Additionally, 78% of respondents believe most CISOs would make a “best effort guess” based on limited information, and they would also take action prematurely and report that the problem had been resolved without this actually being the case.
This disconnect results from several critical shortcomings in the current point solution approach to cybersecurity and incident response (IR), namely:
- Lack of timely compromise detection: 86% of respondents say detection of a cyber-attack takes too long;
- Inability of point solutions to prioritize alerts as they come in: 85% say they suffer from a lack of prioritization of incidents;
- Lack of integration between point solutions: 74% say poor or no integration between security products negatively affects response capabilities; and
- An overwhelming number of alerts paralyzing IR efforts: 61% say too many alerts from too many point solutions also hinders investigations.
Further, the respondents also shared growing concerns about the inability to find the root cause of a compromise. While 66% of respondents believe determining root cause of prior incidents enables them to strengthen defenses, 38% of respondents say determining the root cause of a compromise could take a year while an alarming 41% believe they would never be able to identify the root-cause of security events with certainty.
Lastly, integrated threat intelligence – a hugely promising approach to arming CISOs with the latest indicators of compromise (IOC) information and ability to confirm threats – appears to be largely unusable by current security products, with a full 59% of respondents saying they are not able to efficiently and effectively use threat intelligence with their existing security products.
Additional key findings revealed that current security products make it difficult to import multiple threat intelligence feeds or quickly investigate mobile devices:
- 40% say none of their security products support imported threat intelligence from other sources
- 86% rate the investigation of mobile devices as difficult
- 54% say they are not able to or unsure of how to locate sensitive data such as trade secrets and personally identifiable information (PII) on mobile devices.