BUDGET AND MOMENTUM KEY TO CYBERSECURITY AUTOMATION MATURITY – AND CISOS ARE FEELING LEFT BEHIND
Leon Ward , VP of Product Management , ThreatQuotient , discusses the results of the organisation ’ s recent report which aimed to understand just how far enterprises have progressed in their bid to deploy automation . The results explore CISO struggles with cybersecurity automation maturity and where most surveyed companies placed themselves on the cybersecurity operations maturity scale .
A intensify and the human and financial resources available to deal with them remain limited , there is a growing need for automation in cybersecurity . The intelligent automation of key cybersecurity processes can significantly improve an organisation ’ s posture and at the same time support under-pressure employees by reducing reliance on manual processes . But in what is a relatively new approach , how far have organisations progressed along the cybersecurity automation maturity curve and is everyone on the same journey ?
To understand just how far organisations have progressed in their bid to deploy automation , ThreatQuotient surveyed 750 cybersecurity professionals from organisations in the UK , US and
CISOs see their organisation as less mature in cybersecurity and have fewer resources to devote to improving cybersecurity automation compared to those in other roles .
Leon Ward , VP of Product Management , ThreatQuotient
Australia . This was a follow-up to our 2021 UK survey , which revealed businesses had a lack of trust in outcomes from automation processes . Despite this , cybersecurity automation has gained traction over the intervening year and 2022 ’ s results show that concerns have moved to more practical deployment issues such as integrating with existing technology and a lack of skills in the workforce .
These challenges were also evident when we asked respondents to rate the current maturity of their cybersecurity operations on a scale adapted from one originally developed by Accenture . We wanted to get a sense of how cybersecurity professionals view the sophistication of their setup and how it contributes to the wider business .