C-suite executives overconfident and underincluded when it comes to data security

Mobile devices and social-media services are considered to be the riskiest parts of the corporate IT infrastructure by C-suite executives who see IT security as their top concern and rogue individuals as the biggest threat to their security, according to a new global survey of C-suite attitudes towards data security.

Those attitudes suggest a much higher level of confidence in IT-security readiness than would be indicated by actual progress, according to the IBM Institute for Business Value's Securing the C-Suite survey – which polled more than 700 C-suite executives from 28 countries on their perceptions of information security exposure and risk-management strategies.

Just 17 percent of organisations said they were prepared in four key areas that IBM related to being 'cybersecured' – having a CISO in place, including c-suite collaboration in a cybersecurity plan, regularly discussing security in C-suite meetings, and having security as a regular topic on the boardroom agenda.

Despite their low level of actual cybersecurity-related activity, however, C-suite executives were far more optimistic about their overall security posture: 76 percent of CIOs and risk officers said their cybersecurity plans were very well established, as did 55 percent of CEOs.

The results suggested a wide disconnect between security perception and reality in the C-suite, IBM's analysis said, as well as a lack of executive understanding of the key elements of a successful organisational IT-security function.

The implications of this disconnect are significant, particularly given additional findings that 51 percent of the same CxOs believe their organisation faces a 1 in 4 chance of suffering a breach with material impact on their organisations. That is “a significant acknowledgement of the risk”, IBM's analysis said, noting that this acknowledgement was at adds with the relatively low number of organisations that are actually properly secured.

Truly cybersecured organisations, in IBM's view, “have made significant progress to define and implement their cybersecurity strategies. As a result, these organisations have a more effective cybersecurity risk mitigation profile” bolstered through activities such as active C-level engagement in threat management, cross-functional collaboration on cybersecurity issues, formal appointment of a CISO, and collaboration with external entities to share incident information.

Respondents were asked to identify which specific technologies posed the most risk and mobile devices were named by 57 percent of respondents. Social-media systems ranked second, nominated by 54 percent of respondents, while enterprise mobile applications and cloud applications were each named by 47 percent of respondents.

The survey also identified significant differences in perception of security preparedness between the various members of the C-suite: although 77 percent of chief risk officers and 76 percent of CIOs said their organisation's cybersecurity plans are well in place, only 61 percent of chief HR officers, 59 percent of chief marketing officers, 55 percent of CFOs and 51 percent of CEOs said the same.

“This is significant because these three executives are ultimately the stewards of customer, financial and employee data,” the IBM analysis notes, adding that this information is “highly coveted by cyber-criminals” but may be underprotected due to historical functional divisions in the delivery of IT security.

“Since cybersecurity has been largely an IT responsibility, CIOs may believe that they have addressed the technical aspects and implemented solid defences across the corporate network, within applications, and for access remotely via laptops and mobile devices,” the report suggests.

“Assuming this is sufficient without engaging the business has the potential to miss areas in business, information management and third party solutions. Cloud exemplifies this concern and may account for the C-suite's differing views on the security risks.”

Those views may be perpetuating feelings of exclusion amongst C-suite members, with around 60 percent of marketing, HR and financial executives indicating that they are not involved in security discussions when the topic is raised at the executive level. This shortcoming has direct implications on the organisation's ability to foster productive collaboration, the report noted, with CIOs far more confident that executives are being included than the executives themselves.

Read more: Australian executives more concerned, engaged with email security issues than overseas peers: Mimecast

“Considering C-suite level interaction is the primary forum within which the surveyed executives indicated they collaborated with peers on cybersecurity, the low level of engagement by these three key executives is concerning,” the report warns.


With data increasingly being stored in the cloud, it’s critical to be able to evaluate and manage the security of cloud solutions. Dropbox's Solutions Architect team are teaming up with the Symantec Information Protection group to discuss the latest industry best practices.

Register here for the February 25th webinar on* Managing enterprise cloud security.

Read more: Most cybersecurity breaches go unreported, uninsured despite executive concern: Barclays


Join us at the CSO Perspectives Roadshow in March.

CSO is proud to present our international keynote speakers: Robert Lentz, former CISO of US Department of Defense discussing the evolution of Cyber Security and Graham Cluley, world- renown IT Security blogger and Analyst (UK) on the rise of Malware in our age. We will also be featuring our Security Awareness stream, where you will hear from the likes of NAB and ANZ, as they discuss the importance of staff and customer security awareness programs. We will have up to 18 different interactive Security Exchange discussions on a variety of different topics for you to choose from as you build your personalised agenda for the day. Join CSO for a day of networking with your peers, engaging and discussing topics relevant to you, hearing from some of the top worldwide IT Security leaders in the market and attending the exhibition floor to win some amazing prizes.


Join the CSO newsletter!

Error: Please check your email address.

Tags IT infrastructurecybersecuritydata securityIBMDavid BraueC-Suitemobile devicesCSO Australia

More about CSODropboxIT SecurityNABSymantec

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place