India braces against phishing, ransomware surge and alert fatigue, Urging swift adoption of AI, and automation for security operations

Fortinet, has revealed the outcomes of a new survey conducted by IDC on the state of Security Operations (SecOps) in the Asia-Pacific region. The survey, commissioned by Fortinet, provides valuable insights into the current SecOps landscape, emphasising the role of Artificial Intelligence (AI) and automation. It explores various aspects, including prevalent security practices, attack frequency and impact, detection and response times, alert fatigue, the status, and impact of automation in SecOps workflows, and challenges related to skill development within the SecOps domain.

Key findings from India include:

Current security challenges: Threats and team readiness

Most common cyber threats: Phishing and Insider threats are the most predominant cyber threat in India, with Approximately 50% of organisations ranking them as their top concerns. The top five threats include phishing, insider threats, ransomware, unpatched vulnerabilities, and identity theft.

Ransomware surge: Ransomware incidents have doubled across India, with 70% of organisations reporting at least a 2X increase in 2023, compared to 2022. Phishing and malware are the primary attack vectors. Other significant vectors include social engineering attacks, insider threats, and zero-day exploits.

Insider threats and remote work: 88% of the respondents feel that Remote work has led to an increase in insider threat incidents. Insufficient training, lack of employee care, and inadequate communication contribute to this surge, emphasizing the need to address human factors in cybersecurity.

Resourcing IT security teams: Only 44% of businesses have dedicated IT resources for security teams. This augments the challenges faced by organisations in strengthening their security measures.

Impact of emerging technologies: Hybrid work, AI, and IT/OT system convergence pose significant challenges. Cloud technology adoption emerges as a primary challenge, impacting organisational vulnerability to cyber threats.

SecOps SOS: Struggles with Alert Fatigue and Threat Containment

Threat containment and preparedness: Approximately one out of three surveyed organisations express concerns about being underequipped for threat containment. This dissatisfaction highlights the critical need for enhancing cybersecurity capabilities to effectively counter evolving cyber threats. Alarmingly, three out of four organizations do not conduct regular risk assessments, exacerbating the challenge of timely threat detection.

Alert fatigue: More than 50% of surveyed enterprises experience an average of 221 incidents per day and 2 out of 5 enterprises grapple with over 500 incidents daily, leading to alert fatigue. The top two alerts faced are suspicious emails (phishing) and multiple failed login attempts, highlighting the imperative for targeted training on phishing awareness. Additionally, malware or virus detections, suspicious user behaviour, and unusual network traffic contribute to alert fatigue.

Workload and time constraints: On average, there is only one SecOps professional for every 214 employees, each of whom manages about 48 alerts daily. This workload places significant pressure on cybersecurity professionals, allowing them approximately 10 minutes to address each alert within an 8-hour workday. The time constraint underscores the necessity for efficient processes, automation, and prioritization to effectively manage the workload.

False positives and response time: The challenge of false positives persists, with 74% of respondents noting that at least 25% of the alerts they receive are false positives with email security alerts/phishing, traffic spike alerts, user account lockout alerts, and cloud security alerts being the top contributors. 82% of teams take more than 15 minutes to validate an alert, highlighting the need for automation.

Skills development: 88% of respondents find it challenging to keep their team’s skills updated with the rapidly changing threat landscape. Survey respondents prioritize the ability to automate (62%) as a key skill for Security Operations Centre (SOC) teams, highlighting the growing importance of automation in cybersecurity. This, along with the ability to multi-task and critical thinking, right set of certifications, underscores the evolving skill set needed in the face of dynamic cyber threats.

Automation in SecOps: Current adoption and future possibilities

High adoption, and untapped potential: All the survey organisations have embraced automation and orchestration tools in their security operations, underscoring the widespread recognition of their value in fortifying cybersecurity strategies. Despite the prevalent adoption of automation tools, the survey suggests that organisations have yet to fully harness the complete potential of these technologies. Opportunities for improvement are identified in areas such as streaming response triage, incident containment, remediation, recovery, and threat containment.

Productivity gains: Notably, around 96% of respondents have experienced significant productivity gains, with at least a 25% improvement in incident detection times attributed to automation.

Future plans and focus areas for optimisation: Organisations are actively pursuing the optimisation of automation processes to establish a more streamlined cybersecurity framework. Looking ahead, a significant number of organisations (60%) across Asia-Pacific express their intent to implement automation and orchestration tools within the next 12 months. Strategically, organisations are focusing on leveraging automation tools to streamline response triage, accelerate incident containment, and minimize recovery time.

Beyond threats: SecOps preparedness and future priorities

Faster threat detection and response takes centre stage: Organisations recognise the pivotal role of automation in enabling rapid and efficient detection and response to cyber threats, reflecting a proactive approach in bolstering their security resilience. Survey results highlight that 70.7% prioritize faster threat detection, while 58.5% seek to increase overall threat detection capabilities through automation.

Holistic automation for enhanced security operations: Over 50% of respondents say that the top areas for automation include maximising visibility, automated responses, and threat intelligence, and optimising the operational efficiency of existing security resources and intelligence. The emphasis on holistic automation signifies a comprehensive approach to security operations, incorporating intelligence optimisation and automated responses. This approach aims to improve overall efficiency, visibility, and intelligence utilization amidst dynamic cybersecurity challenges.

Future security operations priorities: Organisations are gearing up to prioritise security operations investments in the next 12 months. The top five priorities include boosting network and endpoint security, empowering staff cyber awareness, elevating threat hunting and response, updating critical systems, and performing security audits. These priorities align with the evolving threat landscape and underscore the strategic focus on comprehensive cybersecurity measures.

Supporting quotes:

Simon Piff, Research Vice-President, IDC Asia-Pacific “Securing modern IT infrastructures requires a continuous commitment to vigilance, proactivity, and adaptability amid challenges posed by hybrid work, AI, and cloud technologies. This dynamic shift from static controls to a risk-centric cybersecurity posture aligns seamlessly with the evolving technological landscape. The integration of AI-assisted tools, reassessment of staffing, potential outsourcing, and increased automation emerge as imperative facets highlighted by the survey, emphasising the urgency for organisations to embrace automation strategically.”

Rashish Pandey, Vice President, Marketing & Communications, Asia and ANZ, Fortinet “In the ever-evolving threat landscape, organizations grapple with a spectrum of cyber threats targeting their digital assets. Fortinet’s Security Operations Solutions, underpinned by advanced AI, not only addresses the pressing need for automation but provides a comprehensive strategy for incident detection and response. Our commitment to empowering organizations in navigating the dynamic cybersecurity terrain is showcased through innovative solutions. These include an impressive one-hour (less in most cases) average time to detect and contain threats, an 11-minute investigation and remediation average, a staggering 597% ROI, doubling of team productivity and a substantial $1.39 million reduction in expected breach costs”.

Vivek Srivastava, Country Manager, India & SAARC, Fortinet “In the ever-evolving cybersecurity landscape, 70.7% of organizations prioritize faster threat detection through automation. At Fortinet, we recognize the imperative of swift detection and response as the cornerstone of an enhanced cybersecurity posture. Automation plays a crucial role in promptly identifying and responding to cyber threats, minimising the window of vulnerability. Our customers’ experiences underscore this urgency, with a transformative reduction from an average of 21 days to just one hour for detection, driven by AI and advanced analytics. This signifies a fundamental step in fortifying cybersecurity defences, where time to detect and respond is paramount. Automation, in this context, emerges as the linchpin in navigating the challenges of today’s dynamic threat landscape”.

AICloudCybersecurityITransomwaretechnology
Comments (0)
Add Comment