CISCO - Cybersecurity Readiness Index Report
CISCO - Cybersecurity Readiness Index Report
Readiness Index
Resilience in a Hybrid World
March 2023
Contents Executive Summary 3
Benchmarking Readiness 6
Protecting Identity 8
Protecting Devices 10
Protecting Networks 12
Protecting Data 16
Conclusion20
In a post COVID world, the requirements of cybersecurity While there is broad consensus that the move to hybrid
have changed as the landscape for businesses has is here to stay, its long-term success hinges greatly on
been spun on its head. Organizations have moved from organizations’ ability to safeguard themselves against new
an operating model that was largely static – where and rapidly evolving threats.
people operated from single devices from one location,
connecting to a static network – to a hybrid world in which Set against this, we wanted to understand how ready
we increasingly operate from multiple devices in multiple organizations around the world are to meet these modern
locations, connecting to multiple networks. security challenges. To do this, we developed the Cisco
Cybersecurity Readiness Index. It categorizes companies
into four stages of readiness: from Beginner, to Formative,
Progressive, and finally Mature, based on their preparedness
across five key pillars and the state of deployment of 19
A mere 15% of organizations
security solutions within those. More details on the scoring
globally are deemed to have a methodology can be found in the following section.
mature level of preparedness
The Global Cybersecurity Readiness Gap
to handle the security risks of
our hybrid world. The results are stark: according to the index, a mere 15%
of organizations globally are deemed to have a mature
Thailand 27%
Brazil 26%
While most of us are broadly aware of the increased We asked respondents whether their companies had
security risks brought about by the move to hybrid solutions in place to meet the challenges of each pillar, and
working, what isn’t widely understood is how ready how far along they were towards full deployment.
organizations are to face those risks.
The data was then organized and categorized into a
Cisco’s Cybersecurity Readiness Index is a new way of state of readiness, where respondents were ranked from
assessing how ready businesses are. Beginner, to Formative, Progressive, and finally Mature
based on the weighted scores of each pillar reflecting their
It is sourced from a double-blind survey of 6,700 private importance: network (25%); identity (20%); devices (20%);
sector cybersecurity leaders in 27 global markets. The data (20%); and application workloads (15%).
index is based on five pillars: Identity, Devices, Network,
Application Workloads, and Data. From within those pillars, A fuller explanation of the methodology can be found at
we examined 19 different solutions required to address them. the end of this report.
Only 15% fall into the Mature category, with a high level of
Nearly half of our
readiness. Less than one in ten (8%) are in the Beginner
respondents (47%) and their category, representing the first step on the readiness ladder.
organizations fall into the
This report represents the first study of its kind and
Formative category, where
provides a comprehensive cybersecurity readiness
they have taken some of the assessment for companies across 27 markets globally.
much-needed steps to protect
themselves but cannot be
Overall cybersecurity readiness of organizations globally
classified as ready to meet the
challenges of our new Mature 15%
hybrid world. Progressive 30%
Formative 47%
Beginner 8%
Traditionally, cybersecurity operations focus on creating moved to remote and hybrid work arrangements, many
a strong perimeter to keep out threats. The assumption have started to add a second layer of verification. These
being that anyone who was ‘inside the wire’ was are Integrated Identity and Access Management (IAM)
authorized to be there. However, in the hybrid working solutions, such as Multifactor Authentication, where even
model, data can be spread across limitless services, when a user enters the right username and password
devices, applications, and users, making traditional combination, they are then given a second prompt to
perimeter approaches inadequate. prove that they are who they say they are.
This calls for a new security strategy where no-one and Given that identity management is ranked by our
nothing is trusted until their identity has been proactively respondents as the number one risk, it is no surprise that
verified. Our research underlines the challenge: a quarter 95% have implemented some kind of identity management
(24%) of all respondents ranked Identity Management as solution, with IAM proving most popular, with two-thirds
the number one risk for cyberattacks. saying they have deployed these solutions.
For years, companies have relied on identity management Some companies are adding yet another layer of security
solutions like Data Stores, which are a storage of things to identity management – Privileged Access Management.
like identity of a person, their username, and their This is where, even after the first two layers of identity
password. A person uses these to login, and if they match, verification, access is granted based on pre-assigned
they are granted entry. However, as companies have privileges, such as the user’s role within the company, the
Mature 20%
Progressive 22%
Formative 38%
Beginner 20%
Long gone are the days when employees accessed a For our respondents, protecting devices ranks third
corporate network from a single desktop PC. The need out of five in their list of risk potential, behind identity
to access data on the move and in a variety of forms has management and the network itself. It also seems to be
created an explosion in the number of devices employees less challenging for most with it ranking third on their list
use. The pandemic has also added to the list of devices for difficulty.
we all use regularly with cameras and microphones,
for example, helping make video conferencing a better Three quarters (73%) of our respondents have chosen
experience. to use enhanced anti-virus solutions as their key
solution to protect devices. Building protections into the
However, employee devices are not the only things operating system, such as host controls, is another way
accessing networks and data. Everything from soil organizations are protecting their devices, with 65%
moisture detectors to plant machinery, and even door saying they have deployed this type of solution. Endpoint
security systems are connected to corporate networks, protection platforms – firewalls, malware, and process
providing important and insightful data. visibility etc. – rank third in the solutions companies have
deployed.
Whatever the device, it needs to be protected. We have
seen significant data breaches in the past originating from However, there are two key trends to take note of. Firstly,
unprotected devices. the scale of deployment is partial. This is why, despite
a high number of respondents saying they have these
Formative 28%
Beginner 28%
Globally, cyberattacks are on the rise. From telecoms to Fortunately, our respondents recognize the risk; network
technology organizations and retailers, attacks have left protection ranks second in the list of their top five priorities.
networks vulnerable to exploitation. The result: billions of
data sets have been exposed across the world. Most have opted to use firewalls with built-in Intrusion
Prevention Systems (IPS). More than two-thirds (69%) of
At the last count, there had been more than 4,000 publicly firms in our survey said they had deployed this capability,
disclosed data breaches in the first three quarters of 2022
1
with network segmentation policies based on identity
alone – a significant increase on the previous year. And ranking number two (61% said they have deployed this),
the likelihood is that this is just the tip of the iceberg – with and Network Behavior Anomaly detection tools close
thousands more data breaches taking place in less well- behind at 60%. Packet Capture and Sensor Tools, though,
known organizations. come a distant fourth at 31%.
Today’s hybrid working environment calls for flexibility not only in However, the issue is that the scale of deployment is not
the number and type of devices that employees use, but also in keeping pace. Of those companies that have firewalls with
where they log in from, and where the data they need to access built-in IPS, only 56% have fully deployed, and only 64%
is stored and processed. The growth of cloud strategies – a of companies have fully deployed network segmentation
bedrock of hybrid working – means that employees need to policies.
be able to roam across multiple networks throughout their day,
1. https://www.cshub.com/attacks/articles/the-biggest-data-breaches-and-leaks-
rendering the network more vulnerable to cyberattacks. of-2022
Mature 19%
Progressive 25%
Formative 46%
Beginner 10%
As we have already seen, the move to hybrid work and that 750 million cloud-native applications will be created
the proliferation of devices has made cybersecurity globally by 20252.
exponentially more complex. This, however, is only part of
the story in our post-COVID world. While this has great benefits, it does present a new layer
of risk for companies. The shift to modern, distributed
Businesses have come to rely heavily on applications, applications can leave organizations more vulnerable due
particularly so over the past couple of years. With to an ever-expanding attack surface. According to latest
the increased expectations that end users now have research by Cisco AppDynamics, 78% of IT professionals
for always-on, secure, and exceptional experiences, globally feel that their organization is vulnerable to a multi-
organizations are under pressure to accelerate their staged security attack that would affect the full application
digital transformation projects. Hundreds of thousands of stack over the next 12 months3.
organizations across the world are building, modernizing,
and deploying all types of business-critical applications Security teams have had to introduce a range of tools to
including traditional/on-premises, as well as modern, their armories to protect against the additional threats
distributed cloud-native solutions. presented in this more dynamic environment.
Deployment of endpoint protection tools is even further In short, it means that while 97% of respondents have
behind with a little over half (57%) fully deployed and 35% rolled out application protection solutions, most are not yet
presently deploying. ready to meet the challenges ahead.
rolled out application protection While Hong Kong and France fare better, they still rank
solutions, most are not yet ready 26th and 25th respectively in terms of readiness to repel
to meet the challenges ahead. attacks on application workloads. 81% of Hong Kong’s
respondents fall into the bottom half of preparedness
while more than seven out of ten (77%) of organizations in
France are low or below average performers.
Mature 12%
Progressive 23%
Formative 51%
Beginner 14%
Billions of datasets were stolen as a result of cybersecurity data or to ensure that they are able to backup and recover
breaches in 2022, according to industry estimates. lost data. More than two-thirds of firms (67%) have chosen
these solutions for this pillar of protection.
For many affected, these hacks are an inconvenience
resulting in wasted time changing personal details, Identification and classification with data leak protection
passwords and so on. For businesses, the impact of is applied by 55% of organizations, while host IPS and
data leaks can be highly significant. Not only do firms protection tools provide a way forward for 41%.
spend significant time on resolving the breach and
enacting disaster recovery plans, but there are also major The good news, bearing in mind the consequences of
implications once the initial crisis is over. Regulators often lost data, is that 94% have either fully or partially
want to understand the full extent of the incident and there deployed encryption tools – which is the number one
can be punitive fines for firms that have not taken the choice of most firms – while 92% have either completed
right steps. Brand reputation can take years to recover for or are on the road to completing the rollout of backup and
firms that have not acted properly to put in place expected recovery tools.
cybersecurity mitigation programmes.
Identification and classification with DLP are a little behind
Our respondents seem to understand these implications on deployment, with just 55% fully deployed, while that
and 98% say their organizations have solutions in place to number is 61% for host IPS and protection tools.
protect data properly. Most have chosen either to encrypt
Mature 22%
Progressive 28%
Formative 28%
Beginner 22%
As we look at the industries that are most ready for the years, and the pressure regulators are applying to keep
challenges ahead, they tend to be dominated by those with financial and personal data safe.
most to lose from cybersecurity incidents, and most to gain
from keeping threats at bay. Healthcare, with the enormous If we look at each of the five pillars of security protection,
challenge of keeping patient records safe, has the third some other industries stand out in their readiness to protect
highest number of organizations in the Mature category specific areas of their operations. Travel Services is the
(18%) while Financial Services comes in second at 19%. most progressed among all industries in the protection
of data, with 26% of organizations in the Mature category
– a necessary step given the large amount of personal
information they process each day for customers taking
Retail comes out top with 21% flights and booking accommodation. It is also the second
of organizations in the Mature most advanced in the protection of devices after Retail,
followed by Manufacturing which comes in third with 35% of
category.
organizations at the Mature stage. This could be attributed to
the large number of IoT devices deployed in these industries.
Retail comes out top with 21% of organizations in Surprisingly, Restaurant Services shows a high level of
the Mature category. This reflects the cybersecurity readiness when it comes to identity management, coming
challenges the industry has seen over the last several in at second place with 25% of organizations at the Mature
employees – that are best prepared with more organizations 4. Small and Medium Enterprises (SME) Finance, World Bank
Those charged with protecting their organizations are respondents (50%) plan to finalize deployments within the
faced with a myriad of new challenges brought about by next 12 months.
the once-in-a-generation effects of the global pandemic.
Despite its immediate effect on the world of work being Protection of devices is the most advanced of all five
largely complete, the effects on IT infrastructure are still pillars, with almost a third of organizations (31%) falling
being felt – and nowhere more so than in the offices of into the highest performing category of readiness. As with
CISOs who are faced with a complex web of problems. identity management and the network, the challenge is
deployment, with more than half (56%) of companies at
In today’s business environment, significant thought and either the Formative or Beginner stage. On the bright side,
effort needs to be given to how to protect identities, though, 88% of organizations that have not yet deployed
devices, network, data, and applications that operate solutions plan to do so within the next two years.
dynamically. The five pillars of security all need to be
protected and they need to work in harmony or else Looking at how organizations protect application
organizations face the risk of presenting a target of workloads, 97% have deployed some kind of solution with
opportunity to bad actors. most opting to use a host software firewall. This pillar is
the least well advanced - nearly two-thirds (64%) fall into
the Formative or Beginner stage of readiness. This means
they are either Beginners (14%) or below average (51%)
The five pillars of security all performers when it comes to readiness to protect an
need to be protected and they organization’s application infrastructure.
Progress is not even across all five pillars. Identity In critical areas, significant steps have been taken to
Management – recognized as the most critical area by secure organizations against cybersecurity threats.
our respondents – still has room for improvement, with However, organizations around the world – and perhaps
close to three in five respondents (58%) finding themselves governments – need to recognize that there is a long way
in either the Formative or Beginner category. Nevertheless, to go. Deployments of some solutions, particularly those
95% are at least at some stage of deployment with a solution. for identity, devices and networks, are not being rolled
out as quickly as they could, leaving some organizations
Efforts to protect the network – a particularly significant vulnerable to attack.
area given it is the backbone of all IT infrastructures
– faces a similar situation with over half (56%) of When the consequences of cyberattack are so clear to
respondents at the lower end of the readiness spectrum. see, readiness must be a priority for all organizations and
That indicates many are in the early stages of deploying deployment of solutions needs to be accelerated.
solutions although the good news is that half of our
The Cybersecurity Readiness Index is sourced from a then derived based on the stage of deployment of various
double-blind survey of 6,700 private sector cybersecurity solutions under each of the five pillars, with partially
leaders. The organizations cover 27 territories in deployed solutions assigned a 50% weighting and fully
North America, Latin America, EMEA and Asia-Pacific: deployed solutions weighted at 100%.
Australia, Brazil, Canada, China, France, Germany, Hong
Kong SAR, India, Indonesia, Italy, Japan, Malaysia, The scores for each pillar were then combined and
Mexico, Netherlands, New Zealand, Philippines, weighted to arrive at an overall cybersecurity readiness
Poland, Singapore, South Africa, South Korea, Spain, score for each organization. The importance of each pillar
Switzerland, Taiwan, Thailand, UK, USA and Vietnam. was weighted as network (25%); identity (20%); devices
(20%); data (20%); and application workloads (15%).
The index is based on five pillars: Identity, Devices,
Network, Application Workloads, and Data. From The respondents are drawn from 18 industries: business
within those pillars, we examined 19 different solutions services; construction; education; engingeering, design,
required to address them. Respondents were asked to architecture; financial services; healthcare; manufacturing;
indicate which of these they had deployed, the stage media & communications; natural resources; personal
of deployment, and if these solutions were not already care & services; real estate; restaurant services;retail;
deployed then what budgets had been approved, and the technology services; transportation; travel services;
intended timeline of deployment. wholesale and ‘others’.
Each solution was assigned an individual weightage The research was carried out between August and
based on its relative importance to helping safeguard the September 2022 using online and telephone interviews.
applicable pillar. The scores for each organization were
Traditional data Built-in protections Network segmentation Host software Encryption tools 10%
stores like AD 30% in the OS such as policies based firewall 15%
AV and host controls 10% on identity 40%
Integrated IAM Anti-virus with some Firewalls with Endpoint protection Identification and
solution 60% enhanced features 20% built-in IPS 25% capabilities 35% classification with DLP 20%
Pillar weightage: 20% Pillar weightage: 20% Pillar weightage: 25% Pillar weightage: 15% Pillar weightage: 20%
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at https://www.cisco.com/go/offices
Cisco and the Cisco logo are trademarks of registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. To use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)