Centrify study finds CEO disconnect is weakening cybersecurity
Source: OAK Consulting for Centrify , Author: Posted by BI-ME staff
Posted: Mon April 16, 2018 2:43 pm

UAE.  Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, announced results of a new research study with Dow Jones Customer Intelligence, “CEO Disconnect is Weakening Cybersecurity,” which reveals that a misalignment between CEOs and Technical Officers is weakening enterprise cybersecurity postures.

The report highlights that CEOs are incorrectly focused on malware, creating misalignment within the C-suite, which results in undue risk exposure and prevents organizations from effectively stopping breaches. Technical Officers (CIOs, CTOs and CISOs) on the front lines of cybersecurity point to identity breaches — including privileged user identity attacks and default, stolen or weak passwords – as the biggest threat, not malware.

As a result, cybersecurity strategies, project priorities, and budget allocations don’t always match up with the primary threats nor prepare companies to stop most breaches.

The study — a survey of 800 enterprise executives including CEOs, Technical Officers, and CFOs – highlights that:
• 62 percent of CEOs cite malware as the primary threat to cybersecurity, compared with only 35 percent of Technical Officers.
• Only 8 percent of all executives stated that anti-malware endpoint security would have prevented the “significant breaches with serious consequences” that they experienced.
• 68 percent of executives whose companies experienced significant breaches indicate it would most likely have been prevented by either privileged user identity and access management or user identity assurance.

“While the vast majority of CEOs view themselves as the primary owners of their cybersecurity strategies, this report makes a strong argument that companies need to listen more closely to their Technical Officers,” said Tom Kemp, CEO of Centrify. "It’s clear that the status quo isn’t working. Business leaders need to rethink security with a Zero Trust Security approach that verifies every user, validates their devices, and limits access and privilege.”

CEOs are Investing in the Wrong Cybersecurity Solutions
The study also revealed that CEOs are investing in the wrong areas of cybersecurity. The 2017 Data Breach Investigation Report released by Verizon indicates that 81 percent of breaches involve weak, default, or stolen passwords. Identity is the primary attack vector, not malware, yet the report reveals that malware is still the focus point for most CEOs:
• 60 percent of CEOs invest the most in malware prevention and 93 percent indicate they already feel “well-prepared” for malware risk.
• 49 percent of CEOs say their companies will substantially reduce malware threats over the next two years, yet only 28 percent of CTOs agree with this statement.

These investment decisions are frequently caused by misplaced confidence in the ability to protect against breaches, putting organizations at significant risk. While Technical Officers are more aware of the real risks, they are also frustrated by inadequate security budgets, as spending is typically strongly aligned with CEO priorities rather than with actual threats.

Poor Communication Between CEOs and Technical Officers Leads to Misalignment
The study also exposed that the disconnect between CEOs and Technical Officers leads to misaligned security strategies, and tension among executives.
• 81 percent of CEOs say they are most accountable for their organizations’ cybersecurity strategies, while 78 percent of Technical Officers make the same ownership claim.
• Only 55 percent of CEOs say their organization has experienced a breach, whereas 79 percent of CTOs acknowledge they’ve been breached. This indicates that 24 percent of CEOs are not aware that they have experienced a breach.

“The traditional security model of using well-defined perimeters between ‘trusted’ corporate insiders and ‘untrusted outsiders’ to protect assets has evolved with the advent of cloud, mobile and IoT. Yet most enterprises continue to prioritize spending on traditional security tools and approaches,” said Garrett Bekker, Principal Security Analyst at 451 Research. “Centrify’s research reveals that a primary reason for conflicting cybersecurity strategies and spending is that C-level executives and technical managers don’t always see eye-to-eye regarding security priorities, and a misaligned C-Suite can put the organization at risk. Modern organizations need to rethink their approach and adopt a framework that relies on verifying identity rather than location as the primary means of controlling access to applications, endpoints and infrastructure.”

Outdated Thinking Results in Higher Risk
CEOs also expressed frustration with security technologies that have a poor user experience and cause their employees to lose productivity.
• 62 percent of CEOs state that multi-factor authentication (MFA) is difficult to manage and is not user-friendly, while only 41 percent of technical officers agree with this assessment.This outdated perception has been resolved by significant innovation by identity security vendors in areas such as machine learning. These advances have substantially reduced the burden of deploying and managing authentication solutions and improved the user experience for a range of security technologies.

To read more about how the security disconnect in the C-Suite is weakening cybersecurity, download the Centrify study here.

Photo Captions:
1. (above)  Tom Kemp, CEO of Centrify
2. (inset)  For illustrative purposes only (File photo)

About Centrify
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege.  Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience.

Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM).  Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.

About Dow Jones Customer Intelligence
As part of the Dow Jones Customer Engine, the Dow Jones Customer Intelligence Unit conducts both bespoke and secondary research on behalf of our brands and our client's brands; and through rigorous analysis and our unique perspectives seek to be a trusted source for relevant, timely, and reliable insights.

 

MIDDLE EAST BUSINESS COMMENT & ANALYSIS

date:Posted: May 21, 2018
UAE. A new defence is being developed that will allow companies to tackle the latest threats as soon as they appear on the network; Machine learning enables AI to detect patterns in all sorts of data sources and create behaviours based on recognized patterns.
date:Posted: May 17, 2018
UAE. The report states that 50% of SME funding applications are rejected by banks and that alternative trade finance, powered by FinTech and Blockchain, is on the rise.
date:Posted: May 17, 2018
INTERNATIONAL. New research shows trust in organizations is diminished as consumers believe businesses don't know how to protect their data.
dhgate