Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Identity security is a priority for IT security teams, but not understood by the C-suite

By Maria Henriquez
identity-freepik1170x658v470.jpg

Image by vectorjuice via Freepik

July 26, 2022

Sixty percent of IT Security decision makers believe their overall security strategy does not keep pace with the threat landscape and that they are either lagging behind (20%), treading water (13%), or merely running to keep up (27%), according to a Delinea survey. 


The report, which surveyed 2,100 IT security decision makers in more than 20 countries, also highlights differences between the perceived and actual effectiveness of security strategies. While 40% of respondents believe they have the right strategy in place, 84% of organizations reported that they had experienced an identity-related breach or an attack using stolen credentials during the previous year and a half.


The report explores three main key findings:


1. Despite good intentions, over 60% of companies have a long way to go to protect privileged identities and access. 

Most organizations recognize that protecting privileges and identities is a top priority to reduce risk. Ninety percent of respondents agree that identity security is important to meeting business goals. Eighty-seven percent agree that securing identities is a top priority for the next 12 months.


While most organizations talk the talk, they aren’t walking the walk. Only 40% of respondents say their security strategy is keeping pace with the threat landscape. The bulk is falling behind, treading water, or running to keep up. Most haven’t adopted best practices and solutions in their privileged access management (PAM) journey. 


2. Human accounts are getting security attention, while machine identities are vulnerable.

The research found that most organizations implementing privileged access security measures have prioritized the human side. In fact, 63% of organizations have deployed privileged access security measures for user identities. Among the types of human accounts most protected by these measures are IT admins and security teams, followed by developers. Typically, these types of accounts involve people logging onto web applications, databases, and other infrastructure for configuration, troubleshooting, and hands-on operational support.

However, organizations have been slower to protect non-human privileged identities, leaving them exposed and vulnerable to attack. Just about half are protecting application and service identities, and less than half include DevOps and machine identities in their PAM strategy. 


3. Plans for next year focus on incremental security controls, but are missing the big picture to drive real change.

Organizations are looking ahead and making plans to invest in additional measures to improve security. Almost 90% recognize the importance of identity security as a top priority to help achieve business goals, and 87% plan to act to secure privileged identities within the next 12 months. 


However, 75% of organizations believe they will fall short of protecting privileged identities because they won’t get the support they need, and it really comes down to budget and executive alignment. Only 37% say that identity security is well understood by their company’s board and viewed as an enabler for better business operations.


While organizations have made progress toward a more secure future, they have a long way to go. Delinea Chief Security Scientist and Advisory Chief Information Security Officer (CISO) Joseph Carson says the most important takeaway from the research is that the security gap is continuing to get larger.


“While many organizations are on the right path to securing and reducing cyber risks to the business, the challenge is that large security gaps still exist for attackers to take advantage of. The security gap is not only increasing between the business and attackers but also the security gap between the IT Leaders and the business executives. While in some industries, this is improving, the issue still exists,” Carson explains. “Until we solve the challenge on how to communicate the importance of cybersecurity to the executive board and business, IT leaders will continue to struggle to get the needed resources and budget to close the security gap.”  


So, how can organizations improve their identity management? Carson recommends organizations start with an IAM plan on how to federate their existing identities and what risks they expose to the business, including following a privileged access management checklist to help map out a plan and a journey to secure privileged identities.


 For more information, insights and guidance, download a copy of the full report at delinea.com/resources/benchmarking-security-gaps-and-privileged-access.

KEYWORDS: cyber security identity (ID) management machine identity Privileged Access Management risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • meeting-freepik1170.jpg

    It’s not all about the C-suite: How to digitally protect employees

    See More
  • smartphone2-900px.jpg

    Workplace Emergency Planning is Shifting, But Employees Don't Feel It's a Priority

    See More
  • Cloud Security for Rational Leaders: A Practical Approach for the C-Suite

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing