexperience,thesearetypicallymorematureorganizationswhenitcomesto
automation,indicatingthatwemayseevulnerabilitymanagementriseuptheagendainother,lessmature,organizationsinfuture.
Greateradoptionissurfacinggreaterchallengesandalackoftrustiskeyamongthem
Theresultisunanimous:implementingcybersecurityautomationisneverproblem-
free.Themoreorganizationsuseautomation,themorechallengestheyareuncovering.Everyonetakingpartintheresearchsaidtheyhadencounteredproblems,withthemostcommontroublingareabeingalackoftrustintheoutcomesdeliveredbyautomated
processes–anissuefor31%.Closebehindis“slowuseradoption”–whichisnot
surprisingifusersdon’ttrustwhattheyareseeing.“Baddecisions”,suchasincorrectlyblockingsuspicious-lookingdomainnamesthatareactuallybenign,orblockinganemailtotheCEOthatturnsouttobegenuine,andlackofskillsmakeupthetopfourissues.
Incombination,theseissuespointtoanenvironmentwheretherealityofdeploying
automationsolutionsisn’tmatchingexpectations.Asvendorsbuildnewfeaturesand
functionalityintotools,thereisadistinctneedtofocusonusabilityandtransparency,soteamscanbuildconfidenceandreapthebenefitsofautomation.
Finance,regulatoryconcerns,andteamchurnarethetopthree
cybersecurityteamchallenges
Wewantedtogetabroaderperspectiveontheissuescybersecurityleadersarefacing
amongtheirteamsandherewefoundevidencethatthemacroeconomicpictureis
havinganimpact.Almostaquarterofrespondents(24%)said“insufficientbudget”wasintheirtopthreebiggestchallenges,reflectingtheeconomicpressuresfacingbusinesses.Thesamepercentage(24%)pointedto“growingcompliancerequirements”asregulatorsincreasinglyintroducemandatorycybersecurityresilienceandrecoveryrequirements
intodraftlegislationandregulations.
6
Highteammemberchurnratewastiedatthirdamongtherespondents’concerns,
indicatingthatthegeneraldisruptionintheemploymentmarketthatfollowedthe
pandemicisaffectingcybersecurityteamsjustasmuchasotherjobroles.Employee
churncausesproblemsasdepartingteammemberstakevaluableskillsandcompany-specificexpertiseawaywiththem,whicharehardtoreplaceinthecurrentemploymentenvironment.Notably,CISOsratehighteammemberchurnastheirmostpressingissue–andtheyarealsomostlikelytosaythatincreasingheadcountwouldhavethebiggesteffectoncybersecurityanalystwellbeing.
Budgetscontinuetorise,buteconomicpressuresarebeingfelt
Allbutonerespondentreportedthattheirbudgetforcybersecurityautomationhas
increased,ariseto99.9%from98.5%lastyear.However,comparedtolastyear,budgetisfarlesslikelytobenetnewallocations–only18.5%hadanetnewbudgetthisyear
comparedto34%thathaditlastyear.Instead,budgetisbeingallocatedfromoutside
thesecurityteamorfromothertools.There’saslightdropinbudgetbeingreallocated
fromheadcountcomparedtolastyear,whichmayshowthatbusinessesarestilltryingtobolstertheirsecurityteamnumbers.
Thelevelofconsensusacrosscountriesandindustriesonthebudgettopicwasincrediblystrong.Economicheadwindsarebeingfelteverywhere,forcingbusinessestobecreativeabouthowandwhattheyfund.Thegoodnewsisthatcybersecurityautomationclearlyholdsacriticalpositionwithinthestrategiesofthesebusinesses,totheextentthattheyarepreparedtocutotherbudgetstoensurecontinuedinvestment.
Multipledatasourceintegration,training,andautomatedreportingtoolstopthewishlist
Whenselectingcybersecurityautomationsolutions,organizationsprimarilywantthe
facilitytointegratewithmultipledatasources–andasthenumberandformatofsourcesgrows,thiswillsurelybecomemoreimportantasteamsseektomakesenseofincreasingvolumesofdata.Nextonthelististraining–essentialasteamsseektogrowtheirskills–andautomatedreporting.CISOsarekeenontheavailabilityoftraining,rankingthisa
longwayaheadofotherissues.
Smartertools,moreflexibility,andhigherheadcountwouldhavethebiggestpositiveimpactonwell-being
Asreportedearlier,ourrespondentsarenowclearonhowtheymeasureROI,with61.5%sayingitcomesdowntohowwelltheyaremanagingtheteamintermsofemployee
satisfactionandretention.Knowingthatmanycybersecurityleadersarestrugglingwithemployeewellbeingandburnout,wewantedtolearnwhattheyfeltwouldhavethe
biggestimpactonwellbeingandemployeeretention.
7
Topofthelistwassmartertoolsthatwillsimplifywork(31%),whilegreaterflexibilityover
workinghoursandlocationfollowedclosebehind,atthesamerateasincreasingteamheadcount(both28%).Thisindicatesthatcybersecurityprofessionalsseetechnology
andhumanfactorsasequallyimportantinimprovingemployeeexperience.The
pandemiccreatednewexpectationsaroundworkflexibilitythatemployeesareunwillingtorelinquish,whilenewerindustryentrantsaredigitalnomadswithhighexpectationsaroundflexiblework.Leadersarealsobeginningtoseethepotentialofinnovations
inareassuchasAIandlow-orno-codetobuildsmartertoolsthatmakeworkmorefulfilling.TheseareareasthatThreatQuotientwillcontinuetodrawoninthefuture.
REGIONALVARIATIONS
Onceagain,wesurveyedequalnumbersofcybersecurityprofessionalsintheUS,UK,andAustraliatolearnhowtheirexperienceofcybersecurityautomationischanging.
RespondentsfromtheUSandAustraliaaremorelikelytosaycybersecurityautomationisimportanttotheircompanythantheywereayearago,with82.5%and82%respectivelysayingitisimportant.USrespondentsarethemostenthusiastic–46%sayitisvery
importanttotheirbusinesscomparedwith26%ofAustralianrespondentswhosay
itisveryimportant.RespondentsintheUKcontinuedtobecomelesspositiveabout
cybersecurityautomation,withthepercentagesayingitisimportanthavingfallento
61%,adropfrom70%ayearagoand77%twoyearsago.Thisfallhasbeendrivenbyfinancialservicesanddefenserespondents,registeringadropof28and26percentagepointsrespectively.Afifth(21%)ofUKrespondentssaycybersecurityautomationisnotimportanttotheirorganization.
Driversandusecasesforcybersecurityautomationvary
TheUSandAustraliaseeefficiency-howwelltheyuseresourcessuchastime,
moneyandskilltogetthejobdone-asthetopdriverforautomation(48%and39%
respectively).IntheUKhigherproductivity-theamountofworkthatindividualsand
teamscangetthroughinagivenamountoftime-isthemainbenefitsought(36%).Thisisconsistentwithlastyear’sfindings.
Theregionsvaryonwhichkeyusecasestheyareautomating.IntheUS,theproportionofrespondentsautomatingvulnerabilitymanagementhasleaptby13percentagepoints.IntheUKandAustralia,thedominantusecaseisphishinganalysis,withthreatintelligencemanagementinsecondplaceintheUKandalerttriagetakingsecondspotinAustralia.
AlerttriagealsotooksecondplaceintheUS,followedbyincidentresponse.Ingeneral,USrespondentsshowedagreaterlikelihoodofautomatingusecasesofallkinds.
Everycountryreportedproblemsimplementingcybersecurityautomation.Thetop
issueintheUKis“baddecisions”resultingfromautomatedprocesses-suchasblockingdomainnamesthatlooksuspiciousbutareinfactbenign,orblockinganemailtothe
8
CEOthatturnsouttobegenuine.Thisproblemwasreportedby36%ofUKrespondents.Itwasfollowedbyslowuseradoption(35.5%)andlackoftrustinoutcomes(31.5%).ForUSrespondents,theirchallengeslayinalackoftrustinoutcomes(32.5%andaparticularproblemforUSdefenserespondents),withalackofskillandbaddecisionsalsocausingdifficulties.InAustralia,lackoftrustinoutcomesisalsothetopissue,withAustralian
financialservicesthemostskepticalinthisarea.SlowuseradoptionandalackofskillsarealsokeybarriersforAustralianrespondents.
Regulatoryandcompliancechallengesareacommonproblem
Intermsofthetopthreebroaderchallengesfacingcybersecurityteams,themainareaofagreementwasaroundgrowingregulatory/compliancerequirements,whichfeaturedinthetopthreeforallcountries.USrespondentsaremostconcernedaboutinsufficientbudget(26.6%),whilehighteammemberchurnrate(25.2%)isthenumberoneconcerninAustralia.
Choosingfromarangeofstatementstheonethatbestmatchedtheirorganization’s
currentviewofcybersecurityautomation,USrespondentsweremostlikelytosayitis
“alreadycentraltotheircybersecuritystrategy”,whileAustralianrespondentssay,“itwillbecomemoreimportantastheygetbetteratexpandingit”.UKrespondentsare,perhapsunsurprisingly,themostlikelytosaythat“itiscausingmoreproblemsthanitsolves”.
Theglobaleconomicpictureisaffectingbudgetsinallregions
Onthetopicofbudget,therewasverylittlevariationbetweenthecountries,
demonstratingtheglobalnatureoftheeconomicuncertaintywe’reexperiencing.Allcountriesaredivertingbudgetfromotherareastobolsterautomationprograms;onlyaround18.5%weregettingnetnewbudget.
Thecountriesagreeonthemostimportantfeatureofcybersecurityautomationtools:theabilitytointegratemultipledatasources.TheUKistheonlycountrytofeaturelowtotalcostofownership(TCO)initstopthreefeatures,perhapsindicatingthatUKbusinessesarebeginningtoworkmoreonoptimizingsolutionsnow,astheirimplementation
cyclematures.Theavailabilityoftrainingisinthetopthreeforallcountries,andUS
respondentsarealsolookingforvisualizationtools,whileAustralianrespondentswantautomatedreporting.
RespondentsfromallregionsconcuronusinghowwelltheyaremanagingtheteamintermsofsatisfactionandretentionasthemainmetricformeasuringROI.TheUKislesslikelythanotherregionstobeassessingROIintermsofhowwellthejobisbeingdone(23%usethiscomparedwith33%intheUSand30%inAustralia).
Intermsofwhatwouldmakethebiggestdifferencetothreatintelligenceanalyst
wellbeing,theregionsvariedacrossthethreeareasofpeople,processandtechnology.Australianrespondentswantmorepeople,UKrespondentswantmoretraining(process),andUSrespondentswantsmartertechnology.
9
ThreatQuotientTake:
Theintensifyingregulatory/complianceenvironment,inconjunctionwithchallengingeconomic
conditions,arethetwocommonfactorsaffectingallthreecountriessurveyed.Beyondthis,theregionsdifferonthetopusecasesandthefactorsthatwouldmakethebiggestdifferencetowellbeing.ThereisalsoadecidedvariationbetweentheUKandotherregionsontheimportanceofcybersecurity
automationandsatisfactionwithit,particularlyamongUKdefenseandfinancialservicesrespondents.Thereasonsforthisarenotimmediatelyclearandoutsidethescopeofthisreport,butitwillbe
interestingtoseehowsentimentchangesinthenexteditionofthestudy.
VERTICALSECTORSNAPSHOT
Ingeneral,therehasbeenariseintheimportancethatindustriesplaceoncybersecurityautomation.Theonlyexceptionisthefinancialservicessector,wherethepercentage
ratingitimportanthasdroppedfrom75%to69%.
20222023
CentralGovernment
71%
75%
Defense
67%
73%
CriticalNationalInfrastructure-EnergyandUtilities
71%
82%
Retail
FinancialServices
55%
75%
77%
69%
ThreatQuotientTake:
Thefinancialservicessectoristypicallymorematurethanothersectorsontheroadtocybersecurity
automation,havingbeenanearlyadopter.Assuch,itencounteredthechallengeswehavedocumentedoverthetimewe’vebeenconductingthissurveyatanearlierstagethanthoseinothersectors.Nowitisstrivingtomitigatethemandoptimizeautomationdeployments.Otherindustries,earlierintheadoptioncycle,arebenefitingfromadvancesinautomationsolutionssomayfindtheyhaveaneasierjourney.
10
Industriesagreethatefficiencyisthemaindriverforadopting
cybersecurityautomation,butvaryonthekeyusecases
There’sconsensusacrossthedifferentsectorsonthemaindriverforadoptingmore
cybersecurityautomation:efficiencyistheprimarygoal.Theonlyoutlieriscritical
nationalinfrastructure,whereproductivitytopsthelist.Buttheroutetoachieving
theseefficiencyandproductivitygainsvariesintermsofthemostcommonusecases
forautomationineachsector.Forcentralgovernmentrespondents,thetopusecase
isphishinganalysis(35%),whilefordefenserespondents,incidentresponseandthreat
intelligencemanagementtieat34%.Criticalnationalinfrastructurerespondentsaremostlikelytobeusingitforvulnerabilitymanagement/prioritization(37%),whileinfinancial
servicesalerttriageisthemostpopularapplication.Intheretailsectoritisnotsurprisingthatpasswordresetisthetopusecase(32%).
Whenanalyzingtheproblemsexperiencedbyverticalsector,wefindthatslowuser
adoptionisthemainissueinfinancialservicesandcriticalnationalinfrastructure.
However,fordefenseandretailrespondents,themainissueislackoftrustinoutcomes.Incentralgovernmentbaddecisionsandalackofskillareequallychallenging.
Thetopthreechallengesforcybersecurityteamsvarybetweenverticals
Central
Government
Defense
Critical
National
Infrastructure
Retail
Financial
Services
1
2
3
Highteammemberchurnrate
Threatenvironmentis
escalatingfasterthan
ourdetection/defense
capability
Cybersecuritytool
sprawliscausing
inefficiencies=
Insufficientbudget
Lackoftime
Insufficientbudget
Growing
regulatory/compliancerequirements
Highteam
memberchurn
rate
Lackoftime
Alertfatigue
(toomanyalerts
foranalysts
tohandle
effectively)
Growing
regulatory/compliancerequirements
Alertfatigue(too
manyalertsfor
analyststohandle
effectively)
Lackofskills
=insufficient
budget
Growing
regulatory/
compliance
requirements
Insufficientbudget
Threat
environmentis
escalatingfaster
thanourdetection/
defensecapability
Highteammemberchurnrateisparticularlytroublingincentralgovernmentandcriticalnationalinfrastructureorganizations,especiallygiventhelengthyvettingprocessesandindustry-specificknowledgerequiredinthesesectors.Thefactthatretailandfinancial
servicescompaniesrankregulatoryandcompliancedemandsastheirbiggestchallengereflectsthefast-growingswatheofprivacyandsecurityregulationsthatthesesectorsaresubjectto.
11
Financialservicesanddefenseorganizationsarestrugglingwithautomation
Whenlookingathowsectorsviewcybersecurityautomation,thefinancialservices
storycontinuestoplayout.Oneinfiverespondentsinthissectorsaycybersecurity
automationiscreatingmoreproblemsthanitissolving,andthoseinthedefensesectorshareasimilarview.Thesearebothlikelytobefurtherintheirautomationjourney
andstrugglingmorewithchallengesandtryingtooptimizetheirdeployments.Central
governmentrespondentsaremostlikelytosayitwillgetmorefundamentaltotheir
approachastheygetbetteratexpandingitsuse.Criticalnationalinfrastructureandretailrespondentsarepositiveandplanningtorolloutmoreautomationinthecomingyear.
Thereisstrongconsensusacrosssectorsonthequestionofbudget,withthemajoritydivertingbudgetfromotherteamsandtoolsinordertopursueautomation.
Intermsofthefeaturesthey’relookingtoacquireviacybersecurityautomationsolutions,thefacilitytointegratemultipledatasourcesisthetoprequirementformost.However,forcriticalnationalinfrastructurerespondentstheavailabilityoftrainingtopsthelist,andforfinancialserviceslowtotalcostofownershipisthemainrequirement–againshowinghowthissectorisintheoptimizationphaseofdeployment.
SectorsagreethatteamsatisfactionandretentionarethebestwaytomeasureROI,butthereisvariationwhenconsideringthebestwaytomakeapositiveimpactonwellbeing:
CriticalNational
Infrastructure
Topchoiceforbiggestimpactonwellbeing
Investmentinsmartertoolsto simplifywork
Greater
flexibilityover
workinghours/
location
Consolidationof
existingtoolsto
simplifywork
Increasing
headcountAND
moreeffective
cybersecurity
automation
Moretechnicaltraining
sotheybecomemore
skilledatusingthetools
wehave
Central
Government
FinancialServices
Defense
Retail
ThreatQuotientTake:
Thevariationsbetweendifferentverticalsectorssuggestthatitisimportantthatbothvendorsandbuyersunderstandwherethebusinessisonitscybersecurityautomationmaturityjourneybeforeembarkingonthenextphase.Conductingamaturityassessmentwillallowbothpartiestodesignmoreeffectivesolutionsthataccuratelyaddressprevailingchallengesandbuildanachievableroadmapformoresuccessful
automationinfuture.Thefocusmustbeonpartnershipoverthelongterm,ratherthanattempting“fitandforget”stylesolutionsthatcanultimatelyleadtomorepainfurtherdowntheline.Cyberthreatsevolveallthetime,andsomustautomation.
12
ROLE-BASEDCOMPARISONS
Wesurveyedvariousrole-holderswithinthecybersecurityprofessionalcohort,includingCISOs,HeadsofCyberThreatIntelligence,HeadsofSOC,HeadsofIncidentResponse,
HeadsofITSecuritySoluti
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二五年度豬場租賃與農(nóng)業(yè)保險(xiǎn)配套服務(wù)合同
- 二零二五年度知識產(chǎn)權(quán)法律服務(wù)合同種類及合同履行監(jiān)督
- 二零二五年度國際物流供應(yīng)鏈管理服務(wù)合同
- 舞蹈雙十一活動(dòng)方案策劃
- 安全生產(chǎn)活動(dòng)方案
- 應(yīng)聘體能教練簡歷
- 大班科學(xué)活動(dòng):神奇的鹽
- 2025施工安全合同模板
- 2025商務(wù)英語經(jīng)驗(yàn)商務(wù)英語合同的語言特色 備考資料
- 【七年級下冊地理湘教版53】第六章 認(rèn)識大洲 全練版:第三節(jié) 美洲
- 2025年河北供水有限責(zé)任公司招聘筆試參考題庫含答案解析
- 《材料分析測試技術(shù)》全套教學(xué)課件
- 人教版8年級上英語各單元語法課件大全
- (完整版)形式發(fā)票模版(國際件通用)
- 武漢東湖賓館建設(shè)項(xiàng)目委托代建合同
- 安徽大學(xué)大學(xué)生素質(zhì)教育學(xué)分認(rèn)定辦法
- 巴布亞新幾內(nèi)亞離網(wǎng)光儲(chǔ)微網(wǎng)供電方案
- 高度限位裝置類型及原理
- 中文版gcs electrospeed ii manual apri rev8v00印刷稿修改版
- 新生兒預(yù)防接種護(hù)理質(zhì)量考核標(biāo)準(zhǔn)
- 除氧器出水溶解氧不合格的原因有哪些
評論
0/150
提交評論