Cybersecurity: The rapid migration to cloud-based technologies is the most significant disruption to operations, worldwide and an important one.
- Seventy-one percent of respondents see a need to increase spending on cloud security monitoring.
- Fifty-three percent say that Cloud Access Security Broker (CASB) focuses on cloud-based tools.
- Fifty-two percent want to increase spending on employee training.
“The SANS survey showed that the rapid transition of corporate services and business applications to cloud-based technology is the single largest factor breaking existing security architectures and driving most of the new cybersecurity spending,”.
“Cloud surveillance and cloud security access control were the top two spending areas, followed by those on increasing the security staff’s ability to deal with new technologies such as the cloud and to keep pace with regulatory changes and new threats,”.
Cybersecurity: Increasing Spending On Cloud Monitoring
Slightly more than half of the respondents rated the increased use of Public Cloud Infrastructure-as-a-Service (IaaS) implementations as the most significant disruptive factor for security programs in the next twelve months. Based on this, 71 percent of respondents said they see a need to increase spending on cloud security monitoring, followed by cloud-specific tools for the security broker (53 percent), employee training (52 percent), and strong authentication (46 percent).
A total of 57 percent of those surveyed think that, in addition to processes (19 percent) and technology (18 percent), increased investment in people would bring the most significant improvement in their general safety posture. “Managers see educating and refreshing their existing workforce as much more important than simply increasing their workforce,”.
Cybersecurity: Improving Employee Skills
“The fact that respondents place significantly more emphasis on empowering employees than on increasing the number of employees to deal with disruptive technology, especially when faced with escalating privacy regulations and fines around the world, is not surprising. The business use of IaaS and hybrid cloud environments requires a reorganization of the security controls and the integration with CI / CD methods. “
In a series of follow-up interviews with selected respondents, the safety managers recognize the need for “higher qualification” to increase attendance rates, improving effectiveness and efficiency. A higher level of qualification in new technologies and new security techniques is also required to enable the use of security automation techniques that were not mentioned particularly often when spending increased in 2020.
Cybersecurity: Damage From Security Breaches
Strong authentication, the fourth area of planned spending, points to the realization that most of the damage from security breaches and ransom attacks over the past year was made possible by using reusable passwords that phishing attacks can easily assign capture. CEOs and boards of directors support the security teams in overcoming obstacles in the implementation of multi-factor authentication.
“Cloud surveillance and cloud security access control were the top two spending areas, followed by those on increasing the security staff’s ability to deal with new technologies such as the cloud and to keep pace with regulatory changes and new threats, “A higher level of qualification in new technologies and new security techniques is also required to enable the use of security automation techniques that were not mentioned particularly often when spending increased.
ALSO READ: Corporate IT: Four Essential Fields Of Action In 2021