Cyber Threat Readiness Report Reveals Misalignment Between Execs, Security Analysts

Swimlane recently announced the release of the “2023 Cyber Threat Readiness Report” based on research conducted by Dimensional Research. The report reveals a lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to prevent business-ending breaches.

Dimensional Research surveyed 1,005 security professionals and executives at enterprise companies with at least 5,000 employees and $600M in revenue. Respondents came from North and Latin America, Europe, the Middle East and Africa (EMEA), and the Asia-Pacific (APAC) region. The research investigated the perceptions of cybersecurity among on-the-ground security professionals and executives, the current trends in hiring and retaining talent and the effectiveness of tools leveraged to address today’s top cybersecurity challenges.

“Organizations across industries and around the globe are struggling to hire and keep qualified cybersecurity professionals who can effectively manage today's threat landscape,” said James Brear, CEO of Swimlane. “This, in addition to a rapidly evolving regulatory landscape and complex new threats brought on by generative AI, highlights the need for organizations to scale their defenses before it's too late. We hope our research serves as a catalyst for discussion that paves the way for a new era of cybersecurity that strikes a balance between human expertise and technological advancements.”

A Top-Down Security Disparity

Despite increased cybersecurity discussions at the C-suite and boardroom level, a sharp juxtaposition has emerged between executives who believe that every security alert is being addressed and the teams on the ground addressing the alerts. Seventy percent of executives believe that all alerts are being handled by their security team, while only 36% of front-line roles responsible for managing alerts agree. The truth is only 58% of organizations are actually addressing every single alert.

While the use of automation is increasing in popularity to overcome these challenges, a notable disconnect also exists in understanding the security team's skill set and available resources to adopt heavy-scripting automation tools. 87% of executives believe their security team possesses what it takes for successful adoption. In comparison, only 52% of front-line roles state they have enough experience to properly use this type of technology.

Struggle to Hire and Retain Talent Amplifies Risks

Respondents overwhelmingly indicated increased challenges in finding candidates with the right technical skills, experience and industry-specific knowledge. Seventy percent of companies reported it takes longer to fill a cybersecurity role now than it did two years ago. When asked how long it takes to fill a cybersecurity role, 82% of organizations report it takes three months or longer, with 34% reporting it takes seven months or more. These challenges have led one-third (33%) of organizations to believe they will never have a fully-staffed security team with the proper skills.

The research also found that alarming levels of employee turnover and burnout pose a substantial risk to businesses, jeopardizing their operational stability and resilience. More than nine out of 10 participants (95%) report business issues resulting from security team turnover, including slower threat identification, response and remediation, and the inability to address alerts.

The Implications of Cybersecurity Automation

The research findings highlighted that people alone can not solve the issues plaguing today’s cybersecurity teams. Organizations that are successfully meeting these challenges head-on are augmenting the expertise of the people on the security operations (SecOps) team with strategic technology investments. Over three-quarters (78%) of organizations that handle every alert said they use low-code security automation in their security stack. Ninety-eight percent of participants said there were advantages to using security automation solutions that embrace low-code principles, such as the ability to scale the solution with the team’s experience with less reliance on coding skills.

According to Gartner, “It is commonplace for SOAR technologies to offer low-code-like functionality. This makes programming and workflow improvements more accessible to all members of the security operations team even if they do not have a lot of programming experience. While SOAR continues to offer a lot of features for “power users,” these individuals can have broader responsibilities for automation across the organization. Power users can develop their own integrations and often reuse existing code/scripts. SOAR is then used to help build out more repeatable playbooks, allowing organizations to utilize this code based on the building blocks that already exist in the technology.”

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3