How Covid-19 impacted cyber security challenges, focus and spends

Survey
methodology
and
respondent
profiles

The
results
in
this
report
are
from
the

Cyber
Security
Hub
survey
which
we
fielded
to
subscribers
from
May
and
June
2020
to
benchmark
actual
results
fro

How Covid-19 impacted cyber security challenges, focus and spends



Survey
methodology
and
respondent
profiles

The
results
in
this
report
are
from
the

Cyber
Security
Hub

survey
which
we
fielded
to
subscribers
from
May
and
June
2020
to
benchmark
actual
results
from
H1
2020
vs.
expectations
for
H2
2020.
A
balanced
representation
of
the
enterprise
cyber
security
mindset,
the
largest
segment
of
survey
respondents
(41
percent)
describes
their
job
function
as
cyber
security.
The
next
largest
segment
is
IT
at
(27
percent)
followed
by
corporate
management
at
(9
percent).

Qualified
respondents
were
truly
cross
industry
coming
from
automotive,
education,
financial
services,
government,
healthcare/life
science,
manufacturing,
media/telecommunications,
retail/consumer
packaged
goods
(CPG),
technology,
travel/hospitality
and
utilities/oil
and
gas/energy.


Also
read
:

CISO
Stratgies
for
proactive
threat
prevention



Pandemic
dynamic

There
were
potentially
alarming
responses
to
our
global
pandemic
related
questions
in
this
mid-year
survey.
When
asked
“Has
your
approach
to
security
changed
as
a
result
of
the
global
pandemic
and
an
increasingly
remote
workforce?”
40
percent
said
no.


Has
your
approach
to
security
changed
as
a
result
of
the
global
pandemic
and
an
increasingly
remote
workforce?

Roughly
two
in
five
cyber
security
organizations
have
not
changed
their
approach
to
security
as
a
result
of
the
global
pandemic.
Such
a
large
percentage
of
the

CISO

community
not
having
changed
their
approach
to
cyber
security
as
a
result
of
the
global
pandemic
that
has
hurdled
us
all
into
a
new
workforce
infrastructure
is
truly
concerning.



How
the
cyber
security
landscape
has
changed
due
to
the
pandemic:

  • Network
    infrastructure
    use
    has
    changed
  • Endpoints
    have
    changed
  • Access
    management
    has
    changed
  • Collaboration
    tools
    have
    changed
  • The
    concept
    of
    insider
    threat
    has
    changed
  • Enterprise
    cloud
    infrastructure
    has
    changed-
    no
    matter
    where
    you
    were
    in
    your
    cloud
    migration
  • Data
    in
    transit
    has
    changed
  • Myriad
    threat
    vectors
    have
    changed
  • Vulnerability
    management
    has
    changed
  • Cybercriminal
    attacks
    have
    changed



Why
did
40
percent
of
the
cyber
security
community
not
change
their
approach?

In
addition
to
an
inert
mindset
change
from
a
significant
portion
of
the
community,
the
reduction
in
staff
due
to
financial
pressures
on
companies
during
the
pandemic
was
similarly
concerning.
A
past
potential
insider
threat
now
had
the
potential
to
become
a
nefarious
external
threat.


Has
your
IT/Security
staff
been
reduced
as
a
result
of
the
global
pandemic?

As
reported
on

Cyber
Security
Hub
 in

Why
Is
Top
Cyber
Security
Talent
Suddenly
In
Flight
,
when
asked
about
the
19
percent
unemployed

DevOps/DevSecOps

community
Parag
Deodhar,
director
of
information
security,
Asia
Pacific
for
VF
Corporation
noted:
“when
people
do
not
have
access
to
enough
money,
food
or
resources,
there
will
be
more
actors
coming
up”.
Deodhar
explained
also
that
the
pandemic
has
expanded
the
threat
landscape,
meaning
that
“not
only
were
folks
pushed
[towards
cyber
crime],
but
also,
the
landscape
open[ed]
up
for
folks
as
well.”

Jamal
Hartenstein,
who
has
worked
with
the
department
of
defense
on
military
bases
as
a
part
of
joint
task
forces
and
has
experience
with
every
branch
of
service,
notes
that
there
was
industry
realization
that
organizations
needed
to
be
more
proactive
and
better
focus
on
detection
and
that
the
global
pandemic
has
accelerated
that
focus.

When
asked
what
about
his
perception,
he
explains
that,
“if
you
do
not
increase
your
security
measures,
you
have
exponentially
just
multiplied
in
magnitudes
the
risk
based
on
all
the
threat
and
vulnerability
and
risk.”



Changing
cyber
security
mindset


We
asked
survey
respondents
to
share
how
their
cyber
security
approach
was
changing.
Here
is
a
sample
of
their
responses:

  • Fully
    remote
    working
    cyber
    security
    teams
  • Implementing
    a
    zero-trust
    network
    strategy
    to
    provide
    scalability
    and
    flexibility
    whilst
    improving
    network
    security
  • Adding
    contractors
    and
    outsourcing
  • Rethinking
    cyber
    security
    strategy
    through
    the
    context
    of
    the
    pandemic
  • Adjusting
    to
    changes
    in
    environment,
    operations
    and
    business
  • Constantly
    monitoring
    all
    situations
    to
    better
    understand
    the
    the
    issues
    and
    concerns
  • Introducing
    awareness
    programs,
    online
    trainings
    and
    increased
    system
    auditing
  • Changed
    training
    and
    awareness
    program
    to
    cater
    for
    changes
    in
    workforce
    practices,
    e.g.
    remote
    working
  • Focusing
    on
    what
    is
    needed
    to
    support
    remote
    working
    employes
    and
    ensuring
    that
    employees
    have
    safety
    in
    front
    of
    mind
    when
    returning
    to
    the
    office
  • Making
    adjustments
    for
    the
    fact
    most
    endpoints
    are
    now
    remote
    to
    ensure
    that
    they
    remain
    secure
  • An
    increased
    focus
    more
    messaging
    and
    content
    that
    will
    resonate
    better
    with
    a
    remote
    workforce-emphasize
    security
    controls
    that
    protect
    remote
    workers
    and
    mobile
  • Increasing
    security
    for
    both
    mobile
    and
    critical
    infrastructure
  • Increased
    use
    of
    multi-factor
    authentication
  • Greater
    emphasis
    on
    cloud-based
    protection
    to
    accommodate
    home-based
    workers
  • Working
    to
    combat
    the
    increased
    difficultly
    in
    quickly
    identifying
    and
    mitigating
    issues
    remotely
  • More
    expertise
    and
    focus
    on

    DevSecOps
  • Increased
    use
    of

    automation

    to
    detect
    changes
    to
    controls.
    This
    means
    we
    are
    automatically
    being
    notified
    of
    the
    change,
    responding
    to
    and
    addressing
    the
    incident,
    analyzing
    itand
    rectifying
    the
    control(s).
  • Streamlining
    the
    operational
    cost
    of
    IT
    to
    remove
    unnecessary
    spending
    and
    services
    that
    are
    not
    being
    used
  • More
    user
    training
    and
    simulated
    phishing
    campaigns
  • Proactively
    monitoring
    threats
    and
    regular
    updating
    our
    security
    strategy
    to
    combat
    new
    challenges
  • More
    stringent
    compliance
    with
    regards
    to
    minimum
    security
    requirements
    to
    prevent
    data
    leakage
  • Decreasing
    the
    time
    taken
    to
    follow
    through
    on
    incident
    reports
    from
    security
    and
    threat
    intelligence
    tools

In
2021,
40
percent
of
the
cyber
security
community
said
they
had
not
changed
their
mindset
in
the
face
of
the
global
pandemic,
while
20
percent
of
top
cyber
security
talent
was
made
redundant.
With
this
in
mind,
it
was
unsurprising
that
67
percent
of
the
cyber
security
community
reported
their
budgets
were
decreasing
or
staying
the
same.


May
2019-June
2020
cyber
security
budget
reported
as
decreasing
or
staying
the
same

While
over
two
thirds
of
cyber
security
professionals
noted
their
budget
was
staying
the
same
or
decreasing
in
July
2020,
just
one
year
ago
59
percent
reported
an
increase
in
budget
in
the

Mid-Year
Market
repor
2019
.
This
means
the
pandemic
had
a
significant
impact
on
cyber
security
spend.

In
the
wake
of
the
global
pandemic
with
attacks
on
the
rise,
it
would
be
expected
that
cyber
security
budgets
would
increase
to
combat
this.
Those
in
the
cyber
security
community,
however,
disagree
with
62
percent
expecting
budgets
will
decrease
or
stay
the
same.


May
2019-June
2020
planned
cyber
security
budget
increase
in
the
next
6
months



State
of
affairs


Overall
state


Do
you
feel
as
though
the
overall
state
of
cyber
security,
meaning
resiliency,
compliance,
awareness,
etc.,
is
improving?

Taking
a
step
back
shows
that
the
industry
feels
that
things
are
positive
and
getting
better.
When
asked
“Do
you
feel
as
though
the
overall
state
of
cyber
security,
meaning
resiliency,
compliance,
awareness,
etc.,
is
improving?”
84
percent
said
‘yes’.


Threat
vectors


What
is
the
most
dangerous
threat
vector,
in
your
opinion?


Security
issues


Most
security
issues
at
my
organization
are
caused
by…

The
top
three
areas
of
focus
for
respondents
during
the
pandemic
were
security
awareness,
detection
and
incident
response
and
access
controls,
inkeeping
with
the
results
of
the
last
three

Cyber
Security
Hub

surveys.
Just
outside
of
that
group
is
elevating
cyber
security
with
top-level
management,
a
topic
that
was
similarly
highlighted
over
the
previous
two
surveys.

As
a
majority
of
cyber
security
budgets
had
not
yet
shifted
in
the
face
of
a
momentous
societal
occurrence,
how
money
is
spent
became
all
the
more
important.

Endpoint
security

went
from
the
fifth
highest
to
the
second
highest
spend
in
the
from
November
2019
to
June
2020,
most
likely
as
a
response
to
employees
working
from
home
and
therefore
increasing
the
chance
of
an
endpoint
being
used
as
a
vector
for
attack.



Solution
priority

Last
six
months


Which
solutions
have
been
the
biggest
priorities
for
you
in
the
last
6
months?

While
compliance
priority
decreased
17
percent
from
2019
to
2020,
this
may
be
because
those
in
cyber
security
had
finished
making
the
inital
major
chanegs
needed
to
comply
with
GDPR.
The
9
percent
increase
in

SIEM

focus
showed
that
the
community
was
looking
to
further
adopt
automation
tools,
potential
due
to
the
decrease
in
workforce
and
need
to
streamline
cyber
security.



Executive
Q&A


Expert
perspective
from
Sam
McLane,
head
of
security
engineering
at
Arctic
Wolf


What
are
your
thoughts
on
the
top
threat
vector
being
email?

Whether
it
is

cloud

or
devices
perimeter,
there
is
a
level
to
which
a
human
element
can
make
them
fail
but
it
is
rare.
Generally,
people
who
play
with
firewalls
tend
to
be
security
savvy.
So,
if
they
make
a
mistake,
for
example
opening
up
a
hole
for
a
vendor
or
for
an
audit
and
then
not
shutting
it
down,
that
is
generally
when
they
are
overworked.

Corporate
email
and
personal
email
relies
on
common
security
awareness
and
intelligence,
and
the
lowest
common
denominator
usually
wins.
Malicious
actors
can
go
and
find
the

CFO

administrative
assistant’s
Facebook
page,
find
out
who
their
kids
are
and
what
school
they
go
to,
then
easily
craft
an
email
that
will
make
the
CFO
think,
“Hey,
my
secretary
just
asked
me
to
contribute
to
her
son’s
scholarship
fund
on
GoFundMe.”

People
naturally
want
to
trust
and
playing
on
that
trust
is
so
easy
to
do
and
to
make
it
look
good.
Especially
in
this

Covid-19

world
while
most
of
us
are
working
from
home,
you
drop
your
guard
a
little
bit
because
you
are
in
unfamiliar
surroundings.
You
are
in
that
home
setting
rather
than
that
work
setting.
That
is
what
scares
the
tar
out
of
me
about
email.


What
are
your
thoughts
on
industry
talent?

If
you
have
got
a
great
team,
each
member
usually
does
one
thing
well.
Even
if
you
have
already
got
the
technology
in
place,
can
one
person
take
care
of
firewall,
compliance,
intrusion
detection,
threat
intelligence?
Can
they
execute
on
multiple
things?
Each
of
these
takes
time,
and
if
each
member
has
to
take
care
of
three
of
them,
how
are
they
actually
going
to
get
each
done
well?

Our
biggest
customer
was
bringing
in
three
new
technologies
simultaneously.
Each
technology
takes
six
months
to
get
right.
They
tried
to
go
it
alone
with
vendor
products
and
failed.
When
they
came
to
us
they
said,
“We
missed
a
breach,”
because
either
their
SIEM
or
SOAR
were
not
tuned
properly,
or
they
never
got
our
end
point
fully
deployed.


What
is
the
answer
to
a
perceived
talent
shortage?

I
am
not
sure
how
much
of
a
shameless
plug
this
should
be,
but
a
different
way
to
deal
with
the
staffing
issue
depending
upon
where
you
are
is
to
rely
on
third
parties
who
may
have
more
people.
One
of
our
key
selling
advantages
is
that
because
we
deal
with
thousands
of
customers,
I
can
take
that
really
good
smart
security
person,
and
maybe
she
can
look
at
a
bank
in
the
morning
and
hotel
chain
in
the
afternoon
and
a
web
front
the
next
day.
So,
we
provide
variety.
We
provide
something
always
challenging
to
our
talent.
Complacency
hopefully
never
sets
in
and
I
have
got
the
staffing
capabilities
to
have
a
person
work
on
a
project
three
months
to
avoid
burnout.
That
is
really
difficult
to
do
unless
you
are
a
Fortune
100
company.



“You
drop
your
guard
a
little
bit
because
you’re
in
unfamiliar
surroundings.”


Sam
McLane

Head
of
Security
Engineering,
Arctic
Wolf



Cyber
security
and
people


Challenges
when
building
teams


When
it
comes
to
building
out
your
security
operations
team,
what
is
your
biggest
challenge?

 

There
are
two
main
issues
that
faced
the
cyber
security
community
in
building
teams
during
the
pandemic

a
perceived
shortage
of
talent
and
insufficient
budget.


Skilled
workers


The
lack
of
skilled
workers
that
culturally
align
with
your
organization
is
often
cited
as
a
“pain
point”
for
security
teams.
What
are
you
doing
to
win
the
war?


As
nearly
half
of
the
community
perceived
a
shortage
of
talent,
it
is
important
to
consider
what
companies
were
doing
to
acquire
talent
during
the
pandemic.
More
than
one
in
five
respondents
reported
implementing
mentor
programs.
Another
20
percent
saw
interns
as
the
answer,
with
nearly
10
percent
reported
engaging
with
universities
to
procure
employees.

It
was
not
all
change,
however,
as
just
under
two
in
five
noted
that
they
were
simply
going
to
maintain
current
behaviors
and
activities
to
move
forward.


Also
read
:

Automating
enterprise
cyber
security
report



Security
approach


Defense
in
depth
vs.
industry
consolidation


Is
“defense
in
depth”
the
answer
or
do
enterprises
desire
more
consolidation
across
their
“point
solutions”?

There
was
a
marked
shift
in
industry
thinking
from
November
2019
to
June
2020
around
the
concept
of
defense
in
depth.
There
was
been
a
10
percent
composite
swing
from
the
concept
of
industry
consolidation
to
defense
in
depth.



Industry
frameworks


Do
you
leverage
any
of
the
following
industry
frameworks?

The
industry
craves
standardization
as
so
indicated
by
the
continued
increased
use
of
industry
frameworks.

mid_year_2020_ss29ZAjcUY0cONiLftxAhxSojrvbI7NDhAZONNBkD5MV 


Hacker
sophistication

In
2020,
the
state
actor
hacker
space
was
becoming
ever
more
crowded.
Unemployed
cyber
security
talent
was
a
new
and
looming
threat.
Dovetailing
with
cyber-criminal
sophistication
and
collaboration
was
a
brand-new
wide-open
threat
landscape.
This
all
put
increased
pressure
on
cyber
security
professionals.




Read
the
PDF
report
here

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.