<- All Blogs
Cyber Workforce Benchmark
Cybersecurity Breach

Is Your Org Doing Enough to Prevent a Cybersecurity Breach? (Our research says 'maybe not'!)

Written by
Evander Pierre
Published on
June 22, 2022
Part 1 in a series featuring data points from the Cyber Workforce Benchmark.

The number one job of an enterprise security team is to prevent their organization’s applications and infrastructure from cybersecurity breach. And from our vantage point, it appears that most organizations are focused on developing the necessary human capabilities to do this.But here’s the question: is it enough?We’ve conducted hundreds of thousands of exercises and simulations with organizations across a broad spectrum of industries and geographies. In the process, we’ve kept our eye out for useful insights into the overall state of cyber-resilience.You can find our complete analysis in our Cyber Workforce Benchmark 2022. But today, let’s focus on the types of exercises that security teams choose to spend their time on. By doing so, we gain insight into how well cyber-readiness efforts align with today’s threat landscape.Defense-in-depth applies to human capabilities as wellOver the last decade, most security teams have broadened their infrastructure protection strategy from perimeter protection to a defense-in-depth mindset. Do they still use firewalls and take every possible step to protect the perimeter? Of course. But most teams have opened their eyes to the fact that even with a strong perimeter, cyber security breaches are a fact of life. Therefore, it’s important to employ a layered security approach that includes additional lines of defense once a threat actor successfully accesses a sensitive system or environment.In fact, many are now applying Zero Trust Architecture principles that assume that no user or device can be implicitly trusted, regardless of whether they are inside or outside of a traditional network or cloud infrastructure perimeter.The same mindset should be applied to human capability development. If your security team is highly effective at detecting and stopping cybersecurity breach attempts, this is obviously a key strength. It’s the human equivalent of a well-managed firewall.But if your team lacks the skill to analyze, contain, and recover from successful breaches, you don’t truly have a cyber-resilient organization.Viewing human capability development through the MITRE ATT&CK® lensMany of the exercises we conduct with our customers align with proven industry frameworks. One of the best known is MITRE ATT&CK®. One element of MITRE ATT&CK® is a set of common enterprise tactics that appear at different stages of an advancing attack.The organizations we observed focused a significant percentage of their human capability development efforts on countering tactics that appear early in the attack chain.ICAgICAgPHRhYmxlIGNsYXNzPSJ0ZXh0LWNlbnRlciBtaXRyZS1hdHRhY2stdGFibGUgdGFibGUtb25lIj4KICAgICAgICAgPHRoZWFkPgogICAgICAgICAgICA8dHI+CiAgICAgICAgICAgICAgIDx0aD5NSVRSRSBBVFQmQ0vCriBUYWN0aWM8L3RoPgogICAgICAgICAgICAgICA8dGggd2lkdGg9IjYwJSI+QWR2ZXJzYXJ54oCZcyBPYmplY3RpdmU8L3RoPgogICAgICAgICAgICAgICA8dGg+RXhlcmNpc2UgQ292ZXJhZ2U8L3RoPgogICAgICAgICAgICA8L3RyPgogICAgICAgICA8L3RoZWFkPgogICAgICAgICA8dGJvZHk+CiAgICAgICAgICAgIDx0cj4KICAgICAgICAgICAgICAgPHRkPkluaXRpYWwgQWNjZXNzPC90ZD4KICAgICAgICAgICAgICAgPHRkPkdldCBpbnRvIHlvdXIgbmV0d29yawogICAgICAgICAgICAgICA8L3RkPgogICAgICAgICAgICAgICA8dGQgY2xhc3M9IndoaXRlLXRleHQiIHJvd3NwYW49IjMiPjMxJTwvdGQ+CiAgICAgICAgICAgIDwvdHI+CiAgICAgICAgICAgIDx0cj4KICAgICAgICAgICAgICAgPHRkPkV4ZWN1dGlvbjwvdGQ+CiAgICAgICAgICAgICAgIDx0ZD5SdW4gbWFsaWNpb3VzIGNvZGU8L3RkPgogICAgICAgICAgICA8L3RyPgogICAgICAgICAgICA8dHI+CiAgICAgICAgICAgICAgIDx0ZD5QZXJzaXN0ZW5jZTwvdGQ+CiAgICAgICAgICAgICAgIDx0ZD5NYWludGFpbiBhIGZvb3Rob2xkPC90ZD4KICAgICAgICAgICAgPC90cj4KICAgICAgICAgPC90Ym9keT4KICAgICAgPC90YWJsZT4KICAgICAgIn contrast, the teams we observed place much less focus on developing the skills necessary to stop an in-progress breach from escalating and ultimately achieving its intended outcome.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A conclusion we might draw from this is that security teams are investing an appropriate amount of effort in developing strong “human firewall” capabilities to keep threat actors out of their systems and environments. But if a breach is successful, these teams may be less equipped to contain and recover effectively.

Read more cybersecurity breach data points in our infographic.

Closing the cybersecurity breach gap is possible with the right focusThe news isn’t all bad when it comes to readiness after the point of breach. While the organizations we observed did not complete these labs as often, when they did, they generally completed them faster than exercises focused on earlier stages of the attack chain.While the average MITRE ATT&CK® lab exercise took 12 minutes longer to complete than our benchmark expectation, those focused on the earliest stages of the attack chain exceeded the expected completion time by 23 minutes. Meanwhile, when users focused on the later stages of the attack chain, such as Collection, Command and Control, Exfiltration, and Impact, they completed these labs faster than average at just over 10 minutes above our expected completion time.Key takeawayOverall, our analysis suggests that organizations may be repeating the mistakes of the past by putting too much faith in their ability to keep threat actors out. While a continuing focus on breach prevention is a must, it’s also important to build on this foundation with the human capabilities needed to respond, contain, and recover from the inevitable subset of breach attempts that succeed.Download the complete Cyber Workforce Benchmark 2022 for our complete analysisThe topic I covered today is just one of the many insights you can find in our full Cyber Workforce Benchmark 2022 document. Download your free copy for a more complete view of the state of cyber resilience globally, along with expert perspectives from fellow security executives and capabilities development experts.https://www.immersivelabs.com/wp-content/uploads/2022/03/screenshot-2022-03-07-at-145858.pngCyber Workforce Benchmark Report 2022

  • 18 months
  • 2,100 organizations
  • > 500,000 exercises and simulations
  • > 1,500 threats and incidents

DownloadResilience is EverythingWant to see how Immersive Labs can help you? Reach out to book a demo.

Share this post