IT decision makers fail to implement proactive security strategies

A lack of support from board members is a major hurdle

Office workplace security

Two-thirds of IT decision makers say their business has implemented a reactive security programme rather than a proactive process because they can't keep up with changing threats, legislation and other external factors that make it harder to plan for risks.

According to Optiv Security, IT decision makers are finding it increasingly hard to stay on top of the rapidly changing threat landscape, as well as having to deal with resistant board members that don't see the value of having a robust cyber-security strategy.

Respondents in Optiv Security's research said they thought mobile applications have had a significant impact on 79% of businesses, while the cloud has also changed the way businesses must deal with the security infrastructure. 77% of people questioned said migrating to the cloud has had a "major" or "significant" impact on cybersecurity strategy.

"Security teams that focus purely on the external threat are being left behind by the pace of business and digital change," said Simon Church, Optiv's general manager and executive vice president for Europe.

Getting buy-in from the business is causing a big shift in cybersecurity strategy, Optiv Security's report highlighted. Almost 60% think it's hard to get support from the board because of a lack of understanding from other stakeholders, while less than a quarter believe the business understands their strategy.

"We are seeing a significant shift to a business-first' perspective among cyber leaders, which balances risk with the imperatives of the modern enterprise," Church added.

"However, many organisations are still married to the antiquated outside-in model, which is predicated on buying security technologies based on the latest trends and vulnerabilities in a problem and response manner.

"This approach allows the landscape, rather than enterprise objectives, to dictate security infrastructure and operations, and often ignores the other important elements of a successful security programme - people and process."

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

22 Jan 2021
Weekly threat roundup: SAP, Windows 10, Chrome
vulnerability

Weekly threat roundup: SAP, Windows 10, Chrome

21 Jan 2021
Biden nominees highlight tough cyber security challenges
cyber security

Biden nominees highlight tough cyber security challenges

20 Jan 2021

Most Popular

School laptops sent by government arrive loaded with malware
malware

School laptops sent by government arrive loaded with malware

21 Jan 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is the Raspberry Pi Pico?
Hardware

What is the Raspberry Pi Pico?

21 Jan 2021