Q: Tim, I know that Dark Reading and InformationWeek just completed their annual Strategic Security Survey which asks IT people about their security breaches, spending, and technology plans. What were the key results? Compare what you learned to the results from last year's survey??
Tim Wilson: Dark Reading and InformationWeek recently completed the annual InformationWeek Strategic Security survey, which polls IT executives on their chief concerns, plans, and practices around information security. The responses were interesting and very much in line with what we hear from Dark Reading readers.
In a nutshell -- and we can't give away too much data before it's published -- the survey shows that the IT security situation isn't improving in most enterprises. While data breach incidence was fairly flat from 2014 to 2015, enterprises are experiencing a marked rise in certain kinds of attacks, particularly denial of service attacks, which increased by more than 12% over the past year. And these attacks are taking a toll -- almost 40% of respondents said their business applications and services have been rendered unavailable because of online attacks in the past year.
From an IT perspective, these ongoing threats continue to make an impact on IT strategy and spending. The portion of IT spending that goes to security increased again this year, and most organizations are now spending more than 11% of their IT budgets on security today. Seven percent said they are spending more than 25% of their IT budgets on security. It's becoming a bigger piece of the IT pie every year.
Q: Which results surprised you the most -- and why?
Wilson: Interestingly, new threats and sophisticated attacks weren't listed as the biggest security-related challenges faced by the IT organization. Some 44% of respondents said that the increasing complexity of security is a chief challenge. I believe a large part of this is the complexity around all of the different security technologies and solutions out there -- there are so many products and vendors, and many of them are designed to solve only one problem. I think their concern about complexity also has to do with the increasingly multi-pronged nature of the attacks -- malware is increasingly polymorphic, changing its behavior depending on what systems it infects and automatically evolving to avoid signature-based defenses.
Another 37% of respondents listed "enforcing security policies" as a top challenge, which is a surprisingly high figure. This indicates that enterprises know how they want to protect their data, but don't have the technology they need to enforce the data protection policies they set. A lot of the problem stems from increasing use of technologies and services that are outside of IT's control: employee-owned mobile devices, third-party cloud services, and the external supply chain are all good examples.
I was also surprised that almost half (49%) of respondents listed end-user awareness training as one of the most valuable security practices they have – end-user training ranked even higher than vulnerability analysis, incident response, or strong passwords. This is an interesting response because there is a school of security experts who says that end-user training is essentially a waste of time and that end users will never learn how to protect themselves. But IT executives continue to rate it as one of their most valuable practices.
Q: You mentioned that you've had some conversations with CISOs recently. What are those security professionals telling you about their greatest concerns these days?
Wilson: I conducted a panel of top CISOs at the recent RSA shows in San Francisco, and had the chance to spend some time with executives who have managed security at enterprises, such as GM, Visa, WorldBank, and Mayo Clinic. One of the things that impressed me was that, unlike most security pros, they did not discuss technology first. They are wrestling more with business and administrative issues, such as staffing, budgets, and how to communicate the security message to the CEO and other top executives who are not particularly security-savvy.
After spending some time with these executives, I now see that there is an important bridge that needs to be expanded between today's security threats and defenses -- the kinds of things that Dark Reading writes about every day -- and the question of business risk. The cyber threat is probably the most unpredictable risk that enterprises face today -- you can calculate the dangers and potential costs associated with hurricanes or tornadoes based on past history, but there are no accurate actuarial tables that predict the likelihood or potential cost of a data breach. This makes businesses very nervous because it has a huge potential impact on the bottom line -- yet it can't be predicted accurately. So IT is looking for ways to measure and illustrate the risk of data breaches and ways to use those metrics to help the business make smart security investment decisions.
Q: What solutions are they putting in place to alleviate some of those concerns?
Wilson: At the highest level, I think many enterprises are moving from security management to risk management. Some large enterprises now have a chief risk officer. Security strategies are now built around risk management rather than threat prevention. The reality is that no enterprise can stop every hacker. So it's a question of how much to spend on security (costs) vs. how much risk you can realistically eliminate (benefits).
Some companies are now actively choosing not to implement certain security practices or technologies -- they are accepting a certain level of risk because they feel the benefits will be greater if they spend the money on something that's more core to their business. I don't think there's anything wrong with that. IT security is not about preventing every attack. It's about understanding the risks and likelihood of attack and making intelligent decisions on what you can do to prevent them. Just as a business might see a certain financial risk as acceptable, more businesses are identifying some security risks as acceptable. They may get burned, they may not. But you can't protect against everything when security is only 11-15% of your IT budget.
On a more tactical level, enterprises are investing more and more in technologies that help identify and measure risk. For example, threat intelligence services promise to help the enterprise identify and plan for threats emanating from external attackers. These services help correlate internal incidents and vulnerabilities with the likelihood of an external attack. Similarly, many enterprises are investing in security analytics tools that help analyze security logs and devices to root out indicators of sophisticated attacks. Enterprises are looking to make better use of the data they already have to detect multi-phased exploits and reduce the risk of a breach. This focus on forensics and security data analytics has been growing for the past several years and I expect it to continue in the next few years.