Cyber leaders’ confidence in their organisation’s defenses plummets, but costs mount

Just 1 in 5 respondents considers their organization’s approach to cyber to be effective.

  • 7 months ago Posted in

While the number of cyber threats and associated costs are increasing, cybersecurity leaders appear to be struggling with the effectiveness of their organization’s defenses, according to the EY 2023 Global Cybersecurity Leadership Insights Study.

 

The survey of 500 cybersecurity leaders worldwide finds that just one in five considers their organization’s approach to be effective for current and future threats. Half of respondents also appear skeptical about the effectiveness of the training that their organizations provide and just 36% are satisfied with the levels of adoption of best practices by teams outside the IT department.

 

At the same time, cyber leader respondents report mounting costs associated with cybersecurity investment and an average of 44 cyber incidents in 2022. Chief information security officer (CISO) respondents report an average annual spend of US$35m on cybersecurity and that the median cost of a breach to their organization has increased by 12% to US$2.5m in 2023 and is anticipated to reach US$4m.

 

Despite high levels of spending, detection and response times appear slow. More than three-quarters of respondents (76%) say their organizations take an average of six months or longer to detect and respond to an incident.

 

Richard Watson, EY Global and Asia-Pacific Cybersecurity Consulting Leader, says:

 

“After all the time and money spent on cybersecurity, CISOs still feel very unprepared against cyber threats. The levels of dissatisfaction are more worrying when seen in the context of increasing geopolitical instability, economic uncertainty and the rapid adoption of emerging technologies that will push the number of incidents to even higher levels and see cyber adversaries continually evolve.”

 

Simplify to survive

The study finds that those organizations that are more satisfied with their approach to cybersecurity, experience fewer cyber incidents and can detect and respond to incidents quicker have certain common characteristics.

 

While 70% of these “Secure Creators” identified in the study, define themselves as early adopters of emerging technology, they focus on extracting the most value from specific advanced solutions, such as artificial intelligence/machine learning (AI/ML) (62%) and Security, Orchestration, Automation and Response (SOAR) (52%) that allow them to have a clear line of sight of cybersecurity incidents. In addition, they have specific strategies in place for managing attacks through multiple sources: their own cloud, their partners and through their supply chains. Respondents from these types of organizations appear almost twice as likely to be highly concerned about cyber risks from their supply chain (38%) and related risks, such as intellectual property protection (38%).

 

Finally, “Secure Creators” embed cybersecurity thinking and training from the C-suite down to the workforce. As a result, CISOs from these organizations say that their approach is more likely to positively impact their pace of transformation and innovation (56%), as well as their ability to rapidly respond to market opportunities (58%) and to focus on creating value (63%).

 

Watson says: “When it comes to technology, the more clutter an organization has in its armory, the harder it is to pick up signals and get on top of issues quickly. CISOs should focus not on bolting on new technologies but integrating existing ones better. Organizations are now inextricably and digitally linked to businesses in their supply chain. CISOs should champion thinning out supply chains, so they are dealing with fewer suppliers, and work to ensure that a cyber security lens is applied over them.

 

“It is the very scale and complexity of security measures and processes in an organization that pose the greatest threat to efficient cybersecurity. Instilling a culture of being brilliant at the basics of cybersecurity across the organization can prove to be the best defense.”

New Data Security Posture Management (DSPM), Inline email protection and Gen-AI security...
XM Cyber has released the findings of its third annual research report, Navigating the Paths of...
In response to evolving cyber threats, Graylog has released Graylog Security 6.0 to help...
Extends the Dynatrace platform’s existing security capabilities to enable customers to drive...
Cato Networks has unveiled the findings of its inaugural Cato CTRL SASE Threat Report for Q1 2024....
Google Cloud enables CrowdStrike for Mandiant IR and MDR services.
Powered by Precision AI, copilots will supercharge security team productivity and improve security...
Report highlights how technological advancements breed stronger cloud threats as 91% express...