Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/24/2019
01:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Overlooked and Underappreciated? IT Security Professionals are Suffering from an Image Problem

New Research from Thycotic reveals IT security professionals feel they're seen as the 'doom mongers' or a 'necessary evil' by employees

London, January 24, 2019 – The majority of UK IT security professionals feel they’re suffering from an image problem amongst fellow workers, according to new research commissioned byThycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organisations worldwide.  Nearly two thirds of respondents (63%) feel that their security teams are either viewed as the company naysayers – specifically either ‘doom mongers’ or a ‘necessary evil’ (36%). Also, 27% of respondents said company security and security professionals are just something that runs in the background which employees don’t really notice.

The research, which was conducted with 100 IT security decision makers within the UK, revealed that more than a third of respondents (38%) believe that they’re viewed as the ‘policemen.’ Worryingly, when asked if they’d ever experienced negativity towards their team and their work, 13% said this happens ‘all the time.’

Almost three quarters (74%) of security professionals reported negativity or indifference regarding the introduction of new security measures and policies: with employees believing it will hamper their work (35%), or barely noticing them (39%).  

Security professionals are also struggling to promote their value to other departments in the business. The overwhelming majority of them (90%) believe that other departments could have a better understanding of what they’re trying to achieve, whilst an equally high majority (88%) feel that it could be easier to communicate their views to executive management in other functions such as HR and Finance.

 

Execs feel board perceives them as functional, not a force for competitive advantage

When it comes to how they’re perceived by the C-suite, there are further challenges: 56% feel that they’re restricted by the board, which may be accounted for by the fact that only 41% of organisations have a CISO in place on the board.  Whilst the security team can be instrumental in business transformation, only 44% believe that the C-suite sees them as a positive force for innovation and just one in 10 respondents (13%) believe that the board sees them as helping the company to gain a competitive advantage. 

 

It also suggests that boards may be paying lip service to IT security teams, as there is a disparity between what the board says and how this translates into investment.While 87% of security professionals believe that the board listens to them and values their input, a considerable proportion (62%) believe that the board can’t always see the business case for security investments. 

Commenting on the findings, Joseph Carson, Chief Security Scientist and Advisory CISO at Thycotic notes, “At a time when security teams are under huge pressure and play an increasingly strategic role within the company, it’s disappointing that they’re not feeling valued either by their co-workers or by senior executives. The fact that negative opinions are rife amongst employees also suggests that security teams need to work harder to communicate the strategic importance of their roles to the business and reinvent themselves as ‘facilitators’ rather than ‘enforcers’ who enable the business to run smoothly.”

 

He continues: “Clearly instrumental in this will be achieving a greater representation of CISOs at board level and improving cross-departmental communications.”  

 

For more information please go to:  https://thycotic.com/resources/cyber-security-executives-survey-report-europe/.

 

 

Research Methodology

Thycotic, commissioned independent market research specialist Vanson Bourne to undertake research. Vanson Bourne interviewed 200 IT security decision-makers in November 2018 on the position and reputation of IT security departments in companies.

 

The sample was comprised of 100 respondents in Germany and 100 in the UK with at least 1,000 employees or more from a range of private and public sectors. Interviews were conducted online using a rigorous multi-level screening process to ensure that only suitable candidates were given the opportunity to participate.

 

Results referenced above all refer to UK respondents only.  

 

 

About Thycotic

Thycotic is the leading provider of cloud-ready privilege management solutions. Thycotic's security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia. For more information, please visit www.thycotic.com.

 

 

For further information, please contact:

 

Media Contact

Kirsten Scott/Kelly Friend/Barry Salmon

[email protected]

éclat Marketing

+44 1276 486000

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
The Flaw in Vulnerability Management: It's Time to Get Real
Jim Souders, Chief Executive Officer at Adaptiva,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5034
PUBLISHED: 2019-08-20
An exploitable information disclosure vulnerability exists in the Weave Legacy Pairing functionality of Nest Cam IQ Indoor version 4620002. A set of specially crafted weave packets can cause an out of bounds read, resulting in information disclosure. An attacker can send packets to trigger this vuln...
CVE-2019-5035
PUBLISHED: 2019-08-20
An exploitable information disclosure vulnerability exists in the Weave PASE pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted weave packets can brute force a pairing code, resulting in greater Weave access and potentially full device control. An attacker c...
CVE-2019-5036
PUBLISHED: 2019-08-20
An exploitable denial-of-service vulnerability exists in the Weave error reporting functionality of the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packets can cause an arbitrary Weave Exchange Session to close, resulting in a denial of service. An attacker can send a specially cr...
CVE-2019-8103
PUBLISHED: 2019-08-20
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation ...
CVE-2019-8104
PUBLISHED: 2019-08-20
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation ...