December 17, 2014 By Rick M Robinson 2 min read

Chief information security officers (CISOs) and other security leaders are tasked with protecting the enterprise against a multitude of threats, including attacks from sophisticated and determined cybercriminals. They must do so in an environment of interlinked revolutions in technology such as the cloud, mobile devices and big data analytics.

It should come as no surprise, then, that security technology is a leading focus of CISO initiatives. Nor should it be shocking that these security leaders’ assessments of their own technological maturity varies widely. The greatest confidence is reserved for well-established technologies, while more reservations surround new technologies that enterprises are only now coming to grips with.

A Maturity Range in Security Technology

These are among the findings of IBM’s third annual CISO assessment, “Fortifying for the Future.”

At one end of the spectrum, 75 percent of respondents were confident in their organization’s ability to handle network intrusion prevention, while nearly just as many (73 percent) felt mature in dealing with advanced malware protection. Until quite recently, protecting the enterprise network against malware was practically synonymous with IT security.

On the other hand, security leaders are much less confident in the maturity of their own security technology when it comes to the cloud (54 percent) and mobile devices (51 percent). These new technologies — whose full impact are only now being felt — and their security concerns have drawn widespread attention.

Uncertainty also surrounds security intelligence analytics, with a 54 percent confidence in maturity. While automated governance, risk management and compliance (51 percent) are not new dimensions of security technology per se, they represent a moving target affected by new technologies.

While Technology Marches On

According to Channel Partners, even though concerns about cloud security remain widespread, these worries have not slowed cloud adoption by the enterprise. The advantages of the cloud are simply too great to ignore. Thus, one-third of IT chiefs report they have already migrated 50 percent to 70 percent of their IT infrastructure to the cloud.

The imperative to go mobile is just as great, though it is driven more by customers and employees. According to the CISO assessment, “in terms of maturity, mobile and device security ranked at the very bottom of technologies.” Security leaders in particular still struggle to come to grips with the bring-your-own-device trend within the enterprise, with all its messy complications for privacy and security.

Security leaders are not expecting magic bullets to solve their problems. A majority of respondents to the CISO assessment agreed they would have to meet challenges with existing security technology rather than anticipating dramatic new technologies.

Instead, their focus going forward will be on making the best use of existing technologies through security collaboration and adopting real-time security intelligence. This will let enterprises respond to attacks as they happen rather than being left to deal with the aftermath.

Insights from the 2014 CISO Assessment – See the infographic

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today