Cybersecurity professionals admit it takes too long and costs too much to detect and respond to security incidents. Credit: Thinkstock After a week away from all things cybersecurity, I’m back at work and focusing on security analytics and operations again. Alarmingly, most organizations readily admit to problems in this area. For example, a recent ESG research survey of 412 cybersecurity and IT professionals identified some of the biggest security analytics and operations challenges. Some of the survey results:30% of respondents say their biggest cybersecurity operations challenge is the total cost of operations (TCO). What does this mean? Based upon my qualitative interviews with CISOs as part of this project, many organizations are spending lots of money on security operations but attaining marginal results. CISOs are willing to invest more but want to see vast improvements in security operations efficacy and efficiency for their money.27% of respondents say their biggest cybersecurity operations challenge is that the SOC team spends most of its time on high-priority/emergency issues and not enough time on strategy and process improvement. Imagine the work environment at these organizations — constant firefighting, high stress, employee burnout, and staff attrition. This alarming situation is not exactly a recipe for success.23% of respondents say their biggest cybersecurity operations challenge is that it takes too long to remediate security incidents. Many of these firms have too many manual processes or a rocky relationship between security and IT operations teams. Either way, lengthy remediation cycles leave organizations at risk. 21% of respondents say their biggest cybersecurity operations challenge is that their organization does not have the tools and processes in place to operationalize threat intelligence, making it difficult to compare on-premises security issues with what’s happening “in the wild.” Operationalizing threat intelligence remains a difficult task, requiring advanced skills and the right tools. This is one reason why threat intelligence platforms (TIPs) and managed services are gaining traction.21% of respondents say their biggest cybersecurity operations challenge is that their organization doesn’t have the appropriate skills or staff size to keep up with all the tasks associated with security analytics and operations. Ah, the global cybersecurity skills shortage rears its ugly head yet again. Little wonder then why security services revenue is growing twice as fast as security product revenue.21% of respondents say their biggest cybersecurity operations challenge is that their organization has added new network hosts, applications and/or users, so it is difficult for the cybersecurity team to keep up with the scale of IT infrastructure. In this case, IT and cybersecurity priorities remain out of sync. Here’s one of Oltsik’s laws: When you ask the cybersecurity staff to play catch up, it never, ever actually catches up.21% of respondents say their biggest cybersecurity operations challenge is that security alerts don’t provide enough context or fidelity, so it’s difficult to know what to do with them. This is one reason why the industry is gaga over automation/orchestration tools, as they can help combine, enrich and contextualize the increasing flood of prosaic security alerts.As the ESG research indicates, when it comes to cybersecurity operations, many organizations suffer from “death by a thousand cuts” syndrome with multiple issues across people, processes and technologies. Given that, CISOs should think in terms of three-year strategic security operations planning rather than adding the latest next-generation security tool and only exacerbating operational inefficiencies. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe