ori 8 gin pa al ges res of ea rch MarketFocus In-depth analysis from Intel Security September 2016 HOUSE OF THE RISING SUN Headlines about data breaches do not reflect CISOs’ upbeat infosec attitudes MarketFocus House of the rising sun While high-profile data breaches continue to jar corporate boardrooms, companies seem fairly upbeat about their ability to respond to attacks, new research from SC Magazine finds. Esther Shein explores the security priorities of companies large and small and what they see as their data security impediments for the year to come. I with revenues of $1 billion or more, of which there n spite of the doom-and-gloom media reports were a total of 74 in this sample, are also making it of massive data breaches at major retailers, a priority to protect users off-network. So too are government agencies and hospitals, companies almost 64 percent of companies with more than 5,000 across a wide swath of industries, sizes and revenues employees, of which there were 105 respondents. feel pretty good about their level of preparedness Yet, at the same time, regardless of size and revenue, in the event of a security breach, according to the respondent companies findings of a recent SC What type of threats place preventing mobile Magazine survey of 222 are you most concerned with preventing? malware low on their IT security professionals priority list, behind data sponsored by Intel breaches, ransomware, Security and conducted Data breaches targeted attacks and by C.A. Walker Research zero-day malware, among Solutions. Ransomware other concerns. The only A significant majority concerns ranking lower of respondents say they were file-less malware already are performing Targeted attacks and greyware. Security security functions pros at companies of including suspicious all different sizes and activity detection and Zero-day malware revenues also place a low validation; malicious priority on protecting offactivity containment; Malware network users, ranking incident data search and moving laterally it last among their top investigation; and visibility security objectives. and data collection. Other DDoS This is considered activities include threat likely because companies hunting and sandbox already have deployed detection of zero-day Mobile malware security software on threats, albeit, to a lesser corporate desktops degree. File-less malware and laptops for remote With the increasing users, believes Candace prevalence of mobile Worley, vice president workers, nearly 69 Greyware of enterprise solutions percent of companies 34.7% 22.1% 14% 9.9% 5.9% 5% 4.5% 2.7% 1.4% 2 • www.Intelsecurity.com marketing at Intel Security. Although on-network which there were 50 respondents. users get additional security protections from tools like Conversely, of the respondents at companies with intrusion detection systems (IDS) or firewalls at the greater than $1 billion in revenue, only 17 percent edge, “I still have endpoint protections (on my laptop) considered this their top priority, with two other no matter where I go,’’ she explains. priorities placing higher. In that revenue segment, the top “Over time, the host-based security capabilities have priority was maintaining productivity while the secondmatured to the point where you have not just antivirus place finisher was minimizing damage from attacks. and local firewalls, but There is likely a strong application controls and focus on reducing What are your highest priority security objectives? IDS and elements of vulnerabilities in the data containment or machine center where security learning or other types of pros have full visibility of Reduce vulnerability technology resident on the in-and-out traffic activity, laptop. That’s a fair amount so they are focusing on of protection,” she says. the systems with the Maintain productivity In addition, new greatest amounts of data encryption techniques are and protecting that, Maintain compliance extremely difficult, if not observes Josh Thurston, impossible for a hacker security strategist, to crack, even on lost or Americas, in the Office Minimize damage from attacks stolen mobile devices, of the CTO, at Intel she adds. As long as a Security. Interestingly, company is implementing protecting off-network Reduce incidents appropriate authentication users ranked the lowest techniques, mobile among respondents Connect the workforce workers should be well across the board, protected, she says. and Thurston thinks In terms of companies’ companies perceive that Control costs highest priority security to mean if an employee’s objectives, 31.5 percent phone is stolen it can be Protect of all respondents ranked replaced, or if a laptop is off-network users “reduce vulnerability” as breached, IT simply won’t their number one goal, let it connect back to the followed by “maintain productivity,” a key concern for network and will put that on the back burner. 23 percent of companies with between 1,001 and 5,000 “They care most about their servers — virtual and employees, of which there were 52 in the survey, and physical — and their infrastructure because that’s just over 21 percent at companies with revenues of $1 the livelihood of their business and where most data billion or more. Of the total respondents, 18.5 percent resides,” Thurston says. ranked maintaining productivity first, 13 percent While productivity is important, it would seem ranked it second and 14 percent ranked it third. that it might pale in comparison to recovering from a Twenty-three percent ranked it as their lowest priority. network attack, yet companies don’t always see it that Reducing vulnerability was cited as the top priority way. People focused on productivity are very concerned by 40 percent of respondents at companies with about issues like how to take a person out of the office 1,000 or fewer employees, of which there were 65 for three weeks of security training on software without respondents, and 38 percent of whom are at companies it impacting their work, notes Scott Montgomery, vice with revenues between $100 million to $1 billion, of president and chief technical strategist at Intel Security. 31.5% 18.5% 13.5% 12.2% 9.5% 6.8% 4.1% 4.1% www.intelsecurity.com • 3 What impedes you from meeting your security objectives? What best describes your approach to meeting your security objectives today Overall cost of security 29.3% Process improvement Time consuming manual processes 19.8% Optimizing current technology investment 18.5% Uncoordinated defenses 16.7% Lack of skilled security professionals 11.3% Lack of appropriate tools/technology Volume of infections 4.5% 78.8% 68.5% 65.8% Training security staff 60.4% Acquiring new technology 30.6% Security vendor consolidation Other 4.1% That’s typically not possible; there is a definite States the organization has been compliant” with the impact, he notes. But at the same time, “If they’re not required standards, he says. trained on what we bought, they’re not helping,’’ he Minimizing damage from attacks ranked fourth says. “So reducing the number of vulnerabilities is a among organizations’ priority concerns and cry for help on patching.” There is a double whammy, Montgomery thinks that’s because most organizations he quips, “if I take any form of a productivity hit.” that get breached are not aware it is happening. Companies are also challenged by security systems sprawl, which is yet another reason to provide Legacy systems – the forgotten stepchild training, but many companies are not doing it Respondents gave “reduce incidents” the fifth spot adequately, Montgomery says. “This thinking is very on ladder rung of security priorities and cited various counterproductive, because types of malware (zero-day, if people were better at malware moving laterally and [using] the tools they have mobile) as the threats they they’d probably get better are most concerned with results with less labor, but preventing. This suggests because they’re under- or that companies might not be un-trained; they’re just kind paying as much attention to of grinding along.” protecting themselves against Scott Montgomery, VP, Chief technical strategist, Intel Security He expresses surprise that attacks on legacy systems maintaining productivity that haven’t been updated, wasn’t cited as the highest priority objective, and patched or had new antivirus software installed. believes that “maintain compliance,” which ranked Frost & Sullivan released a report in April 2015, the third, “is a wasted effort.” Montgomery points out that (ISC)² Global Information Security Workforce Study, Target, the victim of a highly publicized breach, had on the alarming lack of security practitioners, while been certified as PCI compliant at the time the breach the number of devices is increasing, especially with was identified. “[In] every major breach in the United the proliferation of Internet of Things (IoT) devices. “Reducing the number of vulnerabilities is a cry for help on patching” 4 • www.Intelsecurity.com “There are only 24 hours in a day and a flat number of people and more devices for them to protect so quality and efficiency are suffering,” he says. “We’re doing a lousy job protecting legacy systems because they are probably the last consideration,’’ Montgomery says. What is top of mind? “The new stuff — cloud, mobile, BYOD. What about the mainframe, where all the data is? Nobody’s looked at it in a year.” Often, legacy systems are no longer patched by the vendor, nor are old versions of an operating system or application being supported by the vendor that developed or sold it so it cannot be updated, adds Worley. This is especially true in manufacturing companies, which have spent millions of dollars to build proprietary software for a business process and find that their entire manufacturing system is now vulnerable to attack. In that case, one of the key things they can do is utilize application control, which allows IT to set a policy that says the only thing allowed to execute on a box is known or whitelisted software, she says. “What that means is you, the admin, will designate an upgraded server and tell that application control product it can only accept changes to the system from this server, and only software that is sent to you by an approved updater will be allowed to update on the Scott Montgomery system,” Worley says. This approach is used by a number of Intel Security’s customers on ATMs, point-of-sale and manufacturing line systems, where software is not updated very often, she says. A somewhat surprising finding was how low respondents across the board ranked “control costs” as a high priority security objective. “I’m actually kind of shocked that it’s that low,’’ says Which of the following security functions are you doing today? Which of the following security functions are a high priority in the next 12 months? “We’ve done a lousy job protecting legacy systems” Suspicious activity detection and validation 86.5% Suspicious activity detection and validation Malicious activity containment 81.5% Malicious activity containment Incident data search and investigation 76.6% Incident data search and investigation Visibility and data collection 74.3% Visibility and data collection In-line prevention of zero-day threats Off-network user protection Threat hunting Sandbox detection of zero-day threats 64% 58.1% 50.5% 42.8% In-line prevention of zero-day threats Threat hunting 71.6% 67.1% 53.2% 46.4% 42.3% 35.6% Sandbox detection of zero-day threats 28.4% Off-network user protection 26.6% www.intelsecurity.com • 5 Which of the following security functions are a priority in the next 12 months? Visibility and data collection Low priority Which of the following security functions are a priority in the next 12 months? Incident data search and investigation Low priority 7.2% 5.9% High priority High priority 46.4% Medium priority 46.4% 53.2% Medium priority 41% Thurston, “because after all, everyone in this industry “That’s controlling costs in a very different way. I … is asking for customers’ money but there’s not a lot think some companies are saying, ‘I can spend a little of money being given out these days.” upfront, maybe more than I planned originally on That is the case even in niche industries like security, and reduce the risk of spending a lot on the healthcare, which have to meet compliance standards backend to clean up a breach,’” Worley says. but are seeing their budgets getting cut. Thurston Montgomery sees that response as the only positive says he expected controlling costs to be chief among to come out of the number of high-profile breaches. security objectives because “[The highly publicized companies are “constantly attacks] raised awareness to penny pinching and they the board room level,’’ he want the most security for says. “People were getting the least amount of money.” sacked and the board room Worley agrees that started asking questions like companies acquiring security ‘What do I need to do to software want the best help my teams?’ I don’t think deal possible because they there’s a shortage of money.” have limited budgets. “It’s Yet, when respondents Candace Worley, VP of enterprise probably a statement that were asked what impedes solutions marketing, Intel Security security is a critical concern them from meeting their for us and we’ll spend what we need to secure our security objectives, 29 percent of respondents cited the organization,’’ she says. On the flip side, breaches are overall cost of security as the number one response. extremely expensive to fix, so if a company spends Of that figure, nearly 41 percent were companies with money upfront that mitigates the risk of an otherwise revenues of less than $100 million. Worley attributes expensive data breach, that company could end up the discrepancy to the fact that, “they’re tortured souls. ahead financially. I think it’s indicative of the fact that they’re working “I can spend a little upfront ... and reduce the risk of spending a lot more on the back-end to clean up the breach” 6 • www.Intelsecurity.com Which of the following security functions are a priority in the next 12 months? Suspicious activity dectection and validation Which of the following security functions are a priority in the next 12 months? Threat hunting Low priority 4.1% Low priority 19.4% Medium priority 24.3% High priority High priority 35.6% 71.6% Medium priority 45% within limited budgets, so they’re trying constantly to balance this interplay of limited budgets with what I have to spend to protect my environment. It’s a balancing act that’s not easy for them to manage.” Thurston finds this baffling and admits he doesn’t understand why there was such a “flip-flop” on the answers. His theory is that companies might be overwhelmed by the number of security products on the market. “Twenty years ago, you got a firewall and antivirus, and you thought about doing intrusion detection, and that was pretty much it,’’ he says. “Nowadays, you have 70 to 80 products you can look at deploying from 800 vendors, and every product has a special use case and you want to buy it. But you have to consider, ‘Am I robbing Peter to pay Paul’ in every one of those scenarios. It’s become a very daunting task for CISOs” to figure out how to get the most for their limited funds. Montgomery wonders if respondents were factoring in the cost of salaries, noting that salaries are “through the roof for security analysts in particular,” and in some cases, a top security analyst can command more salary than the CISO. One revealing insight was that almost 20 percent of all respondents chose “time-consuming manual processes” as the second greatest impediment to meeting their security objectives, followed by uncoordinated defenses (18.5 percent), and “lack of skilled security professionals,” which was cited by almost 17 percent and has been a widely discussed source of angst in the security community. Of the respondents citing the manual process issues, 17 percent are at companies with more than 5,000 employees and almost 14 percent are at companies with revenues of $1 billion or more. Improving process is a business imperative When asked what best describes their approach to meeting their security objectives today, almost 79 percent said “process improvement.” Of those, the vast majority percentagewise, almost 86 percent, were at companies with greater than 5,000 employees. Thurston isn’t surprised by that, noting that the way customers approach security is very manual and user- or security-practitioner centric. He describes this as meaning an individual might take care of one responsibility and not let other members of the team in on the latest findings because there is no process, no workflow and a lack of communication that does not encourage sharing intelligence. www.intelsecurity.com • 7 Which of the following security functions are a priority in the next 12 months? Malicious activity containment Low priority Low priority 3.6% Medium priority 29.3% Which of the following security functions are a priority in the next 12 months? In-line prevention of zero-day threats 8.6% High priority 67.1% Medium priority 49.1% High priority 42.3% He expresses surprise that security vendor more or less built a Tower of Babel,” he says, meaning consolidation, which ranked further down the list they’re trying to get best of breed security tools, (nearly 31 percent) of how companies are meeting when in fact, none of the tools talk to one another. security objectives, wasn’t the highest objective. Consequently, companies find themselves having to Thurston recalls a customer visit where he met with meet lots of vendors and call a variety of help desks the vast majority of its security team – from the CIO for support. If the companies reduce the number to the CISO to the individuals responsible for various of vendors, they “would immediately get process networking and business improvement, optimization unit teams. Someone at the of [their] current technology company commented that investment” and fewer they use 77 security vendors, vendors that have to train and Thurston suggested this employees, so security would might be an issue. be better, Thurston says. The client said it would “If that was the number like to reduce its vendor one approach, all other Josh Thurston, security strategist, count to 20, Thurston says, items in that table would be Office of the CTO, Intel Security and he replied, “How about inherently improved.” under 10? How big of a Worley thinks problem is that?” Thurston says the client’s reply was: respondents chose process improvement because it “We’re spending four hours with you, and we do that could mean something as basic as when a patch is a lot.” Thurston says he tried to get them to see how shipped, there needs to be a process in place for IT time consuming that is and later on, he began asking to apply it to an OS immediately. Even if an OS or other customers how many vendors they have and application vendor releases a patch for a vulnerability how many meetings they have in a week. “They keep or series of vulnerabilities they’ve found and fixed, running in circles and they’re all discovering they’ve oftentimes – either because of resource shortages or “They’re all discovering they’ve more or less built a Tower of Babel” 8 • www.Intelsecurity.com Which of the following security functions are a priority in the next 12 months? Sandbox detection of zero-day threats Low priority 23% High priority 28.4% Which of the following security functions are a priority in the next 12 months? Off-network user protection Low priority 27.9% Medium priority 26.6% Medium priority 48.6% because of change control processes – applying that patch is delayed by days, weeks or months, she says. And of course, the longer it takes a company to apply a patch means a larger window of opportunity for a potential hacker. “It could also mean we need to put in place file integrity monitoring or change control processes that track changes made to a system and notify the IT or security organization when changes outside the standard we’ve set have been made to a server or host,’’ Worley adds. For Thurston, the biggest surprise of the survey is that companies simply do not feel impeded from their objectives by a lack of skilled security professionals. “I have not been to a single customer (who) tells me they’re stable or overstaffed. So not having enough people should impede them most, along with lack of appropriate tools and technology,” which ranked near the bottom at 11 percent, followed by volume of infections at 4.5 percent. He agrees that timeconsuming manual processes are a big impediment because that leads to a lack of integration and automation. Thurston wonders if perhaps respondents are thinking more about long-term objectives than their “day in, day out regiment.” Regardless, he says, High priority 45.5% “coming back to a lack of people and lack of tools should be their number one and two problems.” Ultimately, CISOs and other security professionals seem to be confident in their security precautions. Even though breaches seem to be inevitable, a large percentage of the respondents believe that they are well positioned to identify and stop the breaches before they do significant damage. Whether or not they actually are as prepared as they believe they are will become evident if and when a breach occurs. Methodology This SC Magazine survey, sponsored by Intel, was conducted in July and based on 222 responses from a wide range of companies including those in the finance, technology services, federal, state and municipal government, military, manufacturing, healthcare, education, retail, utility and telecom sectors. Respondents included systems/security administrators, IT managers, engineers/architects, consultants, CSOs/ CISOs, CIOs, managing director/director and EVP/SR VP of risk/privacy compliance. Some charts and totals equal more than 100 percent due to multiple answers. www.intelsecurity.com • 9 Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. For more information, visit www.intelsecurity.com This supplement was commissioned by Intel Security and produced by SC Magazine, a Haymarket Media, Inc. brand.
© Copyright 2026 Paperzz