Operations

7/21/2017
09:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

More than 40% of Organizations Unprepared for Advanced Attacks: Demisto

CUPERTINO, Calif. — July 20, 2017 — Demisto, Inc., an innovator in Security Automation and Orchestration technology, today announced the results of the State of Incident Response 2017, a study investigating challenges faced by incident response (IR) teams and how they are or are not addressing them. Security professionals from across the globe participated in the research – the first industry study to cover all aspects of incident response, including SOC location, training issues, tools utilization, and what metrics are being tracked.

The study revealed new data around companies’ struggles to keep up with and respond to cyberattacks due to lack of resources. For example, more than 40 percent of respondents said their organizations are not prepared to measure incident response, and only 14.5 percent of respondents are measuring MTTR (Mean Time to Respond). The study also discovered that while organizations are hit with an average of nearly 350 incidents per week, 30 percent of respondents reported they have no playbooks, runbooks or other documentation for incident response actions.

The study also validated the known security staff shortage issues with new findings. More than 90 percent of the respondents indicated they are challenged finding experienced employees with the necessary skill sets. The study found it takes an average of 9 months from the initiation of a hiring requisition until the new hire is fully trained. Since the need is frequently identified long before the hiring process begins, companies are without a resource – from the point where a need is identified until the point they have fully trained analysts – for almost a year. On the retention side, more than one-third of IR staff leaves within 3 years.

“One goal for this unique study was to gain better insights into how to address future threats by determining today’s major pain points for organizations,” said Rishi Bhargava, Demisto co-founder and VP of Marketing. “Incident response must continue to evolve to meet current and emerging threats. The key to effective incident response is having the right combination of people, technology and processes. However, this study revealed that many organizations are far from having this right combination.”

For a copy of the study, see: go.demisto.com/state-of-incident-response

Other key findings of the research include:

  • When asked about the areas where automation can help, 54 percent of respondents asserted that security operations and incident response are the two top priorities for them at this time.
  • Although 47.3 percent of respondents believed that automating threat hunting would provide immediate benefits, barely 12 percent had actually automated their threat hunting.
  • While 54 percent of respondents believed that automating incident response would provide immediate benefits, only 10.9 percent had already automated this facet.
  • When asked about the number of incidents occurring weekly, respondents reported dealing with an average of 346.42 incidents per week — and requiring an average of 2.28 days to resolve an incident.
  • When asked how many people in the respondents’ organizations were dedicated solely to incident response, 17.6 percent responded that there were none and 22.3 percent stated that there were only one or two.
  • According to respondents, the biggest incident response challenges are working with a large number of information security tools (37.7 percent), followed by responding to a large number of incidents (36.1 percent), and not having enough time (34.4 percent).
  • According to respondents, 40.4 percent feel there are significantly more alerts than can be handled by their staff, while 47.4 percent report it is hard to know which alerts to prioritize.

Demisto recently sponsored this independent, third-party study conducted with security professionals around the world working for companies ranging from less than 500 employees to greater than 20,000 employees. More than 200 responses were analyzed for this study, which is planned to be updated annually. Virtual Intelligence Briefing (ViB), an interactive on-line news community focused on emerging technologies, conducted the overall research. ViB’s community is comprised of more than 1.2 million IT practitioners and decision makers who share their opinions by engaging in sophisticated surveys across a range of IT solution areas.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-10727
PUBLISHED: 2018-07-20
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive ...
CVE-2018-8018
PUBLISHED: 2018-07-20
Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a spe...
CVE-2018-14415
PUBLISHED: 2018-07-20
An issue was discovered in idreamsoft iCMS before 7.0.10. XSS exists via the fourth and fifth input elements on the admincp.php?app=prop&do=add screen.
CVE-2018-14418
PUBLISHED: 2018-07-20
In Msvod Cms v10, SQL Injection exists via an images/lists?cid= URI.
CVE-2018-14419
PUBLISHED: 2018-07-20
MetInfo 6.0.0 allows XSS via a modified name of the navigation bar on the home page.