IT decision makers fail to implement proactive security strategies

A lack of support from board members is a major hurdle

Office workplace security

Two-thirds of IT decision makers say their business has implemented a reactive security programme rather than a proactive process because they can't keep up with changing threats, legislation and other external factors that make it harder to plan for risks.

According to Optiv Security, IT decision makers are finding it increasingly hard to stay on top of the rapidly changing threat landscape, as well as having to deal with resistant board members that don't see the value of having a robust cyber-security strategy.

Respondents in Optiv Security's research said they thought mobile applications have had a significant impact on 79% of businesses, while the cloud has also changed the way businesses must deal with the security infrastructure. 77% of people questioned said migrating to the cloud has had a "major" or "significant" impact on cybersecurity strategy.

"Security teams that focus purely on the external threat are being left behind by the pace of business and digital change," said Simon Church, Optiv's general manager and executive vice president for Europe.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Getting buy-in from the business is causing a big shift in cybersecurity strategy, Optiv Security's report highlighted. Almost 60% think it's hard to get support from the board because of a lack of understanding from other stakeholders, while less than a quarter believe the business understands their strategy.

"We are seeing a significant shift to a business-first' perspective among cyber leaders, which balances risk with the imperatives of the modern enterprise," Church added.

"However, many organisations are still married to the antiquated outside-in model, which is predicated on buying security technologies based on the latest trends and vulnerabilities in a problem and response manner.

"This approach allows the landscape, rather than enterprise objectives, to dictate security infrastructure and operations, and often ignores the other important elements of a successful security programme - people and process."

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020