Study: Business leaders lacking confidence in IT

When it comes to the readiness of critical IT requirements, including availability, security, as well as backup and recovery, business leaders in some of the world's top markets lack confidence in their ability to cope and recover from disruptive incidents.

Data from a recent global study conducted by Vanson Bourne, on behalf of EMC, shows that a reduction in investment in availability, security, backup, and recovery has threatened IT's ability to deal with disruptive events, including unplanned downtime, data loss, or security incidents. Based on the responses from those who took part in the study, one of the underlying issues appears to be communication.

Vanson Bourne interviewed 3,200 business leaders across the globe, and found that 45 percent of them felt that senior executives within their respective organizations lacked confidence in the adequacy of existing availability, security, and backup and recovery deployments. This lack of confidence was surely compounded by the fact that a majority of them experienced one or more disruptive incidents.

[Senior executives blamed for a majority of undisclosed security incidents]

Over the last twelve months, 61 percent of the respondents suffered a disruptive incident, such as unplanned downtime, a security breach, or data loss. As a result, their organizations were impacted in a number of different ways. A majority of the respondents reported employee productivity loss due to the incident, but that is in addition to lost revenue, lost customer confidence or loyalty, lost business opportunities, product or service delays, or problems getting a product or service to market.

Looking at disruptive incidents, in relation to data protection, security, or availability, as well as the pain that occurs because of them -- a majority of respondents said that budgets were the reason that their organizations failed to achieve success. However, 35 percent also noted workload or resource constraints, 33 percent claimed that a lack of planning and anticipation, and 32 percent said a lack of knowledge and skills led to their problems. At the same time, one in five pointed to a lack of trust in existing technology as a key limiter to success.

When it comes to the top security concerns, the number one item was third-party application access, followed by intellectual property protection. However, a majority of the respondents admitted that they mainly use anti-Virus and firewalls to protect these assets. Less than twenty percent claimed to have implemented an intelligence-driven security program (SIEM), and just over ten percent claimed to have implemented some type of GRC program, despite many regulatory measures that require strict monitoring and controls.

"The four big megatrends in information technology today are cloud computing, Big Data, social networking and mobile devices. Adoption and maturity of these trends must float upon a sea of trust -- trust that my information is secure in the cloud, trust that my data wont be lost or stolen, trust that my IT will be operational when it needs to be -- which, these days, is all the time," David Goulden, EMC's President and Chief Operating Officer, said in a statement.

"The more trust that can be earned and guaranteed, the bigger and faster the impact of these trends. Conversely, the less trust that is established, the more limited these trends will be. Where countries fall on the IT Trust maturity curve could affect their overall ability to compete."

That curve, which measures the overall trust in IT, shows that in China, decision makers implemented the highest concentration of availability solutions, as well as security and backup and recovery technologies. The U.S. ranks second, followed by South Africa, Brazil, and Australia.

[Enterprise defenses lag despite rising cybersecurity awareness]

In the last year, according to the report, China increased IT spending on these areas some 81 percent, compared to the 64 percent increase observed in the U.S. Most of the spending increases occurred in the financial services sector, followed by life sciences, IT and technology, and healthcare.

In a statement, Irina Simmons, the Chief Risk Officer for EMC, summed up the study rather cleanly, stating the truth that most IT practitioners will do everything within their power to control and protect the enterprise. However, the breakdowns occur when it comes to communicating up the ladder.

"As a chief risk officer, I can say that investing the time to deliver these messages to your executive management team and risk committees at the board level is crucial. Otherwise, communication gaps will lead to gaps in trust. For example, the survey reveals that 70% of IT participants consider their IT functions to be a driver of a resilient and secure infrastructure, yet only 50% of non-IT decision makers see IT functions performing that role," she wrote, expanding on her statement in a company blog post.

"In mature IT organizations, success against IT threats is not just accidental or attributable to good luck, but rather the result of mature processes and deployment of the correct IT tools that continuously monitor for new threats and adjust to new issues as they are revealed."

Join the CSO newsletter!

Error: Please check your email address.

Tags IT management

More about

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Steve Ragan

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place