Cisco's sixth annual CISO Benchmark Report has found that the average company uses more than 20 security technologies, which makes managing a multi-vendor environment challenging. The report also found:
- Forty-two percent of respondents are suffering from cybersecurity fatigue, defined as virtually giving up on proactively defending against malicious actors.
- More than 96 percent of fatigue sufferers saying that managing a multi-vendor environment is challenging, complexity being the main causes of burnout.
To combat complexity, security professionals are increasing investments in automation to simplify and speed up response times in their security ecosystems; using cloud security to improve visibility into their networks; and sustaining collaboration between networking, endpoint and security teams.
"As organizations increasingly embrace digital transformation, CISOs are placing higher priority in adopting new security technologies to reduce exposure against malicious actors and threats. Often, many of these solutions don't integrate, creating substantial complexity in managing their security environment," said Steve Martino, Senior Vice President and Chief Information Security Officer, Cisco. "To address this issue, security professionals will continue steady movement towards vendor consolidation, while increasing reliance on cloud security and automation to strengthen their security posture and reduce the risk of breaches."
The following findings highlight additional CISO challenges and opportunities for improvement, according to the report:
- Workload protection for all user and device connections across the network was found extremely challenging—Forty-one percent of the surveyed organizations found data centers were extremely difficult to defend, and 39 percent said they struggled to secure applications. The most troublesome place to defend data was the public cloud, with 52 percent finding it very or extremely challenging to secure, and 50 percent claiming private cloud infrastructure was a top security challenge.
- Security professionals struggle to secure the growing mobile workforce and ubiquitous personal devices — More than half (52 percent) of respondents stated mobile devices are now very or extremely challenging to defend. Adopting zero-trust technologies can help secure managed and unmanaged devices without slowing down employees.
- Adoption of zero-trust technologies to secure access of the network, applications, users, devices and workloads needs to increase—Only 27 percent of organizations are currently using multi-factor authentication (MFA), a valuable zero-trust technology to secure the workforce. Survey respondents from the following countries showed the highest MFA adoption rates in this order: USA, China, Italy, India, Germany, and UK. While micro-segmentation, a zero-trust approach to secure access of workloads, had the least adoption at only 17 percent of respondents.
- Breaches due to an unpatched vulnerability caused higher levels of data loss— A key concern for 2020 is that 46 percent of organizations, up from 30 percent in last year's report, had an incident caused by an unpatched vulnerability. Sixty-eight percent of organizations breached from an unpatched vulnerability suffered losses of 10,000 data records or more last year. In contrast, for those who said they suffered a breach from other causes, only 41percent lost 10,000 or more records in the same timeframe.
Security professionals have made positive developments to improve their security posture, the report says:
- Collaboration between network and security teams remains high— Ninety-one percent of respondents reported they're very or extremely collaborative.
- Security practitioners are realizing the benefits of automation for solving their skills shortage problem as they adopt solutions with greater machine learning and artificial intelligence capabilities—Seventy-seven percent of our survey respondents are planning to increase automation to simplify and speed up response times in their security ecosystems.
- Cloud security adoption is increasing, improving effectiveness and efficiency— Eighty-six percent of respondents say utilizing cloud security increased visibility into their networks.
Recommendations for CISOs, from the report:
- Employ a layered defense, which should include MFA, network segmentation, and endpoint protection.
- Gain the highest levels of visibility to bolster data governance, lower risk, and increase compliance.
- Focus on cyber hygiene: shore up defenses, update and patch devices, and conduct drills and training.
- Implement a zero-trust framework to build security maturity.
- To reduce complexity and alert overload, adopt an integrated platform approach when managing multiple security solutions.