Study: Are IT security managers too confident?

Study: Are IT security managers too confident? Image by Pete Linforth on Pixabay

Share post

While traditional IT teams in companies clearly support external experts, the majority of internal IT security managers reject outside help. But can security teams afford this or are they overconfident? An enlightening study from Trend Micro.

The role of cybersecurity in the business context has undergone a significant shift: once seen as a deterrent, it is increasingly recognized as a catalyst for digitalization and business development. This emerges from a study that Trend Micro carried out together with the Brandenburg Institute for Society and Security (BIGS). Although companies now recognize the importance of IT security for business success, the study reveals a surprising discrepancy: 56,9 percent of the company's own IT teams believe it is necessary to use the expertise of external security specialists, but only 14,7 percent of IT do Security managers share this view. An overestimation of oneself?

Does this result reflect excessive trust among those responsible for internal IT security in the capabilities of their own department? One might assume so. Almost half of CISOs rate the risk of a cyber attack on their company in the next twelve months as high or even very high. So why do they hardly want to ask for help from outside?

Possible reasons for rejecting external security expertise

The reasons why the CISO rejects external support are of great importance for company management. If in-house security managers actually overestimate their capabilities, there is a high risk that security gaps will arise. The study sees a possible explanation for the skepticism towards managed security services in the fact that in-house IT security managers are reluctant to give up responsibility or accept external influences in their work area. In addition, negative experiences could be responsible and expensive external consultants could not prevent a cyber attack in the past. BIGS states that another reason is that, after a known incident, companies are flooded with inquiries from IT security service providers and lose track of the multitude of offers and become tired of making decisions.

IT security teams are overloaded

The requirements for a comprehensive security concept are constantly increasing. Cybercriminals are increasingly organizing themselves entrepreneurially and pursuing cutting-edge attack strategies, while IT infrastructures are becoming increasingly complex and difficult to monitor. These developments require a holistic protection approach that can only be met by complex security technologies. It is not enough for companies to invest in acquiring leading cybersecurity solutions. To integrate these into a holistic security approach, they must be carefully configured, professionally managed and monitored around the clock. This puts a lot of strain on the IT teams – not least mentally. The global skills shortage, which according to a current (ISC)2 study in cybersecurity is estimated at 3,4 million missing experts, is also increasing the overload in the industry.

Economic reason recommends security service providers

In the study paper, BIGS warns of the negative consequences of overestimating oneself. “It is becoming increasingly difficult to have an overview of all company areas in the necessary depth,” says Dr. Tim Stuchtey, Managing Director of BIGS. “It is obvious to me that medium-sized companies cannot have the necessary expertise in-house in all eventualities. Nor should they for economic reasons. Rather, it is important to have the expertise to identify the right service providers for the challenges ahead.”

Advantages of Managed Security Services

Hannes Steiner, Vice President Germany at Trend Micro (Image: Trend Micro).

If IT security managers could decide to provide managed security services to the in-house IT department, this would have advantages that should not be underestimated: the internal team is relieved and can concentrate on its core tasks again. The security service providers are available 24/7 and are familiar with the latest attack patterns, global contexts and are able to identify threats across company boundaries. The in-depth knowledge of security analysts is invaluable, especially in the event of a cyber attack.

“To protect themselves from modern attacks, companies not only need first-class detection and response, but also have to proactively position themselves in such a way that the probability of an attack decreases,” says Hannes Steiner, Vice President Germany at Trend Micro. “A proactive security strategy begins with a continuous risk assessment that saves resources and uses them exactly where they are needed. With a renowned security partner at their side, companies can overcome these challenges with little effort on their own.”

Background to the study

The market research company Mindfacts surveyed 300 senior IT and IT security executives in companies with more than 250 employees from various industries on behalf of Trend Micro. 30 percent each of the participants come from the healthcare sector and from authorities. The survey took place in September and October 2022. Based on the results, the Brandenburg Institute for Society and Security BIGS carried out an empirical analysis. It examined connections and determined, among other things, which factors lead to more strategic or reactive investments in IT security.

More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

NIS2 and the security obligation: email encryption

Although email encryption is not explicitly mentioned as a separate topic in the NIS2 Directive, it falls under the general requirements for ➡ Read more

Ransomware: Above-average number of attacks in the education sector

The number of compromised backups and data encryption rates due to ransomware in the education sector have increased compared to the previous year. The recovery costs after ➡ Read more

NIS2 Directive: Communicating implementation with managers

A free white paper helps CISOs speak the language of executives to advance the implementation of the NIS2 directive in the company ➡ Read more

NIS2 will soon come into force – 5 tips to prepare

The EU Directive NIS2 is due to come into force in Germany in October. It requires many companies to take greater cyber security precautions. ➡ Read more

Global danger: vulnerabilities in photovoltaic platform

As the experts at Bitdefender Labs have discovered, power outages are possible due to attacks on photovoltaic inverters and management platforms. A vulnerability was only discovered in ➡ Read more

SSTI attacks are increasing significantly

SSTI poses a critical threat to web applications. Attackers can use it to execute arbitrary code and take over entire systems. ➡ Read more

Ransomware: Larger companies are more at risk

Companies in the United States experienced the most ransomware incidents, according to a study examining Ransomware Trends. Organizations with more than ➡ Read more

Malware-as-a-Service most dangerous

Malware and ransomware-as-a-service were the most common cyber threats in the first half of 2024. Phishing also continues to be a major threat. About the ➡ Read more