Fixing Fragmentation Can Yield Tangible Benefits

Consolidating technology and breaking down functional silos can bring solid financial results, a new study finds.

Dark Reading logo in a gray background | Dark Reading

The cyber security industry is well known for studies and reports that would, in the words of a line from the musical "1776," "…depress a hyena." That's why the good news contained in a recent survey of more than 3,200 CISOs is newsworthy.

In a blog post announcing the results of the 2019 Cisco CISO Benchmark Study, Steve Martino, senior vice president and chief information security officer at Cisco, wrote, "There was a strong correlation between those who were extremely collaborative and the total cost of their most impactful breach, which was below $100,000―the lowest category of a breach cost."

According to John Maynard, Cisco's global security sales chief, that data agrees with conversations he's had throughout the industry. Fragmentation, both of technology and responsibility, is harmful to security because it makes it more difficult to get a full picture of the threat landscape and, Maynard says, "you can't see, and you can't remediate what you can't get your arms around."

In some cases, Maynard says, companies are still struggling to bring order to a constellation of security point solutions. "We see customers with 60 to 80 vendors in security, and it's impossible to consolidate all the alerts coming in from those points," he says. On the other hand, the number of companies that are consolidating and reducing the size of their security product fleet is growing. "In 2017, we had 54% who cited 10 or fewer vendors, and that's up to 63% in this survey," Maynard explains.

The other area where consolidation and cooperation are critical is in work between traditional operational silos. "Collaboration between the networking teams, net ops teams, and security teams is important and companies that were able to do that saw a marked drop in the costs of their response," Maynard says, and drives the point home, explaining, "the companies that cited the closest collaboration between networking and security saw the lower remediation costs."

In his blog post, Martino wrote that this suggests a very easy way for companies to reap tangible benefits: create a culture and set of processes where teams align on a single set of outcomes to break down silos between groups. And the metric for determining the success of those benefits is also straightforward, Martino wrote. "Measuring outcomes against investments is the best data-driven approach to budgeting."

The study is not one of unending sunshine and congratulations: There are areas for improvement, including increasing the extent to which outcomes are used as a metric, improving alert management, and building a culture in which employees are a dramatically smaller piece of the threat landscape. 

In the conclusion and recommendations sections of the report, Maynard says that there are two points that tie directly back to these metrics. "Security budgeting should be linked to defined outcomes, and cyber insurance should be linked to funding," he says.

Related content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Read more about:

2019

About the Author

Curtis Franklin, Principal Analyst, Omdia

Curtis Franklin Jr. is Principal Analyst at Omdia, focusing on enterprise security management. Previously, he was senior editor of Dark Reading, editor of Light Reading's Security Now, and executive editor, technology, at InformationWeek, where he was also executive producer of InformationWeek's online radio and podcast episodes

Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has been on staff and contributed to technology-industry publications including BYTE, ComputerWorld, CEO, Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, Dark Reading, and ITWorld.com on subjects ranging from mobile enterprise computing to enterprise security and wireless networking.

Curtis is the author of thousands of articles, the co-author of five books, and has been a frequent speaker at computer and networking industry conferences across North America and Europe. His most recent books, Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center, and Securing the Cloud: Security Strategies for the Ubiquitous Data Center, with co-author Brian Chee, are published by Taylor and Francis.

When he's not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in running, amateur radio (KG4GWA), the MakerFX maker space in Orlando, FL, and is a certified Florida Master Naturalist.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights