technologies. Unfortunately, technology
investments have provided a false sense
of confidence in their security posture.
Security leaders must understand that
a proactive approach to cybersecurity
requires the right tools, not more tools.”
So where is the disconnect? The issue
is that, currently, security leaders employ
a variety of tools and technologies to
identify risks and test the effectiveness
of their security controls.
As a result, security leaders are left with
point-in-time assessments that require
them to cobble together data from
disparate systems to truly understand
the organisation’s security posture. This
approach is reactive, labour-intensive
and insufficient in scale.
www.intelligentciso.com
|
Issue 21
This has led to a disparity between
appearance and reality, whereby security
decision makers are being given a false
state of confidence. asked about the biggest challenges that
they face with the security tools, the top
responses include:
A total of 86% of security leaders
surveyed by Forrester Consulting said
that they are confident or very confident
that they have no gaps in their security
controls deployed across devices,
applications, people, and data. Research we
conducted last year
unveiled that the
average enterprise
CISO is running
57 separate
security tools.
However, the complexity of today’s IT
infrastructures and the heterogeneity
of enterprise security tools make it
difficult for security pros to protect their
environments. In fact, 97% experience
challenges with their tools because they
take a traditional reactive approach to
fighting cybersecurity threats. When
75