As well as increasing their use of automation, the data suggests priority areas for attack-prone organisations to address, including:
- Simplification – Clutter in the technology environment makes it harder to pick up signals and get on top of issues quickly. Agencies need to simplify the technology stack to reduce risk and improve visibility, giving cybersecurity teams gain greater coverage using fewer tools. When all systems “talk” to each other, telemetry flows to the surface more easily, helping security teams to detect incidents more efficiently. Simplification could also help to address skills shortages, taking cyber organisations from a group of specialists – each one with expertise in a single tool – to an integrated team of generalists who can back-stop each other. A joined-up cyber organisation can also make greater use of automation, taking some of the pressure off human resources.
- Risk quantification – Cyber risk quantification is an emerging area where automation and data analytics can add insight and aid risk prioritisation. In our survey, “too many attack surfaces” was the most cited internal challenge to an organisations’ cybersecurity approach, driven by cloud adoption at scale and ecosystem business models. Most dangerous of all are supply chains, which were responsible for 62% of system intrusion incidents in 2021. Our survey found that, while Prone Enterprises tend to focus more on financial risk, Secure Creators are almost twice as likely to be highly concerned about the risks posed by supply chain. Investing in tools to better quantify cyber risks is essential to help security professionals make informed decisions about where and how to streamline cyber approaches and tangibly measure progress on resilience.
Should the CISO role be elevated?
Our survey also found that, to reduce cyber vulnerabilities, government agency CISOs will need increasing levels of influence. For example, they will have to partner with Chief Operating Officers and other senior leaders, including becoming more involved in vendor selection decisions and ensuring cyber security is embedded at all operational levels.
Cybersecurity is already a top three issue for most agency executives, but they need a cybersecurity peer to work with to achieve true resilience. To this point, Secure Creators are more likely than Prone Enterprises to integrate cybersecurity at all levels of the entity – including the C-suite.
With agency CISOs typically at Branch Head level or below, this suggests agencies should consider their elevation. When CISOs have a seat at the executive table, cybersecurity operations are more embedded with core business priorities and strategies, leading to higher odds of experiencing fewer incidents.
The role of CISO is relatively new, meaning cyber leaders lack strong communities and champions. Agencies would be well advised to rethink where this often-under-valued position fits in their hierarchy. By having the CISO on the executive team, cybersecurity strategies are more likely to be aligned with agency goals and objectives. This could enable a more comprehensive and integrated approach to managing cybersecurity risks in an increasingly complex digital landscape. Such appointments would also send a timely message that security is a priority and a shared responsibility across all government agencies.
Cybersecurity transformation essential
Finally, our study offers context around why it is still important for cyber organisations to focus on transformation – not just technology. Simplification begins with technology. But its success also requires ongoing change management so cyber teams are ready to use new tools and engage in more strategic ways of working.
In an increasingly digitised world, safeguarding Australia’s vulnerable sectors requires a proactive approach, starting with government agencies setting the cybersecurity standard and embracing innovation for a resilient future.