Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented
HIGHLIGHTS
- New report from Intel Security, CSIS, finds three key areas of misaligned incentives that advantage cybercriminals:
- Between fluid attackers and bureaucratic defenders
- Between organisational strategy and real-world/actual implementation
- Between executives and implementers who measure success differently
- Attackers thrive in a fluid, decentralised market, while bureaucracy and top-down decision making constrains defenders
- 93 percent of organisations surveyed have a cybersecurity strategy, but only 49 percent have fully implemented these strategies
- Nearly 60 percent of IT executives believe their cybersecurity strategy is fully implemented, while just over 30 percent of IT staff agree.
- Senior executives designing cyber strategies measure success differently than the implementers who put these strategies into practice, limiting their effectiveness.
LONDON, UK. Intel Security, in partnership with the Centre for Strategic and International Studies (CSIS), today released “Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity,” a global report and survey revealing three categories of misaligned incentives: corporate structures versus the free flow of criminal enterprises; strategy versus implementation; and senior executives versus those in implementation roles. The report highlights ways organisations can learn from cybercriminals to correct these misalignments.
Based on interviews and a global survey of 800 cybersecurity professionals from five industry sectors, the report outlines how cybercriminals have the advantage, thanks to the incentives for cybercrime creating a big business in a fluid and dynamic marketplace. Defenders on the other hand, often operate in bureaucratic hierarchies, making them hard-pressed to keep up.
Additional misalignments occur within defenders’ organisations. For instance, while more than 90 percent of organisations report having a cybersecurity strategy, less than half have fully implemented them. What’s more, 83 percent said their organisations have been affected by cybersecurity breaches, indicating a disconnect between strategy and implementation.
And while cybercriminals have a direct incentive for their work, the survey not only shows that are there few incentives for cybersecurity professionals, but that executives were much more confident than operational staff about the effectiveness of the existing incentives. For example, 42 percent of cybersecurity implementers reported that no incentives exist, compared to only 18 percent of decision makers and 8 percent of leaders.
“The cybercriminal market is primed for success by its very structure, which rapidly rewards innovation and promotes sharing of the best tools,” said Candace Worley, vice president of enterprise solutions for Intel Security. “For IT and cyber professionals in government and business to compete with attackers, they need to be as nimble and agile as the criminals they seek to apprehend, and provide incentives that IT staff value.”
“It’s easy to come up with a strategy, but execution is tough,” says Denise Zheng, director and senior fellow, technology policy program at CSIS. “How governments and companies address their misaligned incentives will dictate the effectiveness of their cybersecurity programs. It’s not a matter of ‘what’ needs to be done, but rather determining ‘why’ it’s not getting done, and ‘how’ to do it better.”
Other key findings of the report include the following:
- Non-executives are three times more likely than executives to view shortfalls in funding and staffing as causing problems for the implementation of their cybersecurity strategy
- Even though incentives for cybersecurity professionals are lacking, 65 percent are personally motivated to strengthen their organisations cybersecurity
- Ninety-five percent of organisations have experienced effects of cybersecurity breaches, including disruption of operations, loss of IP, harm to reputation and company brand, among other effects. But only 32 percent report experiencing revenue or profit loss, which could lead to a false sense of security.
- The government sector was the least likely to report having a fully-implemented cybersecurity strategy (38 percent). This sector also had a higher share of agencies with inadequate funding (58 percent) and staff (63 percent) than the private sector (33 percent and 43 percent).
The report also suggests ways that the defender community can learn from the attacker communities. These include:
- Opting for security-as-a-service to counter the cybercrime-as-a-service model of the criminal market.
- Using public disclosure.
- Increasing transparency.
- Lowering barriers to entry for the cyber talent pool.
- Aligning performance incentives from senior leadership down to operators.
The good news, according to the report’s authors, is that most companies recognize the seriousness of the cybersecurity problem and are willing to address it. Organisations need more than tools to combat cyber attackers; experimentation is necessary to determine the right mix of metrics and incentives for each organisation as they approach cybersecurity through more than just a cost-conscious framework and become more innovative in their organisational structure and processes.
Methodology
Intel commissioned independent technology market research specialist Vanson Bourne to undertake the research upon which this report is based. Intel surveyed more than 800 respondents from companies ranging in size from 500 employees to more than 5,000 across five major industry sectors, including Finance, Healthcare and the Public Sector. The survey targeted respondents with executive level responsibility for cybersecurity, as well as operators that have technical and implementation responsibilities for cybersecurity. Countries represented by respondents include the United States, United Kingdom, France, Germany, Brazil, Japan, Singapore, Australia, and Mexico.
[su_box title=”About Intel Security” style=”noise” box_color=”#336588″][short_info id=’59593′ desc=”true” all=”false”][/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.