CyberEdge 2022 CDR Report
CyberEdge 2022 CDR Report
CyberEdge 2022 CDR Report
PLATINUM
GOLD
SILVER
Table Research Current Perceptions Current and Future
Introduction
of Contents Highlights Security Posture and Concerns Investments
Table of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Research Highlights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Section 1: Current Security Posture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Past Frequency of Successful Cyberattacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Future Likelihood of Successful Cyberattacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Security Posture by IT Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Assessing IT Security Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
The IT Security Skills Shortage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Section 2: Perceptions and Concerns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Concern for Cyberthreats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Concern for Web and Mobile Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Responding to Ransomware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Barriers to Establishing Effective Defenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Benefits of Unified App and Data Security Defenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Hybrid Cloud Security Challenges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Boosting Careers with Cybersecurity Certifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Section 3: Current and Future Investments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
IT Security Budget Allocation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
IT Security Budget Change. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Network Security Deployment Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Endpoint Security Deployment Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Application and Data Security Deployment Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Security Management and Operations Deployment Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Identity and Access Management Deployment Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Outsourcing to Managed Security Service Providers (MSSPs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Section 4: Practices and Strategies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Security Applications Delivered via the Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Practices That Support Application Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Protecting Employees Working from Home. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Emerging IT Security Technologies and Architectures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
The Road Ahead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Appendix 1: Survey Demographics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Appendix 2: Research Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Appendix 3: Research Sponsors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Appendix 4: About CyberEdge Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Introduction
Introduction
Cyberwar and the Russian Invasion of Ukraine Where do we have gaps in our cyberthreat defenses relative
to other organizations?
This report is being written during the early stages of Russia’s
invasion of Ukraine. Obviously, our survey results don’t reflect the Have we fallen behind in our defensive strategy to the point
impact of that event. However, in “The Road Ahead” section that that our organization is now the “low-hanging fruit” (i.e., likely
begins on page 56, we offer some predictions about how the to be targeted more often due to its relative weaknesses)?
invasion may affect information security and the cybersecurity Are we on track with both our approach and progress in
industry. continuing to address traditional areas of concern, while also
tackling the challenges of emerging threats?
About This Report How does our level of spending on IT security compare to
The CDR is the most geographically comprehensive, vendor- that of other organizations?
agnostic study of IT security decision makers and practitioners.
Do other IT security practitioners think differently from us
Rather than compiling cyberthreat statistics and assessing
about cyberthreats and their defenses, and should we adjust
the damage caused by data breaches, the CDR surveys the
our perspective and plans to account for these differences?
perceptions of IT security professionals, gaining insights into
how they see the world. Another important objective of the CDR is to provide developers
of IT security technologies and services with information they
Specifically, the CDR examines:
can use to better align their solutions with the concerns and
The frequency of successful cyberattacks in the prior year and requirements of potential customers. Our data can lead to better
optimism (or pessimism) about preventing further attacks in market traction and success for solution providers, along with
the coming year better cyberthreat protection technologies for all the intrepid
defenders out there.
The perceived impact of cyberthreats and the challenges
faced in mitigating their risks The findings of the CDR are divided into four sections:
The adequacy of organizations’ security postures and their
Section 1: Current Security Posture
internal security practices
Our journey into the world of cyberthreat defenses begins
The organizational factors that present the most significant with respondents’ assessments of the effectiveness of their
barriers to establishing effective cyberthreat defenses organization’s investments and strategies relative to the
The investments in security technologies already made and prevailing threat landscape. They report on the frequency of
those planned for the coming year successful cyberattacks, judge their organization’s security
posture in specific IT domains and security functions, and
The health of IT security budgets and the portion of the
provide details on the IT security skills shortage. The data will
overall IT budget they consume
help you begin to assess:
By revealing these details, we hope to help IT security decision
Whether, to what extent, and how urgently changes are
makers and practitioners gain a better understanding of how
needed in your organization
their perceptions, concerns, priorities, and defenses stack
up against those of their peers around the world. IT security Specific countermeasures that should be added to
teams can use the data, analyses, and findings to answer many supplement your existing defenses
important questions, such as:
Introduction
Research Highlights
16.2%
blockbuster issues of the past year have been the increasing Not far behind were finance (88.2%), manufacturing (86.4%), and
popularity (for cybercriminals) of double extortion ransomware, retail (85.6%). Healthcare (75.3%) and government (68.2%) were
which not only encrypts data but also exfiltrates it to the web affected somewhat less often (see Figure 3).
(where it can be published), and vulnerabilities in the Log4j
Looking globally, the countries with the highest percentage
utility from Apache, which could potentially affect 3 billion
of organizations successfully attacked were Colombia (93.9%),
devices and applications.
Turkey (93.7%), Spain (91.8%), Mexico (90.6%), Canada (89.8%),
And the pressure can’t be relieved by hiring, since the vast and France (89.3%). The UK, Germany, and Australia were at the
majority (84.1%) of organizations are already experiencing a other end of the spectrum, with 81.4%, 72.6%, and 62.5% of
shortfall in IT security personnel (page 15). their organizations being compromised, respectively (see Figure
4). Maybe the Aussies know something. Not only was Australia
But don’t give up hope. We will also review the technologies
the only country where less than 70% of organizations were
that organizations are planning to implement in areas such
breached at least once, but only 20.9% of the organizations
as network, endpoint, application, and identity security
there reported six or more successful attacks, about half of the
(pages 36-45) and how organizations can use security training
international average.
and certifications to move junior security professionals into
more-advanced roles (page 30).
Now, back to our data about successful cyberattacks in the past year.
Of the seven major industries surveyed for this report, education Colombia 93.9%
was the most often victimized for the second year in a row Turkey 93.7%
(90.5%), followed closely by telecom and technology (90.3%). Spain 91.8%
Mexico 90.6%
Canada 89.8%
Education 90.5% France 89.3%
Brazil 88.2%
Telecom & Technology 90.3% Saudi Arabia 87.8%
Japan 87.2%
Finance 88.2%
USA 86.8%
Germany 72.6%
Government 68.2% Australia 62.5%
Figure 3: Percentage compromised by at least one successful attack Figure 4: Percentage compromised by at least one successful attack
in the past 12 months, by industry. in the past 12 months, by country.
Somewhat or very likely 75.6% 76.1% The best we can say is that the rate of increase in the combined
Very likely total has slowed to half a percentage point in this survey, after
69.3%
having jumped 2.9%, 4.1%, and 6.3% in the 2019, 2020, and 2021
65.2%
62.1% 61.5% 62.3% CDRs, respectively. We think the curve has flattened because
organizations have spent the last two years putting in place
infrastructure and processes to protect remote operations,
51.9%
home-based workers, and personal devices (i.e., devices not
managed by the IT department). Examples of such measures
include bring-your-own-device (BYOD) policies and zero trust
38.1%
network access (ZTNA) approaches to network and application
35.1% access (see pages 52 and 54). Those investments are giving
32.0% security teams greater confidence in their ability to manage the
27.2% challenges created by the COVID-19 pandemic.
20.4% 19.7% 21.2% It is interesting to note that the 76.1% of respondents indicating
16.1% that a successful attack is somewhat or very likely in the
14.0%
coming 12 months is less than the 85.3% who experienced
8.5% such an attack in the past year. In other words, at least some
security professionals who were victimized last year think their
2014 2015 2016 2017 2018 2019 2020 2021 2022 organizations are better able to defend themselves this year. Or
else they are just optimistic. A positive attitude is healthy, when
Figure 5: Percentage indicating compromise is “more likely to occur not taken to extremes. Perhaps we should all follow the example
than not” in the next 12 months.
of Benjamin Disraeli, the 19th century British prime minister, who
said: “I am prepared for the worst, but hope for the best.”
Expectations about successful cyberattacks over the coming 12
months reached a new high in this year’s survey. The number of
respondents indicating that such an attack was either “somewhat
likely” or “very likely” edged up from 75.6% to 76.1%. In addition, “Perhaps we should all follow the example of
the mix between those two views shifted for the worse. The Benjamin Disraeli, the 19th century British prime
percentage saying a successful attack was “very likely” jumped minister, who said: ‘I am prepared for the worst,
by 3.1%, to 35.1%. That is four times the number (8.5%) who
but hope for the best.’”
gave that response eight years ago when this survey started (see
Figure 5).
When we look at expectations by country, the highest number By industry, respondents from finance are expecting the worst
of respondents predicting successful cyberattacks were in Japan (86.7%), followed by those in education (84.1%), telecom and
(87.9%), Canada (85.4%), and Singapore (84.0%). In the middle of technology (79.1%), and healthcare (76.0%). Those in retail
the pack: the United States (79.7%), Spain (76.0%), and Germany (70.4%) and manufacturing (68.9%) were more sanguine.
(74.3%). The optimists were Colombia (60.7%), Brazil (55.9%), and And as on the previous question, security professionals in the
Turkey (a mere 38.0%) (see Figure 6). government sector (54.3%) were least worried (see Figure 7).
Japan 87.8%
Finance 86.7%
Canada 85.4%
Brazil 55.9%
Turkey 38.0%
Each year we try to gauge how security professionals feel about This year respondents chose software as a service (SaaS) cloud
their ability to defend against cyberthreats across different types applications as the area where they are most comfortable about
of systems, technologies, and environments. This information their organization’s security posture. SaaS moved up from third
gives us a picture of the IT domains where they are most position in the previous two surveys. Clearly, SaaS vendors have
confident, and those that are creating the most headaches (see done a good job of staying on top of security issues (or at least
Figure 8). are perceived that way by their customers).
This question asks respondents to rate the adequacy of their Organizations remain most positive about their capabilities for
organization’s capabilities in different functional areas of governance, risk and compliance (GRC) and identity and access
IT security. The answers show us perceived strengths and management (IAM). These are followed closely by detection of
weaknesses in security-related processes and programs (see advanced threats and application development and testing,
Figure 9). two areas where many organizations have made considerable
investments in the past couple of years.
28.6%
One in three organizations can’t find enough IT security analysts,
IT security /
compliance auditor 29.8%
operators, or incident responders (33.2%). The shortfall was
slightly less than in the previous survey, when it was 35.0%.
28.5% Almost one-third of organizations are short of IT security
Application security tester
26.4% architects and engineers (32.4%), essentially the same as a
year ago.
28.0%
DevSecOps engineer Rounding out the roles were application security testers (28.5%),
25.7%
DevSecOps engineers (28.0%), and risk and fraud analysts
(24.0%). The deficit of application security testers and DevSecOps
24.0%
Risk/fraud analyst engineers worsened from the previous survey, probably the
25.9%
result of a turn toward building security into applications rather
Figure 10: Cybersecurity skills shortage, by role. than relying entirely on perimeter defenses.
Manufacturing 78.7%
Ransomware 3.96
What types of threats are keeping security professionals up The surprise in this data is that account takeover (ATO) and
at night? For the seventh year in a row, malware tops the list credential abuse attacks (which include credential stuffing)
(see Figure 13). That’s not remarkable, since malware is a key moved up from fourth place last year to second place in
component of most digital skimming, ransomware, phishing, this survey, slightly ahead of ransomware (!) and just behind
and targeted attacks, among others, and threat actors continue malware. In fact, the average concern rating for this type of
to come up with new techniques that allow malware to evade attack increased the most of any of the 12 categories on this list,
detection. rising .08 from 3.89 to 3.97 (on a scale of 1 to 5). The increase was
driven by an upsurge in concern among finance and financial
services companies, and to a lesser extent among manufacturing
and telecom and technology companies.
Of course, ransomware is also near the top of the list, in third Respondents were least concerned about zero-day attacks,
position and just a tad behind ATO attacks. The average concern drive-by downloads, and watering hole attacks. However, as we
rating for ransomware increased .04 from last year, also a pretty mentioned earlier, the survey was conducted before the Log4j
big one-year jump. Clearly this was fueled by increased coverage story broke. As a result of that vulnerability, zero-day attacks may
of ransomware attacks in the press (e.g., Colonial Pipeline), move up a bit in next year’s report.
demands for larger ransom payments, and the emergence of
Every year we average the ratings across all categories to create
“double extortion ransomware attacks” (see page 21).
a “Threat Concern Index” (see Figure 14). That index remains at
In fact, based on current trends, we expect the level of concern a record high of 3.88. As we mentioned earlier, gale-force winds
about account takeover and ransomware attacks to pull even continue to blow in the world of cybersecurity.
with or pass malware on this list in the next year or two.
Figure 14: Threat Concern Index, depicting overall concern for cyberthreats.
The numbers were particularly high in Spain (98.0%), China (also Singapore 92.0%
98.0%), and Japan (95.6%) (see Figure 17). The lowest levels of Turkey 91.8%
concern (that is, relatively lowest, although still very high) were Brazil 91.2%
reported in the United States (87.6%), Germany (86.3%), and Mexico 90.9%
Australia (84.8%).
France 90.5%
UK 88.0%
USA 87.6%
Germany 86.3%
Australia 84.8%
Responding to Ransomware
If victimized by ransomware in the past 12 months, did your organization pay a ransom
(using Bitcoins or other anonymous currency) to recover data?
$322,168
$233,817
$220,298
$178,254 $154,108
$136,571 $139,739
$111,605
$84,116
$36,295
$41,198
$12,762
Q1'19 Q2'19 Q3'19 Q4'19 Q1'20 Q2'20 Q3'20 Q4'20 Q1'21 Q2'21 Q3'21 Q4'21
Figure 19: Average ransom payments, by quarter (data source: Coveware Quarterly Ransomware Reports).
45.0%
2019 2020 2021 2022 2019 2020 2021 2022 2019 2020 2021 2022
Figure 20: The ransomware vicious cycle: increased odds of recovering data … entice more victims to pay ransoms … which motivates more
ransomware attacks.
Figure 21 provides more evidence that ransomware medium-large and large organizations, with 5,000-9,999 and
gangs operate like profit-maximizing businesspeople who 10,000-24,999 employees, respectively, are most likely to be
rationally assess opportunities and risks. Our data shows that victimized by ransomware (73.5% and 74.7%, respectively).
Why would these entities be targeted more often than to pay higher ransoms. But then why would enterprises with
organizations with 500-999 employees, victimized at a rate of more than 25,000 employees, which presumably could afford
70.4%, and those with 1,000-4,999 workers, of which 69.6% were the largest payments, be victimized at the (relatively) low rate
hit? Because the medium and large organizations can afford of 67.0%? As the ransomware gangs acknowledged publicly,
taking out a big piece of someone’s economy or shutting down
essential infrastructure is bad for business because it attracts
500 – 999 70.4%
too much attention from national governments and law
enforcement agencies.
1,000 – 4,999 69.6% Finance (80.6%), telecom and technology (74.0%), and education
(73.3%) were the worst-hit industries (see Figure 22). The least
affected were healthcare (57.9%) and government (45.8%).
5,000 – 9,999 73.5%
As shown in Figure 23, a shocking nine out of 10 organizations
(89.6%) in China suffered ransomware attacks, followed by South
Africa (89.6%) and the United States (81.6%). At the light end
10,000 – 24,999 74.7%
of the scale were Japan (60.4%), Germany (60.0%), Colombia
(53.1%), Mexico (45.5%), and Turkey (44.9%).
Singapore 78.0%
Italy 64.0%
Education 73.3%
Canada 63.3%
Australia 63.0%
Retail 66.7%
Brazil 61.8%
Figure 22: Percentage of organizations affected by ransomware in the Figure 23: Percentage of organizations affected by ransomware in the
last 12 months, by industry. last 12 months, by country.
Agile software development teams hold daily “standup” For the third year running, the top two impediments have been
meetings where each person briefly answers three questions: lack of skilled personnel and low security awareness among
employees (see Figure 24).
1. What did you do yesterday?
Figure 26: Benefits achieved by unifying application and data security defenses.
When it comes to sourcing related technologies, security In this question we asked respondents about the benefits of
professionals are often faced with a choice between a leveraging a unified platform for application and data security
multiple-source, best-of-breed approach and a single-source, defenses (see Figure 26).
integrated solution approach. The former offers the widest
Of the organizations that have implemented this type of
choice of features across the different areas, but usually
integrated platform, more than half cite the overall benefit of
involves extra costs and hassles related to integration (or lack
an improved cloud security posture, and nearly half identified
of it), incompatible management and reporting tools, and the
enhanced security incident investigations. An integrated solution
complexity of working with more vendors.
gives security professionals confidence that the different
technologies work together and that information won’t fall
through the cracks between them.
When organizations transition applications to cloud platforms, We added a question to our survey this year to get a handle on the
they don’t have to worry about managing the underlying challenges created by hybrid cloud environments (see Figure 27).
infrastructure. The move can even simplify security – if an
The top two issues selected by the respondents were detecting
organization does all of its work on one platform. But in reality,
unauthorized application usage (46.4%) and detecting and
the vast majority of organizations do some of their work on each
responding to cyberthreats (45.3%). While every server type and
of several platforms. These include physical and virtual servers in
platform has tools for detecting issues and alerting on incidents,
their own data centers, in private clouds, and in multiple public
there is no standardization and little or no out-of-the-box
cloud services such as Amazon Web Services (AWS), Microsoft
integration. Security professionals are left with the soul-crushing
Azure, Google Cloud Platform, Alibaba Cloud, and IBM Cloud.
work of collecting and analyzing inconsistent data, filtering out
duplicates and false negatives, responding using multiple tools, etc.
The third- and fourth-place challenges are accessing and inspecting Coming just behind, but still important to almost a third of the
multi-cloud traffic (40.0%) and accessing and inspecting container respondents, are challenges related to maintaining regulatory
traffic (32.5%). These two are also related to inconsistent data compliance (30.7%) and meeting internal service level objectives
across environments and the need for multiple tools, sometimes (30.0%).
compounded by the need to manage multiple permissions and
How many organizations in fact face these challenges? A lot. A
credentials to access different systems and platforms.
full 96% of the respondents in our survey indicated that they are
dealing with a hybrid cloud environment.
Engineering 18.7%
Authorization 18.6%
Architecture 16.5%
Figure 28: Types of specialty cybersecurity professional certifications deemed most beneficial to IT security career paths.
For knowledge workers, continuing education is essential The top two choices, both selected by more than half of the
for getting and keeping good jobs. At least, that is the respondents, are certifications for cloud security (55.3%) and
overwhelming opinion of the respondents to our survey. Except for software security (53.2%). These are both growth areas. As
for a few holdouts (1% of the sample - probably people already enterprises migrate more and more application processing to
planning their retirement party), virtually all respondents said cloud platforms, demand for cloud security expertise is likely
that at least one cybersecurity certification would be beneficial to grow and grow. Similarly, many organizations are working
for their career (see Figure 28). on building security into their applications (as opposed to
detecting evidence of attacks and compromises after they are
in production). People who understand application security and
DevSecOps practices don’t have to worry about job security.
The next most beneficial certification is for security administration In fact, interest in all three of these certifications took big jumps
(43.9%). Security administrators are the backbone of many security from last year to this one: up 4.1% for cloud security, 3.2% for
teams, where they install, configure, and maintain security tools software security, and 5.6% for security administration.
and infrastructure. As shown in Figure 10 on page 15, there are
The next two types of certification are of most interest to people
more vacancies for security administrators than for any other
making career moves. Fundamental skills and knowledge (22.6%)
security role.
helps people entering IT security or eager to fill gaps in their
basic knowledge of the field, while leadership and operations
(21.9%) is for security professionals who want to move into
security management roles.
“Demand for cloud security expertise is likely
to grow and grow... People who understand Rounding out the field are certifications for three specialized
areas: security engineering (18.7%), authorization (18.6%), and
application security and DevSecOps practices
architecture (16.5%).
don’t have to worry about job security.”
Colombia 14.4%
USA 13.7%
12.1%
China 13.6%
Mexico 13.3%
Spain 11.9%
2018 2019 2020 2021 2022
Mean Mean Mean Mean Mean Canada 11.9%
Italy 11.6%
Figure 29: Percentage of IT budget allocated to information security,
by year. Singapore 11.4%
UK 11.3%
For the last five years we have asked respondents what Japan 11.2%
percentage of their organization’s overall IT budget is allocated
Australia 10.9%
to information security. After rapid growth between the 2018
Germany 10.8%
and 2020 surveys, the amount has leveled off in the 12.7% to
12.8% range (see Figure 29). France 10.7%
Why has the curve flattened out, when dangerous threats Figure 30: Percentage of IT budget allocated to security, by country.
continue to emerge and cybersecurity has become more
visible to top management and boards of directors? And when
3. More organizations are outsourcing security tasks that used
the COVID-19 pandemic has placed more stress on security
to be performed in their data centers to cloud platform
processes and staffs? We think four factors are at work:
providers and MSSPs (see page 46).
1. Many of the expenses required to support the wave of new
4. Some organizations are “sidesourcing” security activities (we are
remote workers created by COVID-19 involved non-security
coining a new term here, meaning delegating tasks to other
items such as more laptops and mobile devices, more
groups in the same enterprise) by training software developers
network capacity, and additional help desk support.
to build security into their code and end users to recognize and
2. As shown on Figure 24 on page 24, the gating factor in report phishing, social engineering, and other attacks.
providing better security is finding personnel with security
skills, not budget; it doesn’t make sense to throw more
money at security if you don’t have the people to deploy and
use new technologies or equipment.
Finance 13.3%
Healthcare 11.9%
10,000 – 24,999 13.0%
Education 10.7%
Figure 31: Percentage of IT budget allocated to security, by industry. Figure 32: Percentage of IT budget allocated to security, by
employee count.
Brazil 6.7%
Manufacturing 5.1%
Turkey 6.5%
Colombia 4.8%
Education 4.7%
USA 4.7%
Singapore 4.6%
Government 3.9%
Saudi Arabia 4.6%
Japan 4.2% Healthcare 3.6%
Spain 4.1%
UK 3.8% Figure 36: Mean security budget increase, by industry.
Italy 3.7%
Canada 3.7%
Germany 3.2%
Planned for
Currently in use No plans
acquisition
Advanced malware analysis / sandboxing 59.7% 31.0% 9.3%
Intrusion detection / prevention system (IDS/IPS) 56.2% 33.7% 10.1%
Secure email gateway (SEG) 56.1% 30.8% 13.1%
Data loss / leak prevention (DLP) 55.0% 34.9% 10.1%
Secure web gateway (SWG) 55.0% 34.2% 10.8%
Network access control (NAC) 54.4% 35.0% 10.6%
Denial of service (DoS/DDoS) prevention 53.9% 35.2% 10.9%
SSL/TLS decryption appliances / platform 51.8% 36.1% 12.1%
Network behavior analysis (NBA) / NetFlow analysis 46.9% 37.5% 15.6%
Next-generation firewall (NGFW) 46.1% 41.9% 12.0%
Deception technology / distributed honeypots 44.3% 37.1% 18.6%
There is no shortage of innovative new security products being But while an abundance is better than a dearth, it does make
brought to market. According to the Crunchbase website, in prioritization more difficult. We want to help. In this question
2021 venture capitalists invested $20 billion in cybersecurity and the next four, we throw light on what your peers think. What
startups, including a record-smashing $7.8 billion in the fourth cybersecurity offerings are must-haves? Which are the up-and-
quarter. And as we saw in Figure 24 on page 24, “lack of effective comers they plan to acquire to address emerging threats? Are
solutions available in the market” tied for second-to-last place in some failing to generate much interest?
a list of factors that inhibit defense against cyberthreats. Nobody
is worried about having too few options.
On this and the following tables, the first column shows the So, while advanced malware and sandboxing remain a “must-
percentage of organizations that are currently using each have” technology, four other network security technologies
technology. The middle column depicts organizations that are also found in 55% or more of organizations. Installations
are planning to acquire the technology this year. The last of all four grew substantially since the previous survey. They
column represents organizations that aren’t sure they need the are: intrusion detection/prevention system (IDS/IPS), up 4.4%
technology. To make the results easier to absorb, we color-coded to 56.2%; secure email gateway (SEG), up 2.8% to 56.1%; data
the cells. Dark blue highlights technologies that are widely used loss/leak prevention (DLP), up 1.5% to 55.0%; and secure web
now or are most likely to be deployed soon. Lighter shades gateway (SWG), up 3.3% to 55.0%. These technologies use a
indicate lower adoption levels and fewer planned acquisitions. variety of methods to detect anomolous network behaviors, as
The cells with the “no plans” figures are gray. well as content and hyperlinks that may be related to malicious
activities.
Planned for
Currently in use No plans
acquisition
Basic anti-virus / anti-malware (threat signatures) 74.2% 22.3% 3.5%
Endpoint detection and response (EDR) 57.6% 31.8% 10.6%
Data loss / leak prevention (DLP) 56.6% 31.6% 11.8%
EPP / Advanced anti-virus / anti-malware
55.3% 35.8% 8.9%
(machine learning, behavior monitoring, sandboxing)
Browser or Internet isolation / micro-virtualization 55.1% 35.5% 9.4%
Disk encryption 53.3% 36.2% 10.5%
Digital forensics / incident resolution 49.8% 36.4% 13.8%
Deception technology / honeypots 44.1% 40.5% 15.4%
Table 2 provides insights into the deployment status and In this survey we made a significant change to our endpoint
acquisition plans for endpoint security technologies. As with security technology categories, replacing “advanced anti-virus”
Table 1, percentages in dark blue indicate a higher frequency with endpoint protection platform (EPP) and endpoint detection
of adoption and greater likelihood of acquisition, while lighter and response (EDR). This update reflects the evolution of this
blues correspond to less-popular options. technology area and current industry terminology.
The most widely installed endpoint security technology Broadly speaking, EPP products provide traditional anti-virus
continues to be basic anti-virus and anti-malware solutions features enhanced by an array of newer capabilities such as
based primarily on threat signatures. Despite continued reports machine learning, endpoint activity monitoring, and sandboxing.
that “anti-virus is dead,” old but still dangerous viruses and Collectively, they overcome many of the tricks and techniques
Trojans continue to circulate, and security groups see value malware developers use to evade detection. EDR solutions
in products that detect and block them. That may be why the may include certain EPP features, but they also offer tools to
percentage of organizations currently using this technology help security teams aggregate and analyze endpoint data and
actually increased 3.7%, from 70.5% in the previous survey to respond to campaigns that involve malware.
74.2% in this one.
Planned for
Currently in use No plans
acquisition
API gateway / protection 64.1% 28.6% 7.3%
Web application firewall (WAF) 61.1% 29.9% 9.0%
Database firewall 59.5% 30.5% 10.0%
Application container security tools/platform 54.3% 36.5% 9.2%
Cloud access security broker (CASB) 53.3% 33.2% 13.5%
Database activity monitoring (DAM) 53.1% 35.9% 11.0%
Application delivery controller (ADC) 52.2% 33.6% 14.2%
Runtime application self-protection (RASP) 50.4% 35.1% 14.5%
File integrity / activity monitoring (FIM/FAM) 50.2% 37.8% 12.0%
Advanced security analytics (e.g., with machine learning, AI) 50.2% 39.7% 10.1%
Static/dynamic/interactive application security testing
48.0% 38.2% 13.8%
(SAST/DAST/IAST)
Bot management 42.6% 39.8% 17.6%
Table 3: Application and data security technologies in use and planned for acquisition.
In the area of application and data security, the most popular uncover rogue and forgotten APIs, blocking injection attacks
offering continues to be API gateway and protection products and other exploits, analyzing attacker behaviors, and correlating
(see Table 3). Usage of these technologies has soared over the API-related data across hybrid and multi-cloud environments.
last few years, rising from 45.1% in our 2018 report to 64.1%
As we mentioned in our discussion of security posture by IT
today. API gateways enforce authorization and encryption
domain on page 12, protecting APIs has become an increasingly
policies, scale resources when traffic spikes, and perform rate
pressing area of concern. As more organizations move to
limiting to mitigate DDoS attacks and other forms of abuse.
modular, services-based cloud applications, more sensitive
API protection solutions provide security teams with tools
data is being accessed through APIs, which are becoming more
to understand, detect, and respond to attacks targeting APIs
tempting targets for threat actors. We think API protection will
by performing tasks such as mapping the attack surface to
become an even bigger area of focus in coming years.
Planned for
Currently in use No plans
acquisition
Active Directory protection 64.5% 27.1% 8.4%
Cyber risk management and reporting 58.0% 31.3% 10.7%
Security configuration management (SCM) 56.5% 32.4% 11.1%
Patch management 54.7% 32.6% 12.7%
Security information and event management (SIEM) 51.7% 36.2% 12.1%
Penetration testing / attack simulation software 50.7% 35.4% 13.9%
Vulnerability assessment/management (VA/VM) 50.6% 38.8% 10.6%
Full-packet capture and analysis 50.4% 36.4% 13.2%
Advanced security analytics (e.g., with machine learning, AI) 50.2% 39.7% 10.1%
Security orchestration, automation and response (SOAR) 49.4% 36.7% 13.9%
Threat intelligence platform (TIP) or service 46.3% 39.7% 14.0%
User and entity behavior analytics (UEBA) 45.7% 38.9% 15.4%
Table 4: Security management and operations technologies in use and planned for acquisition.
Security management and operations technologies support a We added two new categories to our survey this year, and they
number of activities that make security programs effective and immediately occupied the top two spots in terms of installations
reliable, including: (see Table 3)!
Providing basic security hygiene and reducing the attack Active Directory protection is already in use in almost two-thirds
surface of organizations (64.5%). For many, Microsoft Active Directory
is the single source of truth for information about employee
Automating security-related processes
and business partner identities, as well as a repository for
Collecting, analyzing, and reporting on security data to information on group membership and privileged access. It
identify weaknesses, respond to breaches, and prioritize is also a critical resource for implementing ZTNA concepts.
investments Therefore organizations must protect Active Directory from
Testing security defenses using the techniques of likely cybercriminals attempting to create new accounts, escalate
attackers privileges, circumvent network segmentation, and otherwise
gain unauthorized access to networks and applications.
Cyber risk management and reporting, currently used in 58.0% In the past, we have rarely seen that combination. Threat
of organizations, helps align security activities with business risks intelligence helps organizations validate and prioritize security
and needs. It also helps IT groups justify investments in security alerts more quickly and accurately, focus on the threats most
professionals, processes, and technologies to top management likely to affect their specific industry and systems, and better
and boards of directors. understand threat actor TTPs. Our data about TIP indicates a
growing appreciation of threat intelligence and the advantages
Other security management technologies that are widely in use
it provides.
include security configuration management, or SCM (employed
in 56.5% of organizations), patch management (54.7%), and
security information and event management, or SIEM (51.7%).
One of the leaders in year-over-year growth was penetration “On this year’s application and data security
testing and attack simulation. The percentage of organizations shopping list, a new CDR entrant, bot
using it increased 2.8%, to 50.7%. We think the use of penetration
testing and attack simulation will continue to grow, along with
management, takes the top spot (40.4%).”
practices such as red team exercises and bug bounty contests. As
many organizations place more emphasis on developing secure
applications, they are recognizing that some application security
issues can only be uncovered by thinking like an attacker. The other technologies with high planned for acquisition
Our data for threat intelligence platform (TIP) or service adoption percentages are advanced security analytics (also 39.7%),
is interesting. Of all the options in the security management and user and entity behavior analysis (38.9%), and vulnerability
operations section, this technology had: assessment and management (38.8%).
1. The biggest year-to-year increase in usage, up 3.3% to 46.3% And now, on to our final category: identity and access
management, or IAM (see page 44).
2. The highest planned for acquisition number, 39.7%
Planned for
Currently in use No plans
acquisition
Password management / automated reset 62.1% 28.5% 9.4%
Adaptive/risk-based authentication 61.8% 28.7% 9.5%
Two-/multi-factor (2FA/MFA) authentication 56.8% 31.8% 11.4%
Single sign-on (SSO) 53.6% 33.4% 13.0%
Privileged account/access management (PAM) 52.8% 33.7% 13.5%
User/account provisioning and de-provisioning 52.3% 35.9% 11.8%
Identity-as-a-Service (IDaaS) 50.3% 35.5% 14.2%
Smart cards 46.8% 38.6% 14.6%
Federated identity management (SAML, Oauth) 46.7% 36.0% 17.3%
Biometrics 44.6% 40.9% 14.5%
Table 5: Identity and access management technologies in use and planned for acquisition.
Identity and access management (IAM) is not the most Who says IAM is increasingly important? Well, our data does.
glamorous segment of information security. It involves a number Since our last survey, organizations increased their use of
of cutting-edge technologies, but also a lot of operational, nine out of the 10 technology categories listed in Table 5. The
administrative, and support tasks related to roles, permissions, percentage using two of the categories increased 7.5%, which
account provisioning and deprovioning, password resets, access is more than any technology in any of our other tables. IAM is
controls, etc., etc. not the most glamorous segment of information security, but in
some respects it is getting the most attention.
Yet today, as never before, organizations need to perform these
tasks quickly and accurately, with maximum security but the The use of password management and automated reset, the
least possible annoyance to users and minimum disruption to most widely deployed IAM technology, increased by 7.5% year
business processes. That’s because more and more business over year, to 62.1%. It automates a very basic set of tasks, but
is being done with web and mobile applications, which provides a big payoff in both user satisfaction and time savings
lead employees and customers to expect consumer-level for IT support staff and administrators.
convenience, but in an environment where nobody can be
trusted to be who they say they are (hence “zero trust” practices).
2022 2019
41.1%
Monitoring/managing SIEM platforms
17.8%
39.1%
Monitoring/managing web application firewalls (WAFs)
13.1%
37.5%
Monitoring/managing secure web/email gateways (SWG/SEG)
20.5%
36.8%
Monitoring/managing firewalls or UTMs
30.2%
36.6%
Mitigating distributed denial of service (DDoS) attacks
37.5%
33.3%
Managing vulnerability scans
38.3%
We have observed a trend toward greater use of managed compare the results with those from the 2019 report. Figure 38
security service providers (MSSPs), driven primarily by the shows responses of organizations that outsource at least one
shortage of skilled IT security staff. If you can’t hire enough task to an MSSP, and Figure 39 shows how many organizations
experienced security professionals, why not outsource routine, were not using an MSSP at all in those two years.
repetitive tasks? Or activities that require special skills that are in
As we can see from Figure 39, only 10% of organizations didn’t
short supply? Or jobs that someone else has figured out how to
work at all with an MSSP in 2019, and that figure was even lower
automate?
in 2022: 6.8%. In the big picture that isn’t much of a difference.
Hmm. What are enterprises using MSSPs for? We asked that
But Figure 38 shows that many of the security teams that were
question in older editions of the Cyberthreat Defense Report,
using MSSPs for one or two tasks in 2019 are now working with
then dropped it for a few years. We decided to ask again and
them on three or more.
10.0% 6.8% Why the dramatic upswing in the use of MSSPs for all of these
Organizations monitoring and managing tasks? It is partly attributable
NOT working 93.2% to the fact that these are very labor-intensive activities,
with an MSSP 90.0%
particularly when they involve filtering and prioritizing alerts.
Organizations would like to free up their security professionals
for more-strategic jobs. Another major factor is that MSSPs have
Organizations achieved a high level of automation of these tasks, so they can
working with provide these services very economically to their clients.
an MSSP
However, our data included one surprise. The conventional
wisdom is that MSSPs are more popular with small organizations
that can’t fill their staff with security specialists. However, as
shown in Figure 40, 87.4% of small organizations (500-999
2019 2022 employees) use an MSSP, and 92.7% of medium-sized ones
(1,000-4,999 employees), but large and very large enterprises
Figure 39: Percentage of organizations not working with an MSSP employ MSSPs even more often (94.3% or higher). Evidently,
in 2019 and 2022.
even very large security groups want to save money and free up
their expert personnel for strategic projects.
Retail 42.1%
Manufacturing 40.3%
“These days, smart IT security teams are
turning to cloud-based security solutions Telecom & Technology 37.3%
like never before.”
Education 30.6%
Government 30.4%
Many organizations are investing in application security. You can The most popular practice is security training for application
prevent a lot of data breaches if you can build good security into developers, provided by 63.0% of the organizations surveyed.
an application and catch security-related defects before it is put Traditionally, coders focused on functionality and did not
into production. have the knowledge or incentive to address security issues.
Security training encourages development teams to follow
But what exactly are organizations doing to enhance application
security best practices for architecting applications (e.g.,
security? We added this question to the survey so you could find
segmenting application components and controlling access
out what your peers are doing (see Figure 44).
between them), coding (e.g., validating user input and using
parameterized queries to block injection attacks), adding
risk-based authentication, encrypting data at rest and in motion,
and other areas where security can be built into the application.
Figure 45: Technologies and architectures to enable secure work from home.
According to a recent blog post by the Gallup polling and If everyone’s wish is granted, something like 54 million U.S.
analytics firm (Bet on It: 37% of Desks Will Be Empty), of the 60 workers will need to be able to work securely from home at least
million Americans who could potentially work from home: one day a week, even after the COVID-19 pandemic subsides. If
you add in similar figures for other countries around the world
30% would prefer to never come into the office during the
you get… a really, really big number.
week.
We added a question to this year’s survey about what
60% want a blend of working one to four days per week at
technologies and architectures enterprises are deploying to cope
home.
with this imperative (see Figure 45).
10% prefer working all five days in the office.
The top two responses, each selected by about half the Secure access service edge (SASE) architectures and ZTNA
respondents, were those steady workhorses, anti-virus and frameworks are seen as helping to protect remote employees in
endpoint security software (51.9%) and virtual private network 39.5% and 34.5% of organizations. We will be discussing them
(VPN) technology (49.7%). Anti-virus and various flavors of more (along with SD-WANs) on page 54.
endpoint detection and response solutions are still considered
key elements in a defense-in-depth strategy, and are likely to
retain that status well into the future. However, we think the use
of VPNs may fall off in coming years as organizations adopt a “Something like 54 million workers in the
variety of alternative network encryption methods that are easier
USA will need to be able to work securely
to manage.
from home at least one day a week... If you
Software-defined wide area networks (SD-WANs) are used by
add in similar figures for other countries
43.5% of organizations to help protect home workers. Besides
ensuring that network traffic from remote locations travels around the world you get… a really, really
over encrypted channels, many SD-WAN products contribute big number.”
to security with built-in firewall, intrusion detection, and
anti-malware features.
81.9%
Software-defined wide area
network (SD-WAN) 54.9% 27.0% 11.5% 6.6%
78.6%
Hardware-based/firmware security 49.5% 29.1% 14.4% 6.9%
77.0%
Zero trust network access (ZTNA) 36.5% 40.5% 14.7% 8.2%
73.0%
Passwordless authentication 39.9% 33.1% 14.5% 12.5%
72.9%
Secure access service edge (SASE) 40.7% 32.2% 18.8% 8.3%
72.9%
Extended detection and
response (XDR) 37.3% 35.6% 15.8% 11.3%
Figure 46: Plans for implementing emerging IT security technologies and architectures.
The final topic in this 2022 edition of the Cyberthreat Defense and expensive MPLS circuits with simple broadband connections
Report is a look at deployment plans for six emerging technologies to the internet. Besides cutting networking costs, they
and architectural approaches to security (see Figure 46). dynamically route high-priority traffic to faster links and provide
higher levels of redundancy. To strengthen security, they encrypt
The technology at the top of the list for “currently in production”
network traffic and sometimes enforce firewall and intrusion
plus “implementation in progress” is software-defined wide
prevention rules. With all these advantages, it is not surprising
area network (SD-WAN). SD-WAN products allow enterprises to
that SD-WANs are in production or being implemented in four
replace dozens or hundreds of individually configured routers
out of five organizations (81.9%).
Russia, Ukraine, Cyberwar, and Cyber be launched during cyberwarfare. There will also be more
Preparedness scrutiny of unglamorous but essential processes like backup and
recovery, vulnerability scanning, and identity management.
These paragraphs are being written during the first weeks of
Russia’s invasion of Ukraine. So far, cyberwarfare, including We also expect heightened interest in threat intelligence relative
attacks on Ukrainian government agencies and banking to state-controlled hacker groups. Many organizations that
institutions and the dissemination of data-wiping malware, have been focusing on blocking cybercriminals with financial
have played a relatively minor role in the conflict. While it is motivations will need to put more emphasis on bad actors
impossible at this point to know how the invasion will end or the working toward military and political goals. There will be a
part cyberattacks will play, we can make a few predictions about premium on up-to-date information about the TTPs of groups
the effect it will have on security teams and the cybersecurity who might conduct cyberwars.
industry.
Similarly, cybersecurity vendors will want to recalibrate their
The invasion is ringing alarm bells across the world, not because products and services toward thwarting the attacks expected in
we have learned anything new about the damage cyberwarfare cyberwarfare. Cybercriminals and cyberwarriors use many of the
can cause, but because we have been forced to reassess the same tools, but their targets, techniques, and objectives differ. It
likelihood that cyberwarfare will be used in future conflicts. A is still vital to protect personal data and credit card information,
few weeks ago, it seemed unthinkable that a nation like Russia but there are going to be a lot of market opportunities in
would launch a brutal, unprovoked invasion of a neighbor, with the near future for defending trains, planes, container ships,
cyberattacks as one component. Today, how can we believe that pipelines, factories, medical equipment, GPS systems, self-driving
future adversaries will hold back from unleashing one of the vehicles, media outlets, and first responder and emergency
most powerful weapons in their arsenal, especially if they have response systems.
fewer conventional arms than Russia?
that many of the effects of COVID-19 on the workplace are not example, national governments have been implementing plans
going to be reversed. As mentioned on page 52, in a recent to harden security for agencies, expand police powers and
Gallup survey, 90% of American workers want to continue to increase criminal penalties, create new cybersecurity standards
work at least one day a week at home (of which 30% prefer for businesses, prevent funds (primarily ransoms in the form
full-time WFH). And consumers are going to keep shopping, of cryptocurrencies) from reaching attackers, and mandate
studying, sightseeing, and schmoozing in pajamas (at least information sharing among private, public, and law enforcement
below the waist). organizations. Examples include the US government’s Executive
Order on Improving the Nation’s Cybersecurity, the Australian
We are expecting many of the technologies and programs
government’s Ransomware Action Plan, and the international
initiated or accelerated because of the pandemic to stay on the
Counter Ransomware Initiative.
front burner. These include:
Equally important, law enforcement agencies have finally begun
Enhancing security and ease of use for remote workers by
to take direct action against the bad actors. Notably, Russia’s
applying ZTNA concepts
FSB conducted a round-up of members of the REvil ransomware
Increasing the security of BYOD programs and mobile apps gang, and Europol has helped facilitate arrests in Ukraine,
Improving visibility and security of applications, data, and
Romania, Kuwait, and other countries.
identities housed on cloud platforms These are just the first steps, but they are significant. Until
Combining security and network management by recently, participants in the ransomware industry were
implementing SD-WANs and SASE architectures essentially immune from punishment. Now, they must take into
account a serious possibility that they might be arrested and
Building security into web and mobile apps through
prosecuted. Also, CEOs and boards of directors of enterprises of
DevSecOps practices and security training for developers all sizes and in all industries are putting direct pressure on their IT
Increasing the security awareness of employees and other security teams to do everything possible to thwart ransomware
end users so they are less susceptible to phishing, social attacks. In addition, security solution vendors are gearing up to
engineering, BEC, and ransomware attacks deliver technologies that will help.
Suppliers, contractors, and other third parties could be But we predict that security groups will also try creative new
hacked or bribed into giving up credentials that attackers can ideas. Redefine security jobs to make them more attractive?
use to access an organization’s applications and data. Make better use of part-time employees and freelancers for
specific tasks? Recruit and train candidates from overlooked
Equipment and software from third parties might contain
groups? Run apprenticeship programs with local schools and
vulnerabilities that can be used to penetrate networks.
colleges? Crowdsource good ideas? Recruit gamers with VR
Third-party scripts that run in browsers could be cybersecurity games and simulations?
compromised and allow threat actors to capture credentials
and data from customers and employees. We don’t know what will succeed, but we think if some of the
really smart people in cybersecurity put their minds to it, we can
The second bullet is undoubtedly the most visible of those issues put a dent in this serious problem.
now, because of the vulnerabilities in the Apache Log4j software
and recent memories of the backdoor in SolarWinds software.
Communicating Security Issues to
For this and other reasons, we think that in the near future,
organizations will expend significantly more effort monitoring
Management and Boards
and managing third-party risks. As we mentioned on page 43, this year we added a response
about cyber risk management and reporting to our question
For the IT Skills Shortage, Necessity Can Be about security management and operations technologies – and
the Mother of Invention found that it is already the second-most popular item on our list.
As we noted on pages 15 and 24 and elsewhere in this report, a There is no doubt that CEOs and boards of directors are giving
shortage of skilled IT security professionals is a serious problem unprecedented attention to IT security issues. That means that
for almost every organization and the biggest single impediment IT management and security teams are under pressure to do a
to improving the performance of security teams. This shortage better job of explaining their work, aligning security programs
has been getting worse, and it is increasingly clear that supply with business objectives, and justifying investments in people
may not catch up to demand in our lifetimes. and technology in terms of benefits to the business (not just
by the number of vulnerabilities fixed or the indicators of
But as Plato said in The Republic: “our need will be the real compromise detected).
creator” (later loosely translated as “necessity is the mother of
invention”). When the need is pressing, people find answers. We We think IT organizations are going to demand more, better, and
have discussed several in this report: easier ways to collect security data and present it to executives
and boards in the context of business issues, and where possible,
Training new security professionals and upgrading the skills
quantify risk reduction. And we expect security solutions vendors
of existing ones to respond by improving management reporting capabilities
Outsourcing selected security tasks to MSSPs in existing security products and by delivering new solutions
and services aimed specifically at compiling and presenting
Automating security tasks so experts can focus on
risk-based data to help manage security programs.
more-strategic work
More Innovative Technologies Tools for hybrid cloud and multi-cloud environments
will be a growth area. On page 28 we discussed security
Here are other innovative concepts and technologies that we
challenges facing organizations that have spread computing
expect to hear more about in 2022 and beyond:
workloads over multiple data centers and private and public
API gateway and protection products help organizations clouds. These challenges are going to become more pressing.
protect applications designed with microservices and As security vendors respond, we will see more products that
cloud-native architectures (see page 40). API gateways sit in offer “single pane of glass” monitoring and unified policy
front of application APIs and perform tasks such as enforcing enforcement across all (or at least most) of the popular data
authorization and encryption policies, scaling resources when center and cloud platforms.
traffic spikes, rate limiting to mitigate DDoS attacks and other Better security for operational technology (OT) and the
forms of abuse, and sending usage data to billing systems.
Internet of Things (IoT) is desperately needed to protect
API protection solutions provide security teams with tools to
utilities, critical infrastructure, and manufacturing plants,
understand, detect, and respond to attacks targeting APIs.
as well as emerging applications for smart devices, from
Their capabilities can include mapping the attack surface
cybercriminals, ransomware gangs, and hackers sponsored by
to create an inventory of legitimate, rogue, and forgotten
hostile militaries. As we discussed on page 12, governments
(“zombie”) APIs, blocking injection attacks and other exploits,
have started to pay more attention to this, and even to fund
analyzing attacker behaviors, and fingerprinting attackers so
research and development, and we expect to see progress
they can be tracked even when they change IP addresses. API
over the next couple of years.
protection solutions can also help security teams correlate
and analyze data across multiple data centers and cloud Deepfake detection technology is still in its early phases,
platforms. In the future, more threat actors are going to be but will become very important as threat actors master
targeting APIs with more sophisticated attacks, which will sophisticated techniques for creating convincing deepfakes:
make API gateways and API protection products increasingly images and recordings digitally altered to present a known
essential for well-rounded security programs. person doing or saying something they did not do or say.
Deepfakes have already been involved in a small number
Hardware- and firmware-based security solutions
of BEC attacks (e.g., phone calls supposedly from the CEO
prevent rootkits and other types of malware from
ordering a subordinate to transfer money to a phony
corrupting operating systems and firmware and from
supplier). Unfortunately, there are numerous opportunities
capturing encryption keys. They can play a part in thwarting
for deepfakes to enhance phishing and misinformation
ransomware attacks and detecting vulnerabilities and
campaigns, attacks on brands, and many other malicious
misconfigurations in unmanaged BYOD devices and in
activities.
systems acquired from third parties.
This year’s report is based on survey results obtained from 1,200 America, the Middle East, and Africa). Each participant has an IT
qualified participants hailing from 17 countries (see Figure 47) security job role (see Figure 48). This year, 51% of our respondents
across six major regions (North America, Europe, Asia Pacific, Latin held CIO, CISO, or other IT security executive positions.
Colombia Germany
2.8% 6.3%
Mexico 2.8%
Brazil 2.8% 6.3% France
This study addresses perceptions and insights from research More than 25,000
participants employed by commercial and government 500 – 999
9.5%
organizations with 500 to 25,000+ employees (see Figure 49). 10,000 – 25,000 18.2%
A total of 19 industries (plus “Other”) are represented in this 12.5%
year’s study (see Figure 50). The “big 7” industries – education,
finance, government, healthcare, manufacturing, retail, and
telecom and technology – accounted for nearly two-thirds of all
respondents. No single industry accounted for more than 15.1% 21.6%
5,000 – 9,999 38.3%
of participants.
1,000 – 4,999
15.1%
Finance & Financial Services
15.0%
Telecom and Technology
15.0%
Manufacturing
8.2%
Retail & Consumer Durables
7.8%
Construction and Machinery
6.4%
Healthcare
6.3%
Other
4.1%
Business Support & Logistics
4.1%
Government
3.8%
Education
3.3%
Utilities, Energy, and Extraction
2.8%
Insurance
2.0%
Automotive
1.8%
Real Estate
1.4%
Advertising & Marketing
0.8%
Airlines & Aerospace
0.7%
Food & Beverages
0.6%
Entertainment & Leisure
0.6%
Agriculture
0.3%
Nonprofit
CyberEdge developed a 27-question, web-based, vendor- Constructing survey questions in a way that eliminates survey
agnostic survey instrument in partnership with our research bias and minimizes the potential for survey fatigue
sponsors. The survey was promoted via email to 1,200 IT security
Only accepting completed surveys after the respondent has
professionals in 17 countries and 19 industries in November
provided answers to all of the survey questions
2021. The global survey margin of error for this research study (at
a standard 95% confidence level) is +/- 3%. All results pertaining Ensuring that respondents view the survey in their native
to individual countries and industries should be viewed as language (e.g., English, German, French, Spanish, Japanese,
anecdotal, as their sample sizes are much smaller. CyberEdge Chinese)
recommends making actionable decisions based on global data Randomizing survey responses, when possible, to prevent
only. order bias
All respondents had to meet two filter criteria: (1) they had to Adding “Don’t know” (or comparable) responses, when
have an IT security role and (2) they had to be employed by a possible, so respondents aren’t forced to guess at questions
commercial or government organization with a minimum of 500 they don’t know the answer to
global employees.
Eliminating responses from “speeders” who complete the
At CyberEdge, survey data quality is paramount. CyberEdge survey in a fraction of the median completion time
goes to extraordinary lengths to ensure its survey data is of the
Eliminating responses from “cheaters” who apply consistent
highest caliber by following these industry best practices:
patterns to their responses (e.g., A,A,A,A and A,B,C,D,A,B,C,D)
Ensuring that the “right” people are being surveyed by
Ensuring the online survey is fully tested and easy to use on
(politely) exiting respondents from the survey who don’t computers, tablets, and smartphones
meet the respondent filter criteria of the survey (e.g., job role,
job seniority, company size, industry) CyberEdge would like to thank our research sponsors for making
this annual research study possible and for sharing their IT
Ensuring that disqualified respondents (who do not meet
security knowledge and perspectives with us.
respondent filter criteria) cannot restart the survey (from the
same IP address) in an attempt to obtain the survey incentive
CyberEdge is grateful for its Platinum, Gold, and Silver sponsors, for without them this report would not be possible.
Platinum Sponsors
(ISC)2 | www.isc2.org Menlo Security | www.menlosecurity.com
(ISC)² is an international nonprofit membership association Menlo Security enables organizations to outsmart threats,
focused on inspiring a safe and secure cyber world. Best known completely eliminating attacks and fully protecting productivity
for the acclaimed Certified Information Systems Security with a one-of-a-kind, isolation-powered cloud security platform.
Professional (CISSP®) certification, (ISC)² offers a portfolio of It’s the only solution to deliver on the promise of cloud
credentials that are part of a holistic, programmatic approach to security—by providing the most secure zero-trust approach to
security. Our membership, more than 160,000 strong, is made preventing malicious attacks; by making security invisible to end
up of certified cyber, information, software and infrastructure users while they work online; and by removing the operational
security professionals who are making a difference and burden for security teams. Now organizations can offer a safe
helping to advance the industry. Our vision is supported by online experience, empowering users to work without worry
our commitment to educate and reach the public through while they keep the business moving forward.
our charitable foundation – The Center for Cyber Safety and
Education. PerimeterX | www.perimeterx.com
PerimeterX is the leading provider of solutions that detect and
Gigamon | www.gigamon.com stop the abuse of identity and account information on the web.
Gigamon helps the world’s leading organizations run fast, stay Its cloud-native solutions detect risks to your web applications
secure and innovate. We provide the industry’s first elastic and proactively manage them, freeing you to focus on growth
visibility and analytics fabric, which closes the cloud visibility and innovation. The world’s largest and most reputable websites
gap by enabling cloud tools to see the network and network and mobile applications count on PerimeterX to safeguard their
tools to see the cloud. With visibility across their entire hybrid consumers’ digital experience while disrupting the lifecycle of
cloud network, organizations can improve customer experience, web attacks.
eliminate security blind spots, and reduce cost and complexity.
Gigamon has been awarded over 125 technology patents and ThreatX | www.threatx.com
enjoys world-class customer satisfaction with more than 4,000 ThreatX’s API protection platform makes the world safer by
organizations, including over 80 percent of the Fortune 100 protecting APIs from all threats, including DDoS attempts,
and hundreds of government and educational organizations BOT attacks, API abuse, exploitations of known vulnerabilities,
worldwide. and zero-day attacks. Its multi-layered detection capabilities
accurately identify malicious actors and dynamically initiate
Imperva | www.imperva.com/ appropriate action. ThreatX effectively and efficiently protects
Imperva is a cybersecurity leader with a mission to protect data APIs for companies in every industry across the globe.
and all paths to it. We protect the data of over 6,000 global
customers from cyber attacks through all stages of their digital
transformation. Our products are informed by the Imperva
Research Lab, a global threat intelligence community, that feeds
the latest security and compliance expertise into our solutions.
Gold Sponsors
Aqua Security | www.aquasec.com code, and cloud infrastructure to help reduce risk, ensure compliance
and simplify security. Delinea removes complexity and defines the
Aqua Security is the largest pure-play cloud native security company,
boundaries of access for thousands of customers worldwide, including
providing customers the freedom to innovate and accelerate their
over half of the Fortune 100. Our customers range from small businesses
digital transformations. The Aqua Platform is the leading Cloud Native
to the world’s largest financial institutions, intelligence agencies, and
Application Protection Platform (CNAPP) and provides prevention,
critical infrastructure companies.
detection, and response automation across the entire application
lifecycle to secure the supply chain, secure cloud infrastructure and
LookingGlass | www.lookingglasscyber.com
secure running workloads wherever they are deployed. Aqua customers
are among the world’s largest enterprises in financial services, software, LookingGlass Cyber Solutions develops cybersecurity solutions that
media, manufacturing and retail, with implementations across a broad empower organizations to meet their missions and reduce cyber risk
range of cloud providers and modern technology stacks spanning with a comprehensive view of their attack surface – outside-in and
containers, serverless functions and cloud VMs. inside-out – layered with actionable threat intelligence. By linking
the risks and vulnerabilities from an organization’s attack surface to
Attivo Networks | www.attivonetwork.com customized threat actor models, LookingGlass Cyber Solutions provides
a more accurate view of cyber risk and enables systematic definition and
Attivo Networks, the leader in identity detection and response,
deployment of mitigations to defend against the threats that matter.
delivers a superior defense for preventing privilege escalation and
lateral movement threat activity. Customers worldwide rely on the
Netsurion | www.netsurion.com
ThreatDefend Platform for unprecedented visibility to risks, attack
surface reduction, and attack detection. The portfolio provides patented Flexibility and security within the IT environment are two of the
innovative defenses at critical points of attack, including at endpoints, most important factors driving business today. Netsurion’s managed
in Active Directory, and cloud environments. Attivo has 180 awards for cybersecurity platforms enable companies to deliver on both. Netsurion
technology innovation and leadership. Managed Threat Protection combines our ISO-certified security
operations center (SOC) with our own award-winning cybersecurity
ConnectWise | www.connectwise.com platform to better predict, prevent, detect, and respond to threats
against your business. Whether you need technology with a guiding
ConnectWise is an IT software company that empowers Technology
hand or a complete outsourcing solution, Netsurion has the model to
Solution Providers to achieve success in their As-a-Service business
help drive your business forward.
with intelligent software, expert services, an immersive IT community,
and a vast ecosystem of integrations. The unmatched flexibility of
PhishLabs | www.phishlabs.com
the ConnectWise platform fuels profitable, long-term growth for our
Partners. With an innovative, integrated, and security-centric platform, PhishLabs by HelpSystems is a cyber threat intelligence company that
ConnectWise enables TSPs to drive business efficiency with business delivers Digital Risk Protection through curated threat intelligence and
automation, IT documentation, and data management capabilities. complete mitigation. Specialized teams use threat-specific technology
And increase revenue using remote monitoring, security, and backup and operations to safeguard critical digital assets and protect against
disaster recovery technologies. brand impersonation, account takeover, social media, data leakage, and
advanced email threats across the digital landscape. Developed over a
Delinea | www.delinea.com decade in partnership with the world’s leading brands and companies,
the PhishLabs Platform is the foundation of our Digital Risk Protection
Delinea is a leading provider of privileged access management (PAM)
solution, providing comprehensive collection, expert curation, and
solutions that make security seamless for the modern, hybrid enterprise.
complete mitigation of digital risks.
Our solutions empower organizations to secure critical data, devices,
Silver Sponsors
Agari | www.agari.com patches firmware at scale, and prevents firmware-level ransomware and
implants from crippling your organization. Eclypsium serves Global 2000
Agari protects brands, customers and employees from devastating
enterprises and federal agencies, was named a Gartner Cool Vendor, and
phishing and socially engineered attacks. Using an identity-centric
is one of Fast Company’s 10 Most Innovative Security Companies.
approach that uniquely learns sender-receiver behavior, Agari builds
a model of trust that protects the workforce from inbound business
Netwrix | www.netwrix.com
email compromise, supply chain fraud, spear phishing, and account
takeover-based attacks, reducing business risk. Agari also prevents Netwrix makes data security easy thereby simplifying how professionals
spoofing of outbound email from the enterprise to customers, can control sensitive, regulated and business-critical data, regardless
increasing deliverability and preserving brand integrity. With Agari you of where it resides. More than 10,000 organizations worldwide rely on
can restore trust to your inbox. Netwrix solutions to secure sensitive data, pass compliance audits with
less effort and expense, and increase the productivity of IT and security
Binary Defense | www.binarydefense.com teams. Founded in 2006, Netwrix has earned more than 150 industry
awards and been named to both the Inc. 5000 and Deloitte Technology
Binary Defense is a managed security services provider and software
Fast 500 lists of the fastest growing companies in the U.S.
developer with proprietary cybersecurity solutions that include
SOC-as-a-Service, Managed Detection & Response, Security Information
SailPoint | www.sailpoint.com
& Event Management, Counterintelligence and Threat Hunting. Binary
Defense uses a human-driven, technology-assisted approach to provide SailPoint is the leader in identity security for the modern enterprise.
their clients with immediate protection and visibility, combating At the core of SailPoint Identity Security is artificial intelligence and
and stopping the next generation of attacks that their business machine learning. A foundation that protects organizations against
faces. Recognized as a “Leader” on The Forrester Wave: Managed cyber threats by automating the discovery, management, and control
Detection and Response, Q1 2021 report, the Ohio-based organization of ALL user access. SailPoint ensures that each identity, human or
earned high marks for threat hunting and threat intelligence. Visit nonhuman, has the right access needed to do their job – no more,
BinaryDefense.com/Forrester to learn more. no less. We meet customers where they are with an intelligent
identity solution that matches the scale, velocity and environmental
Drawbridge | www.drawbridgeco.com needs of your business. Trusted by the world’s largest, most complex
organizations.
Drawbridge is a specialized technology firm providing comprehensive
cybersecurity solutions to the financial services and alternative
Telos | www.telos.com
investment communities. Drawbridge’s unique all-in-one platform and
tech-enabled professional services provide firms with foundational, Telos Corporation empowers and protects the world’s most security-
turnkey solutions that scale as their businesses evolve. With over 800 conscious organizations with solutions for cyber, cloud, and enterprise
clients, Drawbridge has quickly become the leading provider among security. Telos’ offerings include cybersecurity solutions for IT risk
private equity firms, hedge funds, and venture capital firms. management and information security; cloud security solutions to
protect cloud-based assets and enable continuous compliance with
Eclypsium | www.eclypsium.com security standards; and enterprise security solutions for identity and
access management, secure mobility, organizational messaging, and
Eclypsium is the firmware security company. Eclypsium’s SaaS platform
network management and defense. We serve organizations in financial
identifies, verifies and fortifies firmware throughout networks and
services, healthcare, state and local government, education, and other
technology supply chains, from endpoints and servers to network
highly regulated sectors; military, civilian and intelligence of the U.S.
gear and connected devices. Eclypsium secures networks against
federal government, and allied nations around the world.
stealthy firmware attacks, provides continuous firmware monitoring,
Founded in 2012, CyberEdge Group is the largest research, marketing, and publishing firm to serve the IT security vendor
community. Today, approximately one in six IT security vendors (with $10 million or more in annual revenue) is a CyberEdge client.
CyberEdge’s highly acclaimed Cyberthreat Defense Report (CDR) and other single- and multi-sponsor survey reports have
garnered numerous awards and have been featured by business and technology publications alike, including The Wall Street
Journal, Forbes, Fortune, USA Today, NBC News, ABC News, SC Magazine, DarkReading, and CISO Magazine.
CyberEdge has cultivated its reputation for delivering the highest-quality survey reports, analyst reports, white papers, and
custom books and eBooks in the IT security industry. Our highly experienced, award-winning consultants have in-depth subject
matter expertise in dozens of IT security technologies, including:
Extended Detection & Response (XDR) Security Information & Event Management (SIEM)
Managed Security Services Providers (MSSPs) Threat Intelligence Platforms (TIPS) & Services
Mobile Application Management (MAM) User and Entity Behavior Analytics (UEBA)
The following rules apply to referencing textual and/or graphical elements of this report:
1. Report distribution. Only CyberEdge and its authorized 4. Figures and tables. Figures and tables extracted from this
research sponsors are permitted to distribute this report for report must not be modified in any way. Artwork for figures
commercial purposes. However, organizations are permitted and tables for the most recent Cyberthreat Defense Report are
to leverage the report for internal uses, including training. available for download at no charge on the CyberEdge website
at https://www.cyber-edge.com/cdr.
2. Source citations. When citing a textual and/or graphical
element from this report, you must incorporate the following 5. No implied endorsements. CyberEdge does not endorse
statement into a corresponding footnote or citation: “Source: technology vendors. Cited CyberEdge content should never
2022 Cyberthreat Defense Report, CyberEdge Group, LLC.” be used to imply favor from CyberEdge.
3. Quotes and excerpts. Quotes and excerpts extracted from If you have questions about this policy or would like to incorporate
this report must not be modified in any way. Rephrasing is content from this report in a manner not addressed by this policy,
not permitted. submit an email to [email protected].
Copyright © 2022, CyberEdge Group, LLC. All rights reserved. The CyberEdge Group name and logo are the property of CyberEdge Group, LLC.
2022 CyberthreatAllDefense Report
other company names, trademarks, and service marks are the property of their respective owners. Version 1.0 67