Home Breadcrumb caret Your Business Breadcrumb caret Tech Businesses wait for damaging cyberattacks before taking action: study Two-thirds of respondents to a global study commissioned by technology and innovation company Raytheon have indicated that not until there is a “significant data loss” from an IT security breach are their organizations motivated to engage a vendor. Don’t Wait: The Evolution of Proactive Threat Hunting, released on Monday, found that organizations worldwide wait until […] By Canadian Underwriter | June 8, 2016 | Last updated on October 30, 2024 3 min read | Two-thirds of respondents to a global study commissioned by technology and innovation company Raytheon have indicated that not until there is a “significant data loss” from an IT security breach are their organizations motivated to engage a vendor. Don’t Wait: The Evolution of Proactive Threat Hunting, released on Monday, found that organizations worldwide wait until they fall victim to a damaging cyberattack before engaging a provider of managed security services (MSS). The survey included 1,784 information security leaders in 19 countries across North America, Europe, the Middle East and Asia Pacific who are familiar with their organization’s MSS, including Canada, the United States, United Kingdom and Australia, among others. The survey was conducted by the Ponemon Institute, with the margin of error for the survey +/-4 percentage points at a 95% confidence level, Raytheon said in a statement. According to the survey, organizations are looking for more from their providers than traditional services such as firewalls, intrusion detection and virtual private networks. To truly defend their networks from attacks amidst staff shortfalls, budget pressures and higher-risk cyber environments, security leaders are adopting MSS that include advanced capabilities like hunting, incident response and integration services, currently offered by a small subset of today’s providers. “Cybersecurity is not a waiting game, and organizations without the expertise and tools required to identify and respond to skilled adversaries need to understand that,” said Jack Harrington, vice president of cybersecurity and special missions at Raytheon Intelligence, Information and Services. “The old approach waited for technology to flag known threats. In contrast, skilled hunters like those on our team proactively seek emerging threats and stop them before businesses suffer damage.” The study found that 80% of respondents reported that MSS are important to their overall IT security strategy. However, there is room for improvement: 84% said that their provider does not offer proactive hunting services even though they effectively find the most insidious threats impacting enterprises and governments alike. Still, security leaders rely on MSS because: it improves their cybersecurity posture (59%), finding and retaining in-house top talent is a challenge (58%) and they lack in-house technology (57%). “There is only one way to find the most sophisticated, damaging cyber threats attacking a company’s network: proactively hunt for them,” said David Amsler, president of Raytheon Foreground Security, in the statement. “Too many organizations today rely on reactive models and automated tools that attempt to detect threats through signature-, rule- or sandbox-driven models. The reactive approach is not enough to stop the determined and sophisticated adversaries which are most often the cause of significant damage or data loss.” Other study findings include: 54% of MSS users reported that in the last year, their provider found software exploitation more than three months old on their network; 73% asserted it’s essential or very important that their provider has a high level of interoperability with the company’s security intelligence tools; 59% agree that responsibility for the vendor relationship is shifting from the IT department to the line of business, indicating cybersecurity has become a boardroom concern; and Insufficient personnel and lack of in-house experts are the top challenges to a robust security posture for security leaders. Canadian Underwriter Print Group 8 Share LI logo