Survey Surfaces Wasted Efforts Collecting Cybersecurity Data

A survey of 500 full-time security decision-makers and practitioners published today found that security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams use to manage operations.
Conducted by CITE Research on behalf of Observe, a provider of an observability platform, the survey found a quarter to half of the data collected by 45% of security teams needs to be normalized before being stored in, for example, a security information event management platform.
Another 26% said half to three-quarters of the data they collect needs to be normalized, while 7% said more than three-quarters of the data they collect needs to be normalized.
Jack Coates, senior director of product management at Observe, said that level of data collection suggested cybersecurity teams are not working closely enough with the IT teams that are already using other platforms to normalize data-even though much of the data cybersecurity teams collect is the same logs, metrics and traces that IT teams already collect.
The reasons for the duplicate efforts might span everything from simple cultural disconnect to the IT teams not collecting the type of data that cybersecurity teams require, noted Coates.
Regardless of the reason, the platforms being used by IT teams to collect data can also serve the needs of cybersecurity teams and ultimately reduce costs by eliminating the need for a separate SIEM platform, he added.
Not surprisingly, the survey found 95% of organizations are, in some form, using a SIEM. In addition, survey respondents have also invested in tools such as Microsoft Advanced Security Information Model, Amazon Open Cybersecurity Schema Framework and IBM QRadar to normalize data before storing it in a separate platform to analyze it.
The survey also found cybersecurity teams deploying their own host agent software for either security or observability purposes.
Each of these tools and platforms, in addition to being licensed, also need to be integrated and maintained.
Collectively, that approach conspires to increase the total cost of cybersecurity at a time when many organizations are looking for ways to reduce costs without cutting back on hiring and retaining cybersecurity professionals, said Coates.
The report also noted that a hodgepodge of tools and platforms doesn't help streamline incident management.
Only 11% of respondents reported being able to stay within a single pane of glass to manage incidents, with 18% using six or more tools to investigate issues.
There's naturally a lot of interest these days in converging security and IT operations, mainly to enable cybersecurity teams to spend more time thwarting threats versus managing infrastructure.
It's clear that much work needs to be done before both teams are working with a common set of data.
The data IT operation teams have access to in real-time also provides the added advantage of being more current than the data that must be collected and normalized before it can be analyzed.
That's especially critical when there is an incident and cybersecurity teams, as always, find themselves racing against the clock.


This Cyber News was published on securityboulevard.com. Publication date: Wed, 06 Dec 2023 14:43:06 +0000


Cyber News related to Survey Surfaces Wasted Efforts Collecting Cybersecurity Data

Survey Surfaces Wasted Efforts Collecting Cybersecurity Data - A survey of 500 full-time security decision-makers and practitioners published today found that security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams ...
1 year ago Securityboulevard.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
2 months ago Aws.amazon.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
11 months ago Securityzap.com
Survey Surfaces Raft of Cloud Security Challenges - A global survey of 414 IT practitioners published this week found 40% of respondents are relying on legacy platforms and practices originally designed for on-premises IT environments to secure cloud computing environments. Conducted by Aviatrix, a ...
10 months ago Securityboulevard.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
7 months ago Feeds.fortinet.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
10 months ago Legal.thomsonreuters.com
Survey Surfaces Lack of Confidence in Existing Cybersecurity Tools - A survey of 214 senior executives involved in cybersecurity decisions found more than half would replace their entire current stack of platforms if there were no budget constraints. Conducted by Threater, a provider of a platform for blocking network ...
11 months ago Securityboulevard.com
Dell Survey Surfaces Lack of Ransomware Resiliency - A survey of 1,500 IT and IT security decision-makers found more than half worked for organizations that experienced a cyberattack that prevented access to data within the past 12 months, with 85% of them admitting they paid ransoms to access data. ...
11 months ago Securityboulevard.com
The Importance of Cybersecurity Education in Schools - Cybersecurity education equips students with the knowledge and skills needed to protect themselves and others from cyber threats. Cybersecurity education can teach students about the impact of cyberbullying, how to prevent it, and how to respond ...
1 year ago Securityzap.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
11 months ago Securityintelligence.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
5 months ago Techtarget.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
11 months ago Securityzap.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
1 year ago Feeds.dzone.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
10 months ago Securityzap.com
SANS Institute Survey Surfaces State of Cybersecurity Defenses - A survey of 297 cybersecurity professionals conducted by SANS Institute found 83% of respondents felt they had the right policies, processes and controls defined, but only slightly more than two-thirds have actual metrics and reports that prove that ...
11 months ago Securityboulevard.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
11 months ago Securityzap.com
How to Avoid Falling Below the Cybersecurity Poverty Line - The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy ...
1 year ago Csoonline.com
Developing Cybersecurity Awareness Programs for Schools - Schools are increasingly becoming targets for cyberattacks, necessitating the development of robust cybersecurity awareness programs. Ultimately, a comprehensive cybersecurity awareness program is essential for schools to mitigate risks, enhance ...
11 months ago Securityzap.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
10 months ago Securityzap.com
Gamification in Cybersecurity Education - Gamification has become increasingly prevalent in numerous domains, including cybersecurity education. Gamification presents a promising approach to meet this challenge, making cybersecurity education both effective and enjoyable. One way to ...
11 months ago Securityzap.com
Arctic Wolf Survey Surfaces Election Security Fears - A survey of 136 state and local government leaders in the U.S. published today finds nearly half expect to see an increase in the number of cybersecurity incidents involving elections in 2024. Conducted by the Center for Digital Government on behalf ...
11 months ago Securityboulevard.com
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
11 months ago Darkreading.com
Key cybersecurity skills gap statistics you should be aware of - As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in ...
11 months ago Helpnetsecurity.com
Cybersecurity Workforce Sustainability has a Problem. DEI Could be the Solution. - That's particularly true in cybersecurity, where it's increasingly difficult for organizations to fill critical roles during a worsening global talent shortage. There were more than four million unfilled cybersecurity jobs at the end of 2023. While ...
5 months ago Securityboulevard.com
Saudi Arabia Strengthens Its Cybersecurity Posture - The Kingdom of Saudi Arabia continues to advance its strategic commitment to cybersecurity, led by its National Cybersecurity Authority, the driver of many of the country's cyber protection initiatives. The NCA, formed in 2017, in the past year has ...
11 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)