Senior IT Execs Admit Cyber Threats Are Out Of Control

Right now, 60% of senior IT executives admit to more cyber threats in their organisation than they can control. 

A report by Cognizant’s Centre for the Future of Work, Securing the Digital Future, has revealed that boardrooms are over-looking cybersecurity, with 60% claiming to have inadequate resources. Furthermore, 31% admit they only refresh their cybersecurity strategy annually.

Survey respondents cited migrating data to the cloud (74%), social media (66%) and careless employees (64%) as posing the highest risk to business security in the next 12 months. Euan Davis, European Lead for Cognizant’s Centre for the Future of Work said: 

“While not a silver bullet, the introduction of AI tools into cyber-security platforms will spur organisations to rethink how they approach cyber-security and reduce the burden left by talent shortages.  

“Cyber-security needs to be an ongoing endeavour however, and failure to adapt processes and systems on a regular basis will leave an organisation open to further attacks.

“Leadership must take the initiative when it comes to ensuring this is embedded into the business’s DNA, or else face losing customers, reputation and revenue. Ultimately, any company that hopes to do business in the digital economy must make cyber defences a key part of their business strategy.”

Recent research found that more technologists are being added to FTSE boardrooms as businesses channel their energy into technology led innovation.

A report from Calastone revealed that more than a third of FTSE 100 firms now have technologists on their executive leadership teams, an increase of nearly a quarter from 2016.

Furthermore, FTSE 250 firms including a technologist also revealed an increase from 18.6% in 2016 to 23.1% in 2018. 

Cognizant:       Information  Age

You Might Also Read: 

The Cloud Is A Key To Cyber Defence:

Cybersecurity Is A Job for CEOs, Not Just The IT Team:

 

« How To Beat The Hackers
Is Technology Undermining Democracy? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

Research Institute in Science of Cyber Security (RISCS)

Research Institute in Science of Cyber Security (RISCS)

RISCS is focused on giving organisations more evidence, to allow them to make better decisions, aiding to the development of cybersecurity as a science.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Virsec Systems

Virsec Systems

Virsec detects and remediates previously “indefensible” advanced memory-based attacks on critical applications and server endpoints.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

Reed

Reed

reed.co.uk is a leading job site in the UK, providing a full online service for anyone looking for a new job.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

Lucidum

Lucidum

The Lucidum platform helps you assess risk and mitigate vulnerabilities by finding and correlating data from your security tech stack.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.