Raytheon Company commissioned a new global study which reveals that organizations worldwide wait until they fall victim to a damaging cyber attack – before engaging a provider of managed security services (MSS). Two-thirds of survey respondents indicated that not until there is a significant data loss from an IT security breach are their organizations motivated to engage a vendor.
Don’t Wait: The Evolution of Proactive Threat Hunting, a survey of 1,784 information security leaders in 19 countries about outsourcing network security activities, also revealed organizations are looking for more from their providers than traditional services such as firewalls, intrusion detection and virtual private networks. To truly defend their networks from attacks amidst staff shortfalls, budget pressures and higher-risk cyber environments, security leaders are adopting MSS that include advanced capabilities like hunting, incident response and integration services, currently offered by a small subset of today’s providers.
(Cyber Security Operations Center, courtesy of Raytheon Company and YouTube.)
“Cybersecurity is not a waiting game, and organizations without the expertise and tools required to identify and respond to skilled adversaries need to understand that,” said Jack Harrington, vice president of cybersecurity and special missions at Raytheon Intelligence, Information and Services. “The old approach waited for technology to flag known threats. In contrast, skilled hunters like those on our team proactively seek emerging threats and stop them before businesses suffer damage.”
Eighty percent of respondents reported that MSS are important to their overall IT security strategy. However, there is room for improvement. Eighty-four percent say their provider does not offer proactive hunting services even though they effectively find the most insidious threats impacting enterprises and governments alike.
“There is only one way to find the most sophisticated, damaging cyber threats attacking a company’s network: proactively hunt for them,” said David Amsler, president of Raytheon Foreground Security. “Too many organizations today rely on reactive models and automated tools that attempt to detect threats through signature-, rule- or sandbox-driven models. The reactive approach is not enough to stop the determined and sophisticated adversaries which are most often the cause of significant damage or data loss.”
Raytheon’s related offerings include proactive threat hunting, a virtual security operations center, its patented Automated Threat Intelligence Platform technology, cyber security assessments, digital forensics and incident response.
Key findings of the survey include:
Security leaders rely on MSS because:
It improves their cybersecurity posture (59 percent)
Finding and retaining in-house top talent is a challenge (58 percent)
They lack in-house technology (57 percent)
54 percent of MSS users reported that in the last year, their provider found software exploitation more than three months old on their network
73 percent asserted it’s essential or very important that their provider has a high level of interoperability with the company’s security intelligence tools
59 percent agree that responsibility for the vendor relationship is shifting from the IT department to the line of business, indicating cybersecurity has become a boardroom concern
Insufficient personnel and lack of in-house experts are the top challenges to a robust security posture for security leaders
Don’t Wait:The Evolution of Proactive Threat Hunting was conducted by Ponemon Institute in April 2016. The margin of error for the survey was plus or minus four percentage points at a 95-percent confidence level.
Ponemon Institute was founded in 2002 by Dr. Larry Ponemon, and is considered the pre-eminent research center dedicated to privacy, data protection and information security policy. Ponemon Institute’s annual consumer studies on privacy trust are widely quoted in the media and the organization’s research quantifying the cost of a data breach has become valuable to organizations seeking to understand the business impact of lost or stolen data.