




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Security’sLament:ThestateofcybersecurityintheUK2“Thefuturebelongstoorganisationswithastrongcybersecurityfoundation”3 iomartCyberSecurityReport October2022WelcomefromReeceWelcometotheiomartStateofCyberSecurityReport2022.Thechangeswe’veallexperiencedinthelastthreeyearshaveleftalastingmarkonthebusinesslandscape.Therearefewplaceswe’reseeingthatmoreprevalentlythancybersecurity.Organisationsarefacingagreaternumberofthreatsthaneverbefore.Thatmuchisevidentfromtheresponsesanddatagatheredinoursurvey,withthenumberofbreachesbeinghigherthanevenIexpected.What’smore,thethreatswenowfacearefarmorecomplexanddifficulttodefendagainst.So,rightnowthere’sagreatdealofuncertaintyallaroundus.Thisuncertaintycanmakeyourlifeasadecisionmakerprettychallenging.Wehaveworkedwithindependentresearchexperts,OxfordEconomics,toproducethiscybersecurityreport.OuraimwastosurfacewhatotherUKbusinessleadersareexperiencing,howthey’renavigatingchallenges,andgiveyouabitofclarityonthecybersecuritylandscape.Itcanfeelprettytoughwhenyou’refacingcybersecurityissuesalone.It’sdifficulttobenchmarkyourstrategyamongstyourpeers.Orevengetclarityaroundthebesttechnologytouse–andhowtoattracttherighttalenttoproperlyusethattechnology.Fromthereport,you’llfindthat,whilecybersecurityiscomplexandchallenging,itcanalsobeusedasabusinessenabler–toattractmorecustomersanddifferentiateyourselffromthecompetition.Alongwithvaluableinsightintohowotherbusinessesaretacklingthisnewthreatlandscapesuccessfully.Wehopeyoufinditreallyinterestinganduseful.Thanks,ReeceDonovanCEOiomartGroupplc1ContentsIntroduction. 3Part1:Theconstantpressuretokeepupwithevolvingthreats 4Part2:Sourcingtherighttechnologyandtalenttocombatthreats. 6Part3:Theorganisationsthataredoingcybersecurityreallywell 8Conclusion 112 iomartCyberSecurityReport October2022IntroductionThethreatlandscapehasneverbeensocomplexandchangeableThethreatlandscapecontinuestoevolveatadizzyingpace.Assoonasthemarkethascomeupwithanewtechnologysolutiontodeterbadactors,theygettoworkfindinganotherwayin.Theoldhackerstereotypesdon’tringtrueanymoreeither.It’snolongerafewhackersinadimlylitbasement–manybadactorsnowruntheiroperationsasfullyfledgedbusinesses.They’rewellresourced,well-fundedandoftenhighlyskilled.Insomecases,theyevenhavecustomerservicedepartmentsforfellowhackersstrugglingtousethemalicioussoftwarethey’vepurchased.ThefuturebelongstoorganisationswithastrongcybersecurityfoundationFromourreportonethingisclear.Acybersecurityincidentisamatterof‘when’ratherthan‘if.’Somakingsureyouhavearobustsecuritypostureisessentialtomitigateagainst,anddealwith,threats.It’snotjustaboutprotectingyourselfthough.OurreportalsoshowsthatmanyCyberSecurityStrategyLeadersareusingtheirstrategiestosupportinnovation,attractbusinessandenablerevenuegrowth.Todothis,theytakeaholisticapproachtosecurity–aligningtheirsecurityplanswiththeirITandbusinessstrategies.Noteveryonewesurveyedisquitetherethough.Asitcanbechallengingtopivotyourentirebusinesstowardaholisticandjoinedupcybersecurity
ThebestperformingorganisationshaveafewthingsincommonThere’salottojuggle(andcontendwith).Butourreporthasfoundtheorganisationsdoingitright,fullyunderstandtheoperational,financialandreputationaldamagethatcanbedonebyasingleincident.Andtheseorganisationshaveafewkeythingsincommon:Theyknowwheretheyarevulnerabletothreats(fromwithinandoutsidetheirorganisation).Theyfosteracross-functionalcultureofsecurity.Theyincludesecurityexpertiseontheirboard.Theyprocure,train,andupskilltherightemployees.Theystrategicallyinvesttomodernisecybersecurityoperations.UnderstandinghowUKorganisationsareimplementingtheirstrategiesDuetoitsnature,cybersecurityisoftenplayedwithcardsclosetothechest.Andunderstandablyso.Thismakesithardfordecisionmakerstobenchmarktheircybersecurityapproachagainstotherorganisations.So,tohelpyoubetterunderstandhowcybersecuritydecisionmakersareimplementingtheirplans,OxfordEconomicsandiomartsurveyed500executivesresponsiblefortheirorganisation’scyberstrategy.Thesamplecomprisesexecutivesfromarangeofindustries—mostwithmorethan1,000employees—allbasedintheUK.
Thesurveyrevealedthesekeytakeaways:Securityincidentsareontherise,butfewarepreparedExecutivesarereportinghighnumbersofcybersecurityincidents(andthosearejusttheonestheyknowabout).Fewfeelconfidentincombattingtheirtopchallengeslikephishingandmalware,andalackofskilledemployeesmakesitevenhardertoovercometheseobstacles.Keepingupwithevolvingthreatscontinuestobedifficult,evenmoresowhenthetalenttodealwiththesechallengesisinshortsupply.Cyberprotectioncan’tjustbebought,itneedstobemanagedWithsomanycybersecurityproductsonthemarket,itcanbeoverwhelmingtofindwhichbestsuityourexistinginfrastructure.Investingintechnologytoanticipateandstopattacksintheirtracksiscrucial.Buthavingateamthatknowswhichproductsareneeded,andhowtoimplementandinterprettheiroutput,isevenmorecritical.EliteorganisationsshowawayforwardAselectgroupofrespondentswecallCyberSecurityStrategyLeadersaremorelikelythanotherstoeffectivelymanagecyberattacks,leveragedata,andallocatetalenttoimplementtheirstrategy.LearningfromtheseLeadersmaybecrucialtocombattingcyberincidentsandreachingorganisationalgoalsgoingforward.approach.Manyrespondents’securitystrategiesareaworkinprogress.AndtheseUKbusinessesfindthemselvesdeveloping,updatingandexecutingtheirplanswhilesimultaneouslycombattinganunprecedentednumberofattacks.Furtherchallengesarisewhenyouaddintheconstantlyevolvingthreatlandscape,alongsidemergersandacquisitions,allwhilelookingfortherightsolutionsinanoisycybersecuritymarketplace.
Methodology/demographicsandkeydefinitionsSample:Cybersecuritystrategydecisionmakers(n=500).Executivetitles:CTO,CIO,CISO,CFO,COO,ChiefDigitalOfficer,CEO,ChiefRiskOfficer,ChiefDataOfficer.Sectorscovered:Software,Professionalservices,Legal,Finance,Not-for-profit,Government,Insurance,HealthcareManufacturing,Retail,Transportation,Oil,gas&utilities,Consumerproducts.Companysizesrepresented:Mostrespondentshavemorethan1,000employees.15%have£250m–£499minrevenue,21%have£500m–£999minrevenue,24%have£1bn–£4.99bninrevenue,18%have£5bn–£9.99bninrevenue,23%havemorethan£10bninrevenue.Locationscovered:RespondentsareallfromtheUK.Datesfielded:JulyandAugust2022.3Part1:Theconstantpressuretokeepupwithevolvingthreats55%usesecurityasabasisforinnovation
Financesawthehighestrateofincidents,withanaverageof41,followedcloselybyInsuranceat40,andHealthcareat39incidents.Tomakemattersworse,thepandemicforcedsomeorganisationstochoosebetweenimprovingcybersecurityorkeepingtheiroperationsgoing.Almosthalfagreetherapidchangesinducedbythepandemicledtheirorganisationtosacrificecybersecuritytokeepthelightson,withGovernmentrespondentsmostExecutivesrecognisethevalueofstrongcybersecurityMostrespondentsagreethatastrongsecurityposturecanhelpwithstandexternalthreatsaswellasbuildafoundationforinnovation.Morethanhalfexpecttoseetheirreputationsimprove(56%).And55%usesecurityasabasisforinnovation.Anevenlargernumber(64%)agreethatastrongcybersecurityfoundationcanweathercurrentandemergingthreats.
KeepingpacewithvastnumbersofthreatsisanendlesschallengeOurrespondentsexperiencedanaverageof24incidentsinthepastyear.Whilerespondentsunderstandtheimportanceofasolidstrategy,thenumberofincidentsreportedisstillalarminglyhigh(andthosearejusttheonestheyknowabout).Infact,almosthalfagreecybersecuritythreatsfrombadactorshaveintensifiedinfrequencyoverthepasttwoyears.
likelytosaythis(57%agreed).Fromphishingtoransomware(andeverythingelseinbetween)therelentlessnatureofemergingthreatsprovebothalarmingandchallengingforanyone.Andwecanclearlyseefromrespondentsthat,keepingupwiththepaceofthesethreats,presentsuniquechallenges,andfewareconfidentaboutovercomingthem.Fig.1AllindustriesexperiencedalarminglyhighlevelsofcyberincidentsApproximatelyhowmanycybersecurityincidentshasyourorganisationexperiencedoverthelastyear?Numberofcybersecurityincidents
FinanceInsuranceHealthcareProfessionalServicesLegalSoftwareRetailTransportationOil,Gas,UtilitiesGovernmentNot-for-profitManufacturing605550453530201510504 iomartCyberSecurityReport October2022ConfidenceinthreatresponseremainslowamongexecutivesCybersecurityisnoteasy.Theinabilitytosuccessfullyanticipateandcombatacyberincidenthasledtodisruptedoperations(66%ofrespondents),increasedcoststoremediate(57%),andnegativereputationalimpact(50%).Executivesneedtobridgethesegapstopreventirreversibledamage.Phishing(62%),stilloneofthemostcommonwaysbadactorsluretheirvictims,andmalware(57%)arethecybersecuritythreatsmostofourrespondentsareworriedabout.Butonlyabouthalfsaytheyareconfidentintheirorganisation’sabilitytohandleeach(51%phishingand49%malware).Andonly23%saythey’reconfidentlypreparedforransomware,athreatthat’sdominatedheadlinesforthedestructionanddisruptionithascaused.
ExecutivesflagalackofinternalskillsandresourcesasamajorchallengeTomakethingsworse,nearlyhalfsaytheireffortsarehamstrungbyalackofinternalskillsandresources.Andmanyarelostamongstthefloodofcybersecurityproductsandservicesonthemarket.Morethanone-thirdofrespondents(36%)sayithasgrownharderandmoreexpensivetofindandretaincybersecuritytalent.Andnearlyhalf(47%)citeskillsshortagesasthetopchallengewhenitcomestomeetingtheircybersecuritygoals.Thislabourshortagehasmadeithardertomovepastpandemic-eraproblems.Theincreasedvolumeofdata(49%),changingbusinessmodels(45%),andincreasedpaceoftechnology(43%)continuetocomplicateorganisations’abilitytoprotectthemselvesfromcyberthreats.23%canconfidentlyhandlearansomwareattackFig.2SkillsshortagestopofmindforexecutivesWhatarethetopchallengestomeetingyourorganisation’scybersecuritygoals?5Part2:SourcingtherighttechnologyandtalenttocombatthreatsFig.3LingeringdemandsandchallengesfromthepandemiccloudthepictureTowhatextenthavethefollowingeffectsofthepandemiccomplicatedyourorganisation’sabilitytoprotectitselffromcyberthreats?NavigatingafloodofdifferentcybersecurityofferingsWithawidearrayofcybersecurityproductsonthemarket,executivesarefindingitdifficulttonavigatetheofferingsandgetthemostfromtheirinvestments.Respondentsfoundit’snotenoughtounderstandhowtomanagethreatsintheory–theyalsoneedtoassembletherightteamtogetthejobdone.Oursurveyfoundmanyexecutiveshavetroublesortingthroughthe
pandemicaddedextracomplexityasitpushedmanyexecutivestopivotontheirstrategy.Respondentssaythepandemicbroughtwithitapressingneedtomanageanunprecedentedamountofdata,alongwithfastchangingbusinessmodels,allwhilekeepingupwiththepaceoftechnology.Executivesjugglingthisalongsidetheirorganisation’scybersecuritystrategysayithascomplicatedtheirabilitytoprotecttheirorganisationfromcyberthreats.39%struggletosiftthroughthenoiseofsecurityplayersandproductsnoisefrommanydifferentsecurityplayerstofindtherightfitfortheirneeds—nearlytwoinfive(39%)saytheystrugglewiththis.Butit’snotjustaboutfindingtherightcybersecurityplayer.The
Hiring,trainingandretainingtherighttalentisthekeytocybersuccessWhilemostofoursurveyrespondentshavetakenthecriticalstepofinvestinginnewproductsto6 iomartCyberSecurityReport October2022Fig.4MosthavetakenthefirststepWhatstepshasyourorganisationtakentoprotectitselffromcyberattacks?Whatdoesitplantodointhenexttwoyears?supportastrongercyberstrategy,fewsaytheseinvestmentshaveactuallybeeneffective.Morethanthreequartershaveinvestedincybersecurityservices(80%)andproducts(78%),butlessthanhalf(43%)saythey’vereapedthebenefits.Thismightbebecausemanaginganarrayofproducts,manypurchasedwithoutaclearstrategy,isadauntingtask.Andawidespreadskillsshortagemakesthetaskevenmoredifficult.Almosthalfsayalackofinternalskillsisatopchallengetomeetingtheircybersecuritygoals,andthesamesaytheuptickindatavolumecomplicatesthesecuritypicture.Withoutsomeonetosortthroughthenoise,usefulinsightscanbelost.GettingthemostfromyourcybersecurityinvestmentsOrganisationsneedtherightpeopletomanagetheshifttonewertechnologies.Executivesarestartingtounderstandthis,butit’seasiersaidthandone.
Morethanonethirdofrespondents(36%)sayithasgrownharderandmoreexpensivetofindandretaincybersecuritytalent.Toclosesomeofthesegaps,mosthavealreadyupskilledemployees(77%)andbroughtonmanagedserviceproviders(70%).Butexecutivesalsoseemtobelookingatnon-traditionalsourcesoftalenttoovercomeskillsshortages,with64%planningtoprovideinternshipsandapprenticeshipsoverthenexttwoyears.Half(51%)plantostockboardswithmemberswhohavecybersecurityexpertiseandinvestinthirdpartyconsultantsinthenearfuture(52%).Butbringingmorepeopleondoesn’thavetobetheonlysolutiontoaskillshortage–AIandautomationcanpullsomeweighttoo.Futuretechnologyinvestmentswillfocusonprivatecloud(81%),automation(77%),andAI(72%)–thelasttwoofwhichcouldhelpwithskillsgaps,alertfatigue,andburnout.51%plantobringonboardmemberswithcybersecurityexpertise7Part3:Theorganisationsthataredoingcybersecurityreallywell46%saykeepingupwiththepaceofevolvingthreatsistheirbiggestchallengeWeidentifiedagroupofsurveyrespondentswhoareusingtechnologyandtalenttogetthemostfromtheircybersecuritystrategies.WecallthemourCyberSecurityStrategyLeaders.Thiselitegroup(n=126,approximately25%ofthesample)isdefinedbythefollowingcriteria:They’veimplementedinitiativeslikeemployeeawarenesstraining,hiringin-housespecialistsandthirdpartyconsultants,usingmanagedserviceproviders,usingtechnologieslikeAIandautomation,andaligningtheirstrategywithbusinessandIT.They’remoreconfidentcomparedtootherrespondentsinhandlingthreatslikemalware,phishing,andransomware.They’veimplementedastrongertalentstrategy,likeimprovingemployeeskillsandhiringconsultants,andarefindingthiseffective.
Theymanagedatabetterthanotherrespondents—almostallareconfidentinkeepingupwithdataregulations,maintainingcustomertrustandusingdatatoinformdecisionmaking.They’vemadepurposefulinvestmentsintechnology—mosthaveinvestedincloudandupdatedinfrastructure,aswellasAIandautomation,whichcanhelpclosetheskillsgap.They’reoutperformingtheircompetitors—whilewecannotestablishaclearcausallinkbasedonourcurrentdataset,mosthaveimprovedprofitability,companyreputation,revenue,andinnovationpotentialfarmorethanotherrespondents.TakinglessonsfromthebestpracticesoftheseLeaderscouldgivemanycybersecurityexecutivesalegupgoingforward.8 iomartCyberSecurityReport October2022LearningfromtheCyberSecurityStrategyLeadersFig.5LeadersarereapingthebenefitsoftheireffortsWhichofthefollowingoutcomeshaveyouseenasaresultofyourcybersecuritystrategies?Increasedinnovationpotential38%55%Improvedrevenue77%82%Improvedinternalefficiency50%75%Improvedcompanyreputation37%60%Improveprofitability/costsavings68%72%24%TotalCreationofnewrevenuestreamsLeaders37%ImplementingcybersecuritywithclearstrategyandintentionCyberSecurityStrategyLeadersareadoptingadvancedtechnologies,leveragingthemeffectively,andmakingtheirrobustsecuritypostureintegraltocustomertrust.Tomeettheirfunctionalandorganisationalgoals,executivesneedtoimplementtheirstrategywithfinesse.It’saboutfiguringouttherightbalanceofpeople,processandtechnologyforyourorganisationinparticular.Andunderstandingthatjustbecauseanewtechnologyhascreatedabuzzinthemarket,doesn’tmeanit’srightforyourorganisation’ssecuritystrategy.
SupportedwiththerightexpertisetomakedecisionsExecutivesshouldchoosetheirsecuritysolutionswithintention,supportedbyateambackingthatdecision.Leadersseemtohaveabetterhandleonthisthannon-Leaders.AsLeadersarelesslikelytosaytheyhavetroublesortingthroughanoisycybersecuritymarketplacetofindtherightfitfortheirorganisation.Andthisisprobablybecausetheyhavein-housespecialistsandthird-partyconsultantstohelpthemnavigatedecisionmaking.Leadersarealsomorelikelytohavetakenstepstobuildateamthathelpsguidetheircybersecurity82%ofCyberSecurityStrategyLeadersareupskillingworkers9strategy.Three-quartershaveadoptedemployeetraining(vs.44%total),82%areupskillingworkers(vs.77%total),andhalfhavehiredin-housespecialists(19%total)andthird-partyconsultants(37%total)tomaximisetheirinvestments.Bridgingthecyberskillsgapinnon-traditionalwaysTheseleadersarerealisingtheopportunitiesinbridgingskillsgapswithnon-traditionalsources.Almostthree-quartershavebroughtonboardmemberswithcybersecurityexpertise(vs.39%total)orusemanagedserviceproviders(vs.70%total),and69%useprofessionalservices(vs.33%total).Resultsshowthey’realsolookingtoAIandautomationtolendahand—89%areusingAIatscaleorinsomefunctions(vs.72%total),and97%saythesameforautomation(vs.77%total).NailingthebasicssoyoucanfocusonmorecomplexissuesWhileourLeadersstillfacechallenges,theirprioritieshaveshiftedawayfrompuretechnologyissues.Lessthanathirdsaytoomanycybersecurityproductsonthemarketisachallenge(vs.45%total).Andonlyaquartersaytheyhavedifficultyfindingtherightcybersecurityprovider(vs.36%total)orlackinternalskills(vs.47%total).Theirgreatestchallengesarekeepingupwiththepaceofevolvingthreats(46%)andintegratingcybersecurityintoinfrastructure(44%).Thebasics
aren’tasbigofachallengeforourLeaders.Sothey’vebeenabletomoveontohandlingmorecomplexissues.CybersecuritystrategyLeadersperformbetteroverallDespitethechallengestheyface,Leadersperformbetteroverallthantheremainingthreequartersofrespondents.They’remoreconfidentthannon-Leadersinhandlingtheirtopcyberthreats,managingdata,maintainingcustomertrust,andleveragingdatainsights.Theyaddresstopcyberattacksbetterthannon-Leaders,with57%sayingthey’rehighlyormoderatelyconfidentinhandlingphishing(51%total),while31%saythesameforransomware(vs.23%total).Andwithdedicatedteamstohandledata,they’remanagingtheirdatabetterthannon-Leaders.Almostall(93%)areconfidentinkeepingupwithchangingdataregulations(vs.78%total),64%maintaincustomertrustindataprivacy(vs.58%),andthreequartersusedatatoinformdecisionmaking(vs.62%).Theseeffortsmaywellbelinkedtotheirsuperiorperformanceacrossarangeofbusinessmetrics.Leadershaveimprovedprofitability,efficiency,companyreputation,revenue,andhaveincreasedinnovationmorethantheircounterparts.Fig.6LeadersaddressmorecomplexissuesWhatarethetopchallengestomeetingyourorganisationscybersecuritygoals?ToomanycybersecurityproductsandservicesonthemarketLackofinternalskillsandresources(e.g.,nodedicatedfunctionor24/7capability)KeepingupwiththepaceofevolvingthreatsDifficultyintegratingcybersecurityintoinfrastructureDifficultyfindingtherightcybersecurityprovider
10 iomartCyberSecurityReport October2022Inconclusion–it’sabouttherightbalanceofpeople,processandtechnologyInacomplexcyberenvironment,thebestperformingorganisationswillimplementtechnology,processandtalentstrategieswithi
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 云南大学滇池学院《coredraw图形制作》2023-2024学年第二学期期末试卷
- 南京城市职业学院《德语商贸实践》2023-2024学年第二学期期末试卷
- 南京交通职业技术学院《人体及动物生理学实验》2023-2024学年第二学期期末试卷
- 廊坊师范学院《工程安全与环境保护》2023-2024学年第二学期期末试卷
- 沈阳师范大学《英语视听(4)》2023-2024学年第一学期期末试卷
- 店面退租协议解除合同
- 合同附属合同协议
- 废品设备转让合同协议
- 废料加工原材料合同协议
- 合同法关于保密协议
- 公司电脑常见问题处理手册
- 宠物输液治疗技术-静脉输液疗法(宠物临床治疗课件)
- 猪白条购销合同范本
- 锅炉延期检验申请书
- 部编版道德与法治三年级下册第三单元《我们的公共生活》大单元作业设计案例(一)
- 机械设计手册:单行本 液压传动(第六版)
- 红色故事宣讲《小萝卜头的故事》
- 活动板房拆装合同模板范本
- GPS在森林调查中的应用-手持GPS在森林调查中的应用(森林调查技术)
- 直接打印800字作文纸
- 武汉市轨道交通一号线某期工程土建施工投标施工组织设计
评论
0/150
提交评论