Study Shows Cyber-Security Pros Confident They Can Find Threats

1 of 12

Study Shows Cyber-Security Pros Confident They Can Find Threats

Crowd Research Partners released the 2017 Threat Monitoring, Detection and Response Report on Aug. 15, providing insight into the latest trends and professional opinions in the cyber-security landscape. The report includes responses from 410 IT security professionals and was produced in partnership with AlienVault, Bitglass, BluVector, ControlScan, Delta Risk, DomainTools, Dtex, Event Tracker, Exabeam, ObserveIT, SoftActivity and Tenable. Among the high-levels finding is that most organization feel confident they can detect threats within a day, yet it takes more than a day, often much more, for the majority organizations to recover from a cyber-attack. This slide show looks at some of the highlights of the 2017 Threat Monitoring, Detection and Response Report.

2 of 12

Multiple Vendors Supported the Research

The 2017 Threat Monitoring, Detection and Response Report  surveyed 410 cyber-security professionals in the Information Security Community on LinkedIn and benefitted from the support of multiple vendors including, AlienVault, Bitglass, BluVector, ControlScan, Delta Risk, DomainTools, Dtex, Event Tracker, Exabeam, ObserveIT, SoftActivity and Tenable.

3 of 12

Cyber-Security Confidence is High

Overall, IT security professional have confidence in organizations' overall security posture and ability to ferret out threats.

4 of 12

Ransomware, Phishing Are Top Concerns

There are a number of different cyber-threats that IT security professionals are concerned about with phishing and ransomware topping the list.

5 of 12

Detection of Advanced Threats is a Top Challenge

There is no shortage of challenges for cyber-security professionals today. The 2017 Threat Monitoring, Detection and Response Report respondents identified the detection of advanced threats as the top challenge.

6 of 12

Security Incidents Lead to System Downtime

Cyber-security incidents can impact business operations in different ways. Respondents to the study reported that system downtime was the leading negative impact from security incidents.

7 of 12

Most Cyber-Security Incidents Detected Within a Day

When asked how long it takes to detect suspected IT security incidents, 70 percent of respondents indicated 23 hours or less, with 54 percent noting they could detect incidents within 12 hours.

8 of 12

Recovery Time is More Than a Day

However the same respondents admitted it typically takes longer to actually recover from a cyber-attack. A minority, 29 percent of respondents indicated they could recover from a cyber-attack within minutes or hours, while 36 percent said it takes between one day and one week to recover.

9 of 12

Threat Intelligence Impact Varies

The use of threat intelligence technologies and services had mixed impact for the survey respondents. Just 17 percent of respondents noted that the use threat intelligence lead to a significant reduction in breaches, while another 17 percent reported they noticed no improvement.

10 of 12

Threat Management Budgets are Not Growing

Fully 54 percent of respondents indicated that their threat management budget is not likely to change in the next 12 months.

11 of 12

Outlook for Breaches is Mixed

When asked what the likelihood of a breach is in the next 12 months, 32 percent of respondents said that it is more likely, while 29 percent said it was less likely.

12 of 12

WannaCry Helps Push Cyber-Crime Attacks to New Heights in 2Q17

ThreatMetrix's second-quarter 2017 cyber-crime report reveals the latest fraud trends, with attackers taking advantage of WannaCry fears to further their aims.
Top White Papers and Webcasts