CO-OPTIV-SECURITY
With the rise of the data breach epidemic, and the imposition of comprehensive privacy regulations and significant legislation requirements, cybersecurity has become a tier-one business risk. As a result, the chief information security officer’s (CISO) role in a business has dramatically increased in value. In fact, 64 percent of businesses now prioritise cybersecurity above all else, even if it slows some users’ productivity down, according to a new research report from Optiv Security . The report, “The State of the CISO,” takes an in-depth look at the approach to cybersecurity taken by CISOs, CSOs and senior IT decision makers, the strategies they have in place and their experience of data breaches.
Cybersecurity becomes a business priority
The research found that the importance of cybersecurity is now better understood by business executives and board members. In fact, 96 percent of respondents indicated they are taking a more strategic approach to cybersecurity as a result of being greater aligned with business leaders.
“Some organisations are further along this evolutionary curve than others, but without business’ buy-in to a cybersecurity program, CISOs will undoubtedly struggle to keep their organisations safe from looming cyber threats,” said Andrzej Kawalec, Optiv’s director of strategy and technology, Europe. “We are seeing a significant shift in the industry, whereby cybersecurity is now a business issue. CISOs are being regarded as an important part of major business initiatives such as next-generation digital transformation, which has led to more funding for cyber programs. The board now understands that a major security or compliance miscue can derail a business.”
When it comes to the approach to cybersecurity, the research found that 66 percent of IT security decision makers felt greater awareness of security risks within the IT function has had a significant impact on currently existing cybersecurity policies. Compliance with external standards such as GDPR follows closely behind at 56 percent, but basic functions like vulnerability and patching is only prioritised by 32 percent of respondents. Employee education was deemed a top priority by 58 percent of respondents, as was simplifying infrastructure (54 percent) and aligning security with development operations to create a DevSecOps model (47 percent).
“It is concerning in light of the fact that, by some estimates, unpatched vulnerabilities account for more than half of all data breaches,” continued Kawalec. “By getting the basic functions of cybersecurity right, IT decision makers can drastically improve their chances of defending against a cyber-attack, since unpatched software is often cited as the most common cause of data breaches.”
The greatest security threats
The research also identified that 31 percent of respondents believe that organized crime and politically motivated acts are seen as the greatest threats to cybersecurity, while 28 percent believe this to be hacktivists. Insider threats are seen as critical by 26 percent and just 15 percent of respondents cited third parties as a threat to their cybersecurity. To deal with cybersecurity threats, 92 percent of respondents have an incident response plan in place, but rehearsing this plan is lagging, with 44 percent of businesses stating they only rehearse once a year or less.
The report finds that breaches still seem to serve as a wake-up call for organizations, with 39 percent of businesses implementing changes in their security program only after an incident. While 65 percent cited that recovery from the breach was well coordinated and successful, over a third (35 percent) reported that recovery costs were still higher than it would have cost to invest in better breach defence.
To read the full report, please visit Optiv’s website .
Methodology
Optiv launched an independent research series to discover how IT decision makers approach cybersecurity. To produce its research and resulting report, Optiv worked with London-based research agency, Loudhouse. Loudhouse is an independent agency that specializes in technology and B2B research for global brands.
Loudhouse conducted online interviews with 100 US- and 100 UK-based CISOs, CSOs and Senior IT decision makers at enterprise businesses (between 500 and 5000+ employees), to understand their approach to cybersecurity, the strategies they have in place, and their experience of data breaches.
Follow Optiv
Twitter: www.twitter.com/optiv
LinkedIn: www.linkedin.com/company/optiv-inc
Facebook: www.facebook.com/optivinc
YouTube: https://www.youtube.com/c/OptivInc
Blog: https://www.optiv.com/explore-optiv-insights/blog
Optiv Security: Who Secures Your Insecurity?
™
Optiv is a security solutions integrator – a global, “one-stop” trusted partner with a singular focus on cybersecurity. Our end-to-end cybersecurity capabilities span risk management and transformation, cyber digital transformation, threat management, cyber operations, identity and data management, and integration and innovation, helping organisations realize stronger, simpler and more cost-efficient cybersecurity programs that support business requirements and outcomes. At Optiv, we are modernizing cybersecurity to enable clients to innovate their consumption models, integrate infrastructure and technology to maximize value, achieve measurable outcomes, and realize complete solutions and business alignment. For more information about Optiv, please visit us at www.optiv.com
.
View source version on businesswire.com: https://www.businesswire.com/news/home/20190923005132/en/
Link:
Social Media:
About Business Wire
Subscribe to releases from Business Wire
Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from Business Wire
Second Front Systems Announces 10 Customers Prepared to Deploy on AWS European Sovereign Cloud via Game Warden® Platform3.12.2025 14:30:00 CET | Press release
Unlocks opportunity for Second Front customers to support European nations with strict data sovereignty requirements. Second Front Systems (2F), a Technology Partner in the Amazon Web Services (AWS) Partner Network (APN) and Global Security and Compliance Acceleration (GSCA) Program, today announced that ten of its existing customers have prepared for deployment onto AWS European Sovereign Cloud (ESC) via its 2F Game Warden® platform. This builds on Second Front's September announcement that 2F Game Warden will serve as an on-ramp to ESC. Independent software vendors (ISVs) seeking to support European organizations face complex regulatory requirements, including Germany's C5, and the EU's Digital Operational Resilience Act (DORA) and NIS2 Directive. By leveraging 2F Game Warden, ISVs can inherit a number of controls and expedite compliance with security frameworks. This collaboration unlocks a pre-validated solution for ISVs to meet these stringent compliance requirements while maintai
ViaLase Announces First Patient Treated in IDE Clinical Trial Evaluating Its Femtosecond Laser Trabeculotomy for Open-Angle Glaucoma3.12.2025 14:00:00 CET | Press release
Prospective, randomized controlled trial compares novel femtosecond laser procedure to selective laser trabeculoplasty (SLT), advancing path to US commercialization ViaLase, Inc., a clinical-stage medical technology company pioneering incision-free, laser-based solutions for glaucoma, today announced that the first patient has been treated in its U.S. Investigational Device Exemption (IDE) clinical trial evaluating the company’s femtosecond laser trabeculotomy procedure for the management of glaucoma, a lifelong, progressive, and incurable disease that remains a leading cause of irreversible blindness worldwide. This prospective, multicenter, randomized, controlled trial evaluates the ViaLase procedure in comparison to selective laser trabeculoplasty (SLT), the current standard laser treatment for reducing intraocular pressure (IOP). This trial was designed in consultation with the FDA to achieve clearance and commercialization in the U.S. and thus represents one of the most rigorous e
Winchester Interconnect Launches LiteSPEed™ Cable: Faster, Lighter, Simpler Connectivity for Mission-Critical Systems3.12.2025 14:00:00 CET | Press release
Winchester Interconnect, an Aptiv company and leading supplier of high-performance interconnect solutions, today introduced LiteSPEed™ Cable, a next-generation single-pair Ethernet (SPE) solution that delivers 10-gigabit data rates in a dramatically smaller, lighter design. Built for the increasingly connected and space-constrained environments of aerospace, defense, industrial automation and next-generation mobility, LiteSPEed™ helps customers move more data with less cable, reducing weight, complexity, and cost while increasing system performance and reliability. “As systems become more intelligent and interconnected, engineers need lighter, more efficient ways to deliver power and data,” said Juan Contreres, director of product management. “LiteSPEed™ gives them a rugged, high-speed Ethernet solution that simplifies installation without compromising performance.” With advanced sensors, real-time analytics, and distributed control systems proliferating across industries, cabling has
Owkin Announces International Validation Results of BRCAura: AI-Driven Screening for gBRCA Mutations Directly From Pathology Slides3.12.2025 14:00:00 CET | Press release
Owkin shares promising validation results for BRCAura RUO, a clinical-grade research-use-only AI product designed to screen for germline BRCA1/2 mutations (gBRCAm) directly from digitized breast cancer pathology slides. Breast cancer remains the leading cause of cancer-related deaths among women worldwide. Identifying patients with germline BRCA1/2 mutations is essential for guiding targeted treatment decisions, but testing is not always consistently offered to eligible individuals, and implementation varies between countries. The model concept was initiated as part of Owkin’s ongoing partnership with Gustave Roussy and Centre Léon Bérard through PortrAIt, a French consortium dedicated to advancing precision medicine with AI-enabled digital pathology. Fostered through collaboration with AstraZeneca, as announced in October 2024, the development of BRCAura aims to accelerate and expand identification of BRCA mutations in patients with breast cancer. Strong validation across internationa
Adva Network Security achieves BSI approval for PQC-encrypted edge networking device3.12.2025 14:00:00 CET | Press release
News summary: Critical infrastructure, defense and governments need quantum-safe encryption at the edge to neutralize ‘harvest-now, decrypt-later’ risks FSP 150-XG118Pro (CSH) delivers quantum-safe encryption via software update, enabling seamless upgrades with no hardware changes BSI approval confirms the device’s compliance for government and defense use Adva Network Security today announced that the FSP 150-XG118Pro (CSH) 10Gbit/s edge device now delivers quantum-safe encryption based on post-quantum cryptography (PQC). This enhancement enables operators of critical network infrastructure (CNI) to secure data in motion and build future-ready networks. Certified by the German Federal Office for Information Security (BSI), the solution’s Ethernet encryption offers PQC crypto-agility via a software update, eliminating the need for hardware changes. With its new capabilities, the FSP 150-XG118Pro (CSH) is ideally suited for diverse high-security environments, ranging from national infra
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom
