Strategy For-Augmented-Cybersecurity Roadmap
Strategy For-Augmented-Cybersecurity Roadmap
Augmented Cybersecurity:
Act Now to Thrive Amid
Chaos and Complexity
29 May 2024
Augmented Cybersecurity: Act Now to Thrive Amid
Chaos and Complexity
29 May 2024 - ID G00816719 - 13 min read
By Analyst(s): Cybersecurity Research Team
Initiatives: Cyber Risk; Build and Optimize Cybersecurity Programs
To thrive and not just survive in a complex operating environment, cybersecurity leaders
need to adopt an “augmented cybersecurity” approach. This approach sustainably
defends the organization by elevating response and recovery to equal status with
prevention. Gartner recommends cybersecurity leaders start adopting this approach in
three areas (see Figure 2):
3. Develop a resilient cyberworkforce: How do you manage and lead the cybersecurity
team?
They must formulate response and recovery plans for GenAI by asking:
■ Working with third parties to mature their security risk management practices as
necessary.
1
Each of these three actions improves TPCRM effectiveness by more than 40%.
Cybersecurity leaders should map their tools to their controls framework to identify
capability gaps and redundancies. They should also strive to consolidate multiple stand-
alone cybersecurity products into platforms to improve their risk posture and efficiency.
Sixty-five percent of participants in the 2022 Gartner CISO: Security Vendor Consolidation
XDR and SASE Trends Survey said that the primary benefit of security vendor
consolidation is improvement in overall organizational risk posture. 2
Security leaders should ask themselves: “What is the minimum number of tools required
to effectively observe, defend and respond to exploitations of the organization’s
exposures?”
To get the most out of new technology investments, cybersecurity leaders should learn
about the proven enterprise value and deployment risks of different technologies.
Review Gartner’s Infographic: 2024 Technology Adoption Roadmap for Security and Risk
Management to understand the different security-related technologies being adopted by
global enterprises, and compare your technology investments with those of your peers.
Gartner predicts that, by 2026, AI will increase SOC efficiency by 40% compared to 2024,
3
beginning a shift in SOC expertise toward AI development, maintenance and protection.
Security leaders must aggressively pursue GenAI-driven efficiencies and explore GenAI
augments within the cybersecurity function.
This resource contains the actions you need to drive the adoption of an augmented
cybersecurity approach. We have carefully selected Gartner research to help your
organization thrive and not just survive in an increasingly complex business and
technology environment.
Analysis
Cybersecurity professionals are stuck in “survival” mode. This is not because of the vast
number of threat actors, the ever-expanding attack surfaces or the chronic shortage of
cybersecurity talent. What stops them from thriving amid chaos and complexity is the
mindset of zero tolerance for failure that continues to pervade cybersecurity and
organizational cultures.
The following resources contain recommendations and tools to help you build response
and recovery plans for GenAI use at your organization.
■ Emerging Tech Impact Radar: Generative AI: An analysis of the maturity, market
momentum, and influence of GenAI-related emerging technologies and trends. Learn
the key components that you must understand to exploit GenAI opportunities and
securely deliver value (see Figure 4).
■ Tool: Generative AI Security Policy Template: This tool provides a starting point for
defining GenAI security governance. Organizations planning to leverage or currently
leveraging GenAI should use this template to define, document, and publish clear
guidelines for secure development and use of GenAI capabilities, tools and services.
■ Tool: Roadmap for Deploying and Managing Generative AI: Organizations need to
coordinate activities for GenAI to support agility. Use this roadmap template and
guidance to plan and sequence activities in delivering GenAI projects.
The following resources contain recommendations and tools to help you build response
and recovery plans for your organization’s third-party engagements:
The following resources contain recommendations and tools to help you adopt a
minimum effective toolset approach:
The following resources contain recommendations and tools to help you build effective
technology proofs of concept (POCs):
■ Emerging Tech Impact Radar: Security: Incorporate the emerging technologies and
services outlined in this research to expand growth opportunities linked to
organizations’ need to proactively mitigate exposure, effectively detect and respond
to attacks, and create better efficiencies through AI-based security hyperautomation.
The following resources contain recommendations and tools to help you improve your
teams’ capabilities by adopting Gen-AI:
■ Identity and Access Intelligence Innovation With Generative AI: GenAI provides
opportunities and threats that will transform identity and access management (IAM)
operating models. Use this research to understand use cases and develop an
architecture strategy to safely adopt GenAI in IAM.
Research Highlights
Some recommended content may not be available as part of your current Gartner
subscription.
Evidence
1
2023 Gartner Reimagining Third-Party Cybersecurity Risk Management Survey: This
research initiative involved surveying 376 senior executives involved in third-party
cybersecurity risk management across organizations from different industries,
geographies and sizes. This research was further substantiated and informed by in-depth
practitioner interviews with over 60 chief information security officers (CISOs) to
understand cybersecurity goals and challenges associated with third-party cybersecurity
risk management. The survey was conducted from July through August 2023. The
objective of the survey was to understand the practices that cybersecurity leaders should
follow to better manage cybersecurity risks emanating from third-party relationships.
Gartner used descriptive statistics to ensure all normal distribution of data and created a
measure of effectiveness that determines how effective an organization is in achieving
key cybersecurity outcomes. We then used a regression-based maximum impact analysis
to determine which of the hypothesized practices in third-party cybersecurity risk
management were most impactful in improving those outcomes. Maximum impact
shows the largest amount of improvement in outcomes that an organization can realize
by improving each factor in managing third-party cybersecurity risk. Disclaimer: Results of
this survey do not represent global findings or the market as a whole, but reflect the
sentiments of the respondents and companies surveyed.
3
Predicts 2024: AI & Cybersecurity — Turning Disruption Into an Opportunity.
4
Cybersecurity Leaders Are Burned Out. Here’s Why.
© 2024 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of
Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form
without Gartner's prior written permission. It consists of the opinions of Gartner's research
organization, which should not be construed as statements of fact. While the information contained in
this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties
as to the accuracy, completeness or adequacy of such information. Although Gartner research may
address legal and financial issues, Gartner does not provide legal or investment advice and its research
should not be construed or used as such. Your access and use of this publication are governed by
Gartner's Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its
research is produced independently by its research organization without input or influence from any
third party. For further information, see "Guiding Principles on Independence and Objectivity." Gartner
research may not be used as input into or for the training or development of generative artificial
intelligence, machine learning, algorithms, software, or related technologies.
Define
DefineVision,
Vision, Design, Deploy
Source, Assess and Increase
Strategy and
Strategy and and Maintain Harness and
Develop and Manage Organizational
Operating
Operating Model Security Tools Protect AI
Retain Talent Cyber Risk Resilience
Model and Services
Communicate Optimize
Risk and Value Identity
to Executives and Access
and the Board Management
Gartner Priorities Navigator™
for Chief Information Security Officers
Obtain Secure
Defensible Enterprise
Budget Cloud Journeys
© 2024 Gartner, Inc. and/or its affiliates. All rights reserved. CM_GTS_3112117
How Gartner helps
Key Insights for the Chief Expert Guidance
Information Security Officer Regularly connect with experts, who have been
Unique and exclusive insights to help CISOs in cybersecurity leadership roles, who speak to
and their teams succeed a diverse set of leaders every day, and who truly
understand the challenges you face and the
Be a better leader insights that will help you fully achieve your goals.
Cybersecurity leadership insights in key areas:
• Role, relationships, talent and culture
Decisioning Tools
Tools to turn strategy into action by helping
• Business value and strategy accelerate key initiatives and drive better business
• Cybersecurity program outcomes.
A customized gartner.com
experience to ensure you’re
optimizing your partnership
with Gartner.
© 2024 Gartner, Inc. and/or its affiliates. All rights reserved. CM_GTS_3112117
Actionable, objective insight
Position your organization for success. Explore these additional
complimentary resources and tools for cybersecurity leaders:
Report Roadmap
Cybersecurity Trends: Optimize IT Roadmap for Cybersecurity
for Resilience and Performance Create a resilient, scalable and agile
Use this report to equip your cybersecurity cybersecurity strategy.
function for greater resilience.
eBook Webinar
Leadership Vision for Security Strengthen Your Cybersecurity
and Risk Management Leaders Leadership to Navigate Evolving
Explore the top 3 strategic priorities Security Landscape
for SRM leaders. Explore this 5-part series for insights
into the evolving landscape.
Already a client?
Get access to even more resources in your client portal. Log In
Connect With Us
Get actionable, objective insight that drives smarter decisions and
stronger performance on your mission-critical priorities. Contact us
to become a client:
Become a Client
© 2024 Gartner, Inc. and/or its affiliates. All rights reserved. CM_GTS_3112117