Sophos Future of Cybersecurity Apj 2022 WP
Sophos Future of Cybersecurity Apj 2022 WP
Sophos Future of Cybersecurity Apj 2022 WP
Cybersecurity in
Asia Pacific and Japan
3nd Edition, April 2022
A TRA report sponsored by Sophos
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Changes in Strategy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Cybersecurity Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Strengthening Defences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
In closing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Cybersecurity in Australia. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Cybersecurity in India. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Cybersecurity in Japan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Cybersecurity in Malaysia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Cybersecurity in Singapore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Introduction
Welcome to the 3rd edition of the “The Future of Cybersecurity in Asia Pacific and Japan”. First published in
2019, the reports examine cybersecurity issues confronting businesses throughout the region.
Not confined to attack vectors and vulnerabilities, our report series has always looked beyond cybersecurity
technologies to broader issues such as maturity levels, budgets, awareness, education and training, and
other practical factors shaping how companies manage their cybersecurity environment.
As with previous editions, this year’s report provides a snapshot of business’ views of three key issues:
This year we also expanded our focus to include issues relating to:
Drawn from a survey of 900 cyber and cybersecurity decision makers in Australia, India, Japan, Malaysia,
the Philippines and Singapore, the research revealed a number of key findings:
Ì Maturity ≠ capability. Cybersecurity maturity levels continue to rise yet organisations continue
to struggle with the same issues year on year. Either the self-assessed maturity levels are
too optimistic or there are some serious systemic issues that are yet to be addressed.
Ì Board level education is critical. Only 40% of companies believe their board truly understands
cybersecurity and the top frustration cybersecurity professionals experience is that
the board and executive level assume that the company will never get attacked.
Ì Vendors have a role to play in educating boards and executive teams. 60% of
respondents do not believe cybersecurity vendors fully provide them with the
right information to help educate their boards and executive suites.
Ì Outsourcing or keeping in-house? The approach depends on the need. Strategy development,
data management and compliance, and PII management remain mostly in-house.
Operations such as threat hunting, remediation, incident response and penetration testing
are typically outsourced or follow a blended mix of do-it-yourself and outsourced.
Ì Tomorrow’s top attack vector contents are similar to today, sort of. Phishing, malware,
poorly configured systems, corporate espionage and nation state attacks.
This report comprises three sections – the research findings, individual country insights containing key
data points and considerations from the report sponsor, Sophos.
We sincerely hope the data and commentary provide you with insights as you consider your organisation’s
cybersecurity capabilities and environment.
3. Strengthening Defences
Indeed, the 2022 data shows that 21% of companies surveyed believe themselves to be at the top level of
maturity (‘optimising’), a stark increase from the first edition of this report in 2019 when only 2% felt they
were at that level.
35% 32%
29%
30%
25% 25%
25% 22%
21%
20% 19%
20% 18%
17%
15%
9% 9%
10%
6% 6%
5%
5%
2% 2%
1%
0%
No plan Initial Managed Defined Quantitatively Optimising
Managed
2019 2021 2022
The chart clearly indicates a right shift over time towards higher levels of maturity, however it is interesting
to take a closer look at individual countries, revealing that:
Ì Australia’s profile shows the highest percentage of organisations considered mature (28%)
yet also a relatively high level of those still developing capabilities (31% ‘managed’).
Ì India shows clear progression towards increased maturity with a similar profile to
Australia of ‘optimising’ and ‘managed’, weighted more towards ‘managed’.
Ì Japan’s data reveals that 9% of companies have ‘no plan’ and a further
7% are in the ‘initial’ stage of developing capabilities.
Ì Similar to India, Malaysia shows 31% of companies are at the ‘managed’ level and
has the highest percentage of all countries at the ‘initial’ stage, 10%.
Ì Singapore arguably ranks second in maturity, just behind Australia with 50% of all
respondents ranking themselves as either ‘quantitatively managed’ or ‘optimising’.
30%
25%
20%
15%
10%
5%
0%
Australia India Japan Malaysia Philippines Singapore
It is pleasing to see ongoing improvements in maturity levels. At the same time, we harbour a concern that
companies are too optimistic with their self-assessment and offer two observations in support of this:
1. First, as we will see in the next section, with some respondents, there appears to be a reactionary
tendency to change cybersecurity strategies after a breach or attack, creating an ‘attack, change,
attack, change …’ cycle.
We’re certainly not suggesting cybersecurity strategy and education are ‘do once and forget’ approaches,
yet we are concerned that organisations are doing themselves a disservice by assigning artificially high
levels of maturity and creating a false level of optimism around their capabilities.
34%
Our data also reflects appointing dedicated operational cybersecurity staff is preferred to tasking ‘regular’ IT
staff or other non-security employees with security in addition to their other responsibilities.
Looking at how companies assign responsibilities between inhouse, outsourced or a combination of the
two varies considerably depending on the tasks required. What can be said is that no requirement shows
a majority choice of ‘in-house’ and in many cases a ‘better together’ ethos combining outsourced and in-
house is evidenced.
Broadly speaking, strategy development, education and data management, and compliance are marginally
preferred in-house. Compared to 2021 when we stated – “The majority of organisations continue to
keep most capabilities in-house, and only in a few areas such as penetration testing and training does
outsourcing become a more common approach.” – this in-house preference has decreased in 2022.
Areas relating to defending and recovering from attacks (e.g. penetration testing, incident response, threat
hunting, remediation, etc) show preference for either a directly outsourced or blended approach.
Changes in Strategy
Our last finding within this section considers the reasons for, and frequency of, changes in cyber-security
strategy. Respondents were asked when they last made a significant change in their approach and why.
In contrast to data from 2019 and 2021, 2022 data highlighted that organisations are making more
changes in a shorter time:
When was the last time you made a significant change in your information or cybersecurity approach?
2019-2022
40%
36%
33% 31% 31%
30% 27%
26%
18% 18%
20% 16%
14% 15%
12%
8% 9%
10% 6%
0%
More than 24 12 to 24 6 to 24 months Within last 6 Frequent basis
months ago months ago ago months (every quarter)
The primary factor causing organisations to change their cybersecurity strategy is experiencing an attack
or breach in their own environment or in another organisation.
We also saw this when we asked organisations when they will next review and potentially change their
strategy. 16% said they will make quarterly changes and another 33% said they will make a change in the
coming 4-6 months. Why? Again, due to attacks experienced.
This factor has held the top spot so far in every edition of the research whilst other considerations including
changing overall technology strategy, adoption of a new technology solution, budget issues, digital
transformation programs, the impact of regulator changes, etc have all fluctuated in their importance.
We cannot help but consider if companies are stuck in a cybersecurity spiral: the more attacks, the more
potentially reactionary changes come into play creating a cycle of new threat, new change, new tool, new
threat … and repeat.
Please rate your agreement with the following statement: The biggest challenge to our security in the
next 24 months will be the awareness and education of our employees and leadership
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
No wonder then that we see this issue arise in many of the common frustrations cybersecurity
professionals experience in their roles.
This year our top 5 saw significant upward movement in 4 of the 5 factors and we broadly consider the
majority are related to frustrations around awareness, perception, messaging and education.
1. Wishful thinking or blissful ignorance. ‘Executives assume we’ll never get attacked’. Regardless of
wishful or blissful, the top frustration is a view through rose-tinted glasses that ‘it will never happen to
us’. Until it happens … usually triggering a change in strategy and subsequent disruption.
2. Lack of skilled security specialists. ‘We can’t employ enough skilled security specialists.’ Specialists
can be expensive and keeping the ones you have from being poached, even more so. Yet companies
don’t put enough investment and time into training and educating general employees to support
security capabilities (see #6 in the table).
3. We’re all doomed and going to die (i). ‘There’s too much “fear and doubt” messaging making it hard to
talk about cybersecurity.’ The much-abused fear, uncertainty and doubt (FUD) messaging has regained
its prominence after last year. It’s hard to educate when the audience has their heads out the window
looking for a non-existent meteor.
4. We’re all doomed and going to die (ii). ‘Executives assume our company will get attacked but there’s
nothing we can do to stop it.’ ‘Ah yes, there’s the meteor. We knew it was going to happen. Why didn’t you
stop it? While you’re at it, clean up the mess immediately.’
5. It’s all moving too fast. ‘We can’t keep up with the pace of security threats.’ It’s impossible to keep
across everything that could happen so we’ll do the best we can and revert to #1 on the list.
6. We don’t put enough investment and time into training our general staff 6 6 6
8. The executive team pay lip-service to cybersecurity but don’t truly believe in it 9 5 8
With the exception of lacking skilled security specialists (ranked #2 in the previous table), we’d suggest the
other top 5 factors are addressable through concerted education and awareness programs, starting at the
board and executive level and flowing through to the rest of the organisation.
There’s just one issue with that approach: our data suggests cybersecurity professionals perceive low levels
of security understanding amongst their company’s board.
Approximately only 4 in 10 cybersecurity professionals believe their company board truly understands
cybersecurity. This issue is compounded by our research data that shows 22% of respondent companies
had boards that require monthly or quarterly updates on cybersecurity (and this number is expected to
increase to 26% of boards in 2024).
It is unclear as to what percentage of those boards really understand the issues contrasted with those that
are following a compliance, ‘check-box’ tick philosophy without truly comprehending the issues.
Regardless, there is definitely an educational need to address here. In many instances, companies look to
vendors or a mix of internal resources and vendors to help educate, especially in areas such as strategy,
awareness and training.
Our data suggests that whilst vendor intentions are honourable, the outcomes are not quite as hoped for:
only 40% of companies feel their cybersecurity vendors provide the right information to help educate the
board about cybersecurity.
Do you feel your cybersecurity vendors provide you with the right information to help educate your
board about cybersecurity?
Of course, it’s not just as simple as pointing the finger at vendors and decrying ‘Aha, it’s your fault!’ There is
a larger issue at play here where both business and technology executives have traditionally struggled to
clearly communicate with each other pretty much since the first IT person plugged in an electrical cord and
someone in the business said, ‘Oh, what does that do?’
So, what are the key areas that require an educational focus?
1. The crown jewels gambit. The first priority revolves around helping boards understand that it’s
impossible to protect everything and it’s more effective to focus on identifying the most critical
information, data and systems to protect.
2. We know what we want to protect, where do we start? Cybersecurity 101 courses educate on basic
principles, the genuine likelihood of attack, attack vectors, threat actors and other terminology that is
second language to cybersecurity principals and sometimes mystifying to those who aren’t.
3. Strategy and implications on our digital transformation program. With the basics clearly defined,
developing the strategy and integrating with the inevitable digital transformation program is a critical
consideration.
4. The practicalities. Once steps 1-3 are clearly articulated the focus becomes more operational in nature
– what legislation is applicable, what to do if breached, ransom payment policy, gap assessments and
future roles and obligations, etc.
5. Compliance. Underpinning many of the issues is the need to clearly understand compliance, the
regulatory environment under which the business operates, what’s legally required when breached and
what are the appropriate controls around data security and management.
Cybersecurity legislation
101 essentials
IDing most critical info, data,
systems to protect
With the board education issue addressed, let’s look at the one remaining issue in our top 5 frustrations,
skills shortages.
Cybersecurity Skills
A new coverage area for this report, our data indicates a clear problem for our survey cohort with ongoing
skills shortages. Given the impact of this issue, we will be incorporating analysis into future editions of the
report.
On average, 73% of firms expect to have problems with recruiting cybersecurity employees over the coming
24 months (26% face a major challenge, 29% face a moderate challenge and 18% face a minor challenge).
What is your view on the availability of skills security employess for your organisation in the next 24
months?
27%
e will have enough security specialists,
W
26%
no problems recruiting more
Interestingly, another 38% of organisations in the Philippines expect no problems over the same period.
Australia (31% of companies) and Malaysia (30% of companies) round out the top 3 countries expecting no
issues with recruiting.
With recruiting being problematic, companies have clearly identified several areas where they would like to
increase skills and capabilities for their internal security specialists:
8. Forensic analysis
The following table provides some greater insight into the top 3 skills priorities identified in each country:
Strengthening Defences
Common Attack Vectors
Another new question for 2022, we asked organisations what were the most common security attack
vectors their company experienced and, in a related theme, which threats they perceived as the most
important now and in 24 months’ time.
The first two vectors are addressable in part through ongoing education and awareness campaigns:
phishing and whaling (where threat actors target the C-suite and board) and weak or compromised
employee credentials.
What are the most common security attack vectors your company experiences?
Man in middle
Social engineering
Misconfigurations
Malicious employees
Unpatched vulnerability
Weak/compromised credentials
Phishing/whaling
From a country perspective, there was little variation in attack vectors, with companies from all 6 countries
identifying phishing/whaling as the most prevalent activity.
Consistent with our findings on attack vectors, phishing topped the list, followed by malware. Both threats
have been ranked as either a top 1 or 2 issue in previous research and we were not surprised to see them
again for 2022.
It was more noteworthy to consider the rise of ‘poor systems’ to third place, up from 13th in 2021. Its
prominence raises an interesting question over the effectiveness of the ‘security by design’ approach
adopted by many APJ organisations (casting another slight shadow over the actual cybersecurity maturity
assessment levels raised earlier in this report).
3. Distributed denial of service (DDOS) attacks dropping from 5th (2021) to 12th (2022)
Malware 2 1 2
Poor systems 13 13 3
Corporate espionage 6 6 4
Encryption backdoors 4 7 6
Malicious employees 7 11 7
AI/ML attacks 10 12 8
Social engineering 3 4 9
Employee errors 9 9 11
Zero-day vulnerabilities 11 8 13
On average, across our survey cohort, 90% of organisations stated they undertook threat hunting to bolster
their cybersecurity capabilities.
The story is one of overarching positivity for threat hunting across the region. 85% of all threat hunting users
stated the approach is critical (21%) or important (64%) to their company’s overall cybersecurity capability.
Does your organisation undertake threat-hunting activities to bolster its cybersecurity defence?
4%
6%
Yes with in-house resources
49% Yes using an external partner
41% No
Unsure
We would caution slightly against the ebullience in the data. Whilst not quantitatively tested, we made an
observation that some users may consider log analysis, incident response, digital forensics, pen-testing
and vulnerability assessments as valid examples of threat hunting consequently potentially inflating the
adoption numbers.
When it comes to technology, the survey respondents indicated that the technologies that will most impact
their organisation’s security in the next 24 months are IT and OT convergence, digital transformation,
artificial intelligence and machine learning, workflow digitisation, and IoT devices.
Which of the following technologies or issues do you think will impact your organisation's security in
the next 24 months?
IT/OT convergence
Digital transformation
AI/ML
Workflow digitisation
IoT devices
Agile development
APIs
Public cloud
Blockchain
DevOps
Robotics
Quantum computing
Containerisation
Autonomous vehicles
We were a little surprised to see containerisation (a way of encapsulating software code so it can run
uniformly on any infrastructure) rank very low as an issue. Many organisations suffer from container
sprawl in their cloud infrastructure and require a solution (such as Kubernetes) to effectively manage
their environment. This, in turn, potentially increases the surface attack area as additional components
are added. We expect to see containerisation rise in ranking as more large enterprises and government
organisations continue their adoption.
In our 2021 report, we noted that, “While there is a lot of hype and confusion around AI and ML in the
market, the research results indicate there is considerable interest and appetite in how these technologies
can help in the future.” Our latest data indicates fluctuation in the use of AI for data analysis and fraud
mitigation and we expect this to continue year on year as the technology evolves and familiarity improves.
There is a clear trend towards increased adoption of AI and ML for other use cases and we expect it to be
built into all security platforms more deeply going forward. Of note too is the overall decrease in the number
of companies that stated they did not use AI and ML in 2019 (22%) and those that don’t use it today (12%).
What is the role of AI and machine learning in your organisation’s approach to security today?
30% 27%
22% 22%
20% 19% 19%
20% 18%
16%
13% 13%
11%
10%
0%
0%
We use it We use it for We use it We use it We don't We use it in
for analysis proactive to scan and to provide use it threat hunting
of data we defense test our own recommen-
have already or fraud systems for dations on
collected mitigation in vulnerabilities strategy
real time
2019 2022
In closing
The issue isn’t technology. It’s education.
Increasing spend on cybersecurity (be this on staff, managed security providers or technology) is sub-
optimal unless organisations understand from the top down the true nature and critical threat that
cybersecurity attacks constitute to an entities’ existence, operational capabilities, and customers.
A true and frank assessment of actual cybersecurity maturity may give some organisations a pause for
thought and possible rethinking of their true capabilities. Likewise, sustained and concerted board and
executive level education campaigns are important to both improve management comprehension of
cybersecurity issues and remove one of the major frustrations experienced by cybersecurity professionals.
In last year’s conclusion we stated, “Combining a robust platform approach to cybersecurity that is
hardened by skilled experts and partners with an improved operational and cultural emphasis will help our
chances of success in the future.” That statement remains valid today.
The following sections of the report provide relevant data points for each of the 6 countries included in our
research:
1. Australia
2. India
3. Japan
4. Malaysia
5. Philippines
6. Singapore
Cybersecurity in Australia
Spend on cybersecurity as percentage of total technology budget: 11.8%
20%
15% 14%
10%
5% 3%
1%
0%
No plan Initial Managed Defined Quantitatively Optimising
Managed
3. Our executives assume cybersecurity is easy and me/my cybersecurity peers over exaggerate threats
and issues
60%
52%
50%
40% 38%
30%
20%
10%
10%
1% 0%
0%
Not at all A little Moderately well Very well Unsure
60%
34%
50% 31%
40%
21%
30%
15%
20%
10%
0%
We have We will face We will face We will face a major
enough security a minor a moderate challenge recuiting
specialists and challenge challenge where we struggle to
have no problems recruiting recruiting recruit any security
recruiting more specialists
2. Malware
5. Corporate espionage
Cybersecurity in India
Spend on cybersecurity as percentage of total technology budget: 10.7%
33%
30%
21% 21%
18%
20%
8%
10%
0%
0%
No plan Initial Managed Defined Quantitatively Optimising
Managed
2. There’s too much ‘fear and doubt’ messaging that makes it hard to talk accurately about cybersecurity
70%
61%
60%
50%
40%
30%
30%
20%
9%
10% 1%
0%
0%
Not at all A little Moderately well Very well Unsure
29%
30%
26%
24%
22%
20%
10%
0%
We have enough We will face a We will face a We will face a major
security specialists minor challenge moderate challenge challenge recruiting
and have no problems recruiting recruiting where we struggle to
recruiting more recruit any security
specialists
3. Social engineering
2. Malicious employees
Malware Malware
DDoS Ransomware
Cybersecurity in Japan
Spend on cybersecurity as percentage of total technology budget: 12.3%
30%
25%
23%
21%
20% 17%
10% 9%
7%
0%
No plan Initial Managed Defined Quantitatively Optimising
Managed
Who leads cybersecurity strategy?
CISO: 32%, CIO/CTO: 33%, Shared Group Responsibility/Other: 35%
3. There’s too much ‘fear and doubt’ messaging that makes it hard to talk accurately about cybersecurity
50%
44%
40%
35%
30%
20%
10%
10% 8%
4%
0%
Not at all A little Moderately well Very well Unsure
40%
34% 35%
30%
20% 17%
15%
10%
0%
We have enough We will face We will face We will face a major
security specialists a minor a moderate challenge recruiting
and have no challenge challenge where we struggle to
problems recruiting recruiting recruiting recruit any security
more specialists
2. Unpatched vulnerabilities
2. Malicious employees
3. Employee error
4. Ransomware
5. Corporate espionage
Ransomware Ransomware
Cybersecurity in Malaysia
Spend on cybersecurity as percentage of total technology budget: 8.6%
40%
31%
30% 29%
20% 18%
12%
10%
10%
0%
0%
No plan Initial Managed Defined Quantitatively Optimising
Managed
3. We don’t put enough investment and time into training our general staff
50% 47%
40%
30% 29%
18%
20%
10% 4%
2%
0%
Not at all A little Moderately well Very well Unsure
40%
30% 29%
30% 26%
20%
15%
10%
0%
We have enough We will face We will face We will face a major
security specialists a minor a moderate challenge recruiting
and have no challenge challenge where we struggle to
problems recruiting recruiting recruiting recruit any security
more specialists
2. Malicious employees
2. Malicious employees
3. Employee error
4. Ransomware
5. Corporate espionage
40%
31% 31%
30%
20% 18%
11%
10%
6%
3%
0%
No plan Initial Managed Defined Quantitatively Optimising
Managed
Who leads cybersecurity strategy?
CISO: 33%, CIO/CTO: 36%, Shared Group Responsibility/Other: 31%
2. Our executives assume cybersecurity is easy and me/my cybersecurity peers over exaggerate threats
and issues
50%
47%
40%
33%
30%
20% 16%
10%
2% 2%
0%
Not at all A little Moderately well Very well Unsure
40% 38%
31%
30%
20%
20%
11%
10%
0%
We have enough We will face We will face We will face a major
security specialists a minor a moderate challenge recruiting
and have no challenge challenge where we struggle to
problems recruiting recruiting recruiting recruit any security
more specialists
3. Malicious employees
3. Malware
4. Encryption backdoors
5. AI/ML attacks
Ransomware Malware
DDoS Ransomware
Cybersecurity in Singapore
Spend on cybersecurity as percentage of total technology budget: 11.23%
40%
30%
30%
25%
21%
20%
20%
10%
3%
1%
0%
No plan Initial Managed Defined Quantitatively Optimising
Managed
2. There’s too much ‘fear and doubt’ messaging that makes it hard to talk accurately about cybersecurity
50% 50%
40% 37%
30%
20%
11%
10%
1% 1%
0%
Not at all A little Moderately well Very well Unsure
40%
31%
30% 28%
20% 21%
20%
10%
0%
We have enough We will face We will face We will face a major
security specialists a minor a moderate challenge recruiting
and have no challenge challenge where we struggle to
problems recruiting recruiting recruiting recruit any security
more specialists
2. Misconfigurations
2. Phishing
3. DDoS
4. Social engineering
5. Ransomware
Ransomware Malware
Backdoors Ransomware
While you may scoff at the thought that those outside your organisation think you don't take cybersecurity
seriously, historically though, it was the reality. And with more organisations moving up the self-ranked
cybersecurity maturity charts, it's a clear indicator that there was room for the improvements that were
desperately needed.
But how much of that self-ranked maturity will translate into preparedness you can rely on when something
goes inexplicably wrong?
Evaluations and self-ranking aside, very few organisations put into practice and validate their resilience
when faced with a real cybersecurity incident.
The TRA research shows that organisations that do have plans, might not have fully tested them against a
serious attack scenario. In some cases where a real incident has unfolded, plans and response actions have
been bespoke. Sometimes plans can’t be retrieved as they’re on the desktops and servers that have just
been ransom(war)ed!
Much of this murkiness in cyber resilience is attributed to issues of comprehension of the threats and
diversification of cybersecurity roles and responsibilities within an organisation. Comprehension is
the primary reason organisations across APJ fail to live up to their own expectations when it comes to
adequately planning for a cyber incident because board and executive levels often do not understand how
cyber issues can disrupt and eviscerate the bottom line.
Don’t leave the door open for attackers to take advantage of you – as they likely will.
Even though we’ve all witnessed high impact vulnerabilities take main stage and threat actors wreak
havoc across businesses of all sizes from all industries – employing everything from ProxyShell to Log4J
– by stealing corporate data and using extortion tactics, it’s not just the big oh-days that we should be
looking to mitigate. Basic cybersecurity hygiene is still problematic for many organisations with unpatched
applications and operating systems allowing attacks to easily unfold, and even simplistic phishing and
credential harvesting operations giving cyber-criminal groups access far and wide.
Looking for solutions to solve these very complex and deeply rooted issues isn’t an overnight thing, and
don’t expect a single piece of software or policy control to be a silver bullet. Once again, the human element
comes into play with phishing and user interaction still common ways attackers make their way through
the front door. Understanding the threats we face on an almost daily basis and how to deal with them –
regardless of whether you’re a C-suite executive or working in the mail room – is essential to protect the
organisation. Bottom line – everyone needs the same level of insight and training on how to spot and deal
with fraudsters attempting to infiltrate the business.
On the diversification of cybersecurity roles and responsibilities front, mitigating controls are technical even
though theoretically autonomous. These types of extremely technical controls need expertise to make
sense of and to action the items that are important. This is why having a diverse team with different skill
types within your cyber resiliency ranks will bolster how your organisation responds to an incident.
By addressing comprehension and diversification, you will be one step closer to successfully detecting and
remediating an attack before it gets its hooks into you, your employees, your business and the information
you hold dearest.
Appendix
Definitions for the Cybersecurity Maturity Model:
Ì Ad-hoc: Reactive to specific projects and initiatives but no overall strategy to govern activities.
Ì Untested in real life: Theoretical plan that has yet to be implemented within the organisation,
group or division.
Ì Managed: Basic level strategy in place that ensures projects and activities are undertaken in a
planned manner with basic performance, measurement and controls in place to track progress.
Ì Optimised: Focus on continuous improvement cycles with a proven ability to adapt to change.
CISO
500-999 10% 12%
CIO/CTO
24% 1,000-1,499 10%
19% CDO
34%
1,500-1,999 LoB Manager
11%
2,000-2,499 CEO/MD
22% 15%
9% 2,500+ 24% Purchasing
11% Other
Industry
About Sophos
Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 500,000 organisations
and millions of consumers in more than 150 countries from today’s most advanced cyberthreats. Powered
by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad
portfolio of advanced products and services to secure users, networks and endpoints against ransomware,
malware, exploits, phishing and the wide range of other cyberattacks. Sophos provides a single integrated
cloud-based management console, Sophos Central – the centerpiece of an adaptive cybersecurity
ecosystem that features a centralised data lake that leverages a rich set of open APIs available to
customers, partners, developers, and other cybersecurity vendors. Sophos sells its products and services
through reseller partners and managed service providers (MSPs) worldwide. Sophos is headquartered in
Oxford, U.K. More information is available at www.sophos.com.
www.techresearch.asia
Copyright and Quotation Policy: The Tech Research Asia name and published materials are subject to trademark and copyright protec-
tion, regardless of source. Use of this research and content for an organisation’s internal purposes is acceptable given appropriate attri-
bution to Tech Research Asia. For further information on acquiring rights to use Tech Research Asia research and content please contact
us via our website or directly. Disclaimer: You accept all risks and responsibility for losses, damages, costs and other consequences
resulting directly or indirectly from using this research document and any information or material available from it. To the maximum
permitted by law, Tech Research Asia excludes all liability to any person arising directly or indirectly from using this research and content
and any information or material available from it. This report is provided for information purposes only. It is not a complete analysis of
every material fact respecting any technology, company, industry, security or investment. Opinions expressed are subject to change
without notice. Statements of fact have been obtained from sources considered reliable but no representation is made by Tech Research
Asia or any of its affiliates as to their completeness or accuracy.
2022-03-31 (WP-NP)