Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementVideo SurveillanceCybersecurity News

The Cybersecurity Imperative: Key Benchmarks and Takeaways for Security Companies

By Kara Klein
cyber6-900px.jpg
November 14, 2018

As the Internet of Things (IoT) grows and cyberthreats become more sophisticated and prevalent, it’s more important than ever for security companies to understand the cybersecurity landscape and have strong cybersecurity postures. The security industry is recognizing the urgency of this issue, too – in the Security Industry Association’s (SIA’s) research to forecast the 2019 Security Megatrends, cybersecurity was identified as the standout trend shaping the security industry. Industry leaders said that cybersecurity’s impact on physical security solutions was the top trend they expected to face in 2019 – by nearly 30 percentage points.

In an effort to strengthen the industry’s cybersecurity understanding and preparedness, this National Cybersecurity Awareness Month, SIA sponsored a groundbreaking global study from ESI ThoughtLab and WSJ Pro Cybersecurity that analyzes and benchmarks the cybersecurity practices and initiatives of 1,300 companies. The report shares insights on cybersecurity best practices, performance metrics and calls to action to help companies address the complex, evolving cyber risk landscape.

Here are some of the top takeaways for today’s security companies:

 

Digital Innovation Presents Cyber Risks and Backlash

As companies embrace new technologies, adopt open platforms and tap supplier and partner ecosystems, they face heightened cyber risks. Companies noted several key threats they are seeing now and expect in the near future:

  • Firms report their biggest current threats are malware (81%), phishing (64%) and ransomware (63%).
  • Companies expect substantial growth over the next two years in cyberattacks through partners, customers and vendors (247% growth), supply chains (146%), denial of service (144%), apps (85%) and embedded systems (84%).

Further, those companies that do not keep their cybersecurity practices on pace with their digital transformation initiatives are more likely to face $1 million+ in losses from cyberattacks. Digital leaders in the early stages of cybersecurity management have a 27-percent chance of facing major attacks – 10 percent higher than for digital leaders whose cybersecurity systems are advanced.

 

Cybersecurity Investments Are Growing and Varied

Companies are addressing cyber risks by considering their cybersecurity investments.

  • Overall, firms increased their cybersecurity investments by 7 percent over the last year, with plans to boost their investment by 13 percent next year.
  • Investments vary by company type (energy/utility leaders plan to increase spending by 20 percent, compared to only 1 percent for manufacturing companies), size (firms with revenue under $5 billion will raise spending at almost triple the average of 13 percent) and location (companies in South Korea, Mexico and Australia will increase investment by more than double the average).
  • Next year, companies will designate 39 percent of cybersecurity budgets to technology, with 31 percent going to process and 30 percent to people. While technologies like multi-factor authentication (90%), blockchain (68%) and IoT (62%) are commonly used, growth is expected in the use of technologies like behavioral analytics (18-fold), smart grid technologies (nine-fold) and deception technology (seven-fold) over the next two years.
  • Companies are investing more in threat prevention and detection than they are in cyber resilience. Next year, firms are expected to increase investment in protection to 26 percent, but they will also allocate more to response (19%) and recovery (18%) and less than before to identification (18%) and detection (18%).

 

Cybersecurity Maturity Helps Mitigate Threats

As companies’ cybersecurity systems mature, the probability of them facing costly cyberattacks decreases; where a cybersecurity beginner has a 21-percent chance of facing a cyberattack generating $1 million or more, the probability drops to 16 percent for intermediate companies and 16 percent for leaders.

Costs of cyberattacks also decrease significantly with cybersecurity maturity: for example, a company with $10 billion in revenue would face an average of $3.9 million in costs if it were a beginner, but if it were a leader, the costs would average $1.2 million.

 

As Companies Address Cyberthreats, They’re Changing Their Staffing Practices

Companies are reorganizing to enhance their cybersecurity postures – and changing their practices as they move up the maturity curve, too.

  • Chief information security officers are more likely to be given primary cybersecurity responsibility at companies that are cybersecurity leaders (37%) than they are at beginner companies (20%). Beginner companies and those with less than $1 billion in revenue are more likely to give the board primary responsibility.
  • As companies become more mature in their cybersecurity programs, the ratio of cybersecurity staff to technology staff decreases – this drop is due to both a decreasing need for specialists as firms install automated cybersecurity systems and leverage advanced technology like robotics and artificial intelligence, along with increased reliance on partners and suppliers and outsourcing of cybersecurity efforts.

“Having these clear benchmarks around cybersecurity not only facilitates the advancement of cybersecurity within our members’ own organizations, but it also allows the overall industry to deliver appropriate solutions for their customers,” says Don Erickson, SIA’s CEO and one of Security’s 2018 Most Influential People in Security.

 

Learn more about the study and access the complimentary thought leadership e-book, white paper and cybersecurity benchmarking tool.

KEYWORDS: cybersecurity maturity Internet of Things (IoT) physical security systems Security Industry Association security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kara Klein, Manager of Communications for the Security Industry Association (SIA), creates, advances and manages communications and content programs at SIA, including media relations, social media, communications plans, web content and e-newsletters. Klein previously served as director of digital strategy at the National Cyber Security Alliance, leading the day-to-day operations of a global online safety awareness campaign and managing online strategy and creation, blog content and all web and social media properties.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Unlock the future of cybersecurity news with Security.
As a leader in enterprise security, we have you covered with the information to keep you ahead of the curve.

JOIN TODAY

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security awareness freepik

    Building a culture of cybersecurity: 3 key takeaways from the 2021 SANS report

    See More
  • cyber-security-freepik1170x65825.jpg

    Key takeaways from the Log4Shell vulnerability

    See More
  • us-capitol

    Protective intelligence lessons from the U.S. Capitol riot for companies

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!