GDPR Is Coming and Many Organizations Aren’t Ready

Each year, ESG surveys around 700 cybersecurity and IT professionals as part of its annual IT spending intentions research. In this year’s survey, ESG asked respondents several questions about GDPR readiness. Here’s what we found out:

  1. While 11% of organizations are completely prepared for GDPR (i.e., would be ready if it went into effect tomorrow), 33% say they are mostly prepared (i.e., most work done but some tasks left to accomplish), and 44% claim they are somewhat prepared (i.e., organization has identified all the steps to meet the GDPR deadline but are early in the process of completing all tasks).
Topics: Cybersecurity regulatory compliance GDPR

What’s on CISO's Minds in 2018?

I’ve just begun a research project on CISO priorities in 2018. What I’m finding so far is that CISOs are increasing their focus in several areas including the following:

  1. Business risk. Yes, CISOs have always been employed to protect critical business assets but in the past, this was really executed with a bottom-up perspective – from IT and security infrastructure up to business processes. Fast forward to 2018 and CISOs are moving to a top down view from business processes down to the technology. This broadens their view of risk and mandates that security controls work collectively to protect ALL the technologies used to accomplish business processes. This is a profound change that challenges even the best CISOs and security organizations.
Topics: Cybersecurity risk management data security CISO identity management security awareness training

The State of Constant Change in Endpoint Security

Endpoint security is one of the most dynamic areas of cybersecurity and one that is in a state of constant change. To combat both the relatively pedestrian and more sophisticated range of attacks, most organizations, according to research conducted by the Enterprise Strategy Group, are implementing multiple compensating measures. The actions taken to improve endpoint security are across the dimensions of processes, skills, and technologies. In fact, ESG’s research reveals that 69% of organizations regularly reevaluate the effectiveness of their endpoint security strategies. Why all the attention on endpoint security? The epidemic levels of ransomware experienced in 2016 through 2017 and that are sure to extend into this year served as a catalyst for many IT and cybersecurity professionals to rethink how they secure their endpoints.

Topics: Cybersecurity endpoint security

“Gotta Have” Endpoint Security Suite Functionality

The movement toward next-generation endpoint security has accelerated over the last few years for a simple reason – cybersecurity professionals aren’t happy with the efficacy of existing antivirus tools. This market demand has led to a wave of investment and innovation from vendors like Carbon Black, CrowdStrike, Cylance, Morphisec, SentinelOne, and many others.

Topics: Cybersecurity endpoint security antivirus EDR endpoint security suite next-generation endpoint security

Change is Constant

The one constant in IT is change. This aphorism applies not only to the technology, but to people, processes, and organizations. Like the rest of IT, ESG’s validation services have been undergoing change.

In my last few blogs, I wrote about benchmarking tools and performance analysis because, for a long time, these were significant parts of our validation process.

Topics: Cybersecurity Networking ESG Lab software-as-a-service (SaaS) economic validation

Ransomware Research Highlights (Video)

Ransomware incidents reached epidemic levels in 2016 with high profile attacks on health care organizations highlighting the operational impacts of cyber extortion by impeding the ability of some targeted organizations to deliver patient care. Cybercriminals continued to employ tried and true attack vectors and methods, principally phishing, to execute a transactional ransomware business model across multiple industries. 

Topics: Cybersecurity ransomware

Cloud Computing Chaos Is Driving Identity Management Changes

I was recently reminded of something a CISO said to me a few years ago. This security executive mentioned that his organization was struggling to maintain tight security controls in an era of cloud computing and mobility. As a result, his organization had increased its focus in two areas: Identity management and data security. He stated, “with the rise of cloud and mobility, identity and data security are the new security perimeters.” 

I mentioned this conversation to my colleague Mark Bowker who covers identity management at ESG. Mark responded that the CISO's conclusions are clearly characterized in some recent ESG research data. For example, 61% of respondents believe IAM is more difficult today than it was 2 years ago. Why are things more difficult? Survey respondents pointed to cloud computing and mobility as two primary drivers but also mentioned increasing cyber-threats, and the lack of a comprehensive IAM strategy.

Topics: Cybersecurity identity management MFA SSO IDaaS

Enterprise Plans for Security Automation and Orchestration

With the global cybersecurity skills shortage hanging over them, CISOs are turning toward security automation and orchestration technologies to improve staff productivity. This is happening faster and wider than most people realize. According to ESG research, 19% of enterprise organizations have already deployed technologies for security automation and orchestration extensively, 39% have done so on a limited basis, and 26% are engaged in a project to automate/orchestrate security operations. 

Topics: Cybersecurity SIEM security operations and analytics security automation security orchestration

Best of Breed

Over the last few years I’ve been fascinated by the ever-interesting cybersecurity market. It’s the latest wild, wild west of technology frontiers. It’s a massive market, that is perfect in many ways—for me and ESG at least. Maybe not so much for you poor folk trying to deal with it.

Topics: Cybersecurity endpoint security

Artificial Intelligence and Cybersecurity: The Real Deal

If you want to understand what’s happening with AI and cybersecurity, look no further than this week’s news. On Monday, Palo Alto Networks introduced Magnifier, a behavioral analytics solution that uses structured and unstructured machine learning to model network behavior and improve threat detection. Additionally, Google’s parent company Alphabet announced Chronicle, a cybersecurity intelligence platform that throws massive amounts of storage, processing power, and advanced analytics at cybersecurity data to accelerate the search and discovery of needles in a rapidly growing haystack. 

Topics: Cybersecurity SIEM machine learning artificial intelligence SOAPA