sb-au logo
Story image

Australian CISOs say cloud compliance is one of the most stressful parts of the job

04 Jul 2017

The task of making sure cloud applications follow compliance policies is one of the most stressful areas of a chief information security officer's (CISO's) job, and they also believe their CEOs are undermining internet security protocols.

Those are the sentiments from Symantec's latest research, which suggests that there are gaping areas in both their organisation's security and the people involved in implementing it.

74% of Australian CISOs believe that their CEO has broken internal security protocols, whether intentionally or unintentionally.

86% say that making sure cloud applications are in line with compliance protocols is the most stressful part of their jobs, but that isn't all they are concerned about.

Hijacking threats top-of-mind for Australian CISOs

32% of CISOs believe account hijacking may become a top threat this year; followed by data breaches (30%); exploited system vulnerabilities (19%); hacked APIs (12%); and broken authentication and compromised credentials (7%).

When looking specifically at cloud security, data loss; staff non-compliance; training; and insecure business applications topped the list of the biggest threats this year. 91% believe that regular data backups cannot work on their own to stop attacks and malware.

29% of cloud applications used at a CISO's company count as shadow apps, which are easy targets for cybercriminals, the survey revealed.

CISOs also tip open source software as a major concern this year, with 99% stating it will be bigger than last year.

Industry compliance issues may be going in the wrong direction

CISOs reported worries about a number of different industry compliance issues today, including:

  • Tracking of activities in sanctioned cloud applications (21 per cent);
  • country and region-specific data residency and control regulations (17 per cent);
  • broad sharing of compliance-controlled data in cloud applications (25 per cent);
  • governance of corporate-owned mobile devices (15 per cent); and
  • employee use of unsanctioned cloud applications (22 per cent)

So what are CISOs doing about it?

According to the survey, CISOs are looking for three key factors to support their security and policies for both data compliance and residency.

89% say they are looking for tokenisation as the best way to meet data residency and control; but only 61% currently use it. 88% use cloud encryption and only 51% use both.

General focus areas: More training, bigger budget, better protection

95% of Australian CISOs plan for more spending on staff training. New employees may average 20 hours of security training during the onboarding process - one of the longest training times out of all countries surveyed in the research..

Story image
Palo Alto Networks advances attack surface management with Expanse
"By integrating Expanse's attack surface management capabilities into Cortex after closing, we will be able to offer the first solution that combines the outside view of an organisation's attack surface with an inside view to proactively address all security threats."More
Story image
Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.More
Story image
Country-wide phishing reports up 75% in 2020
In total, Australians lost $176 million to scams in 2020, 23% higher than the previous year, with phishing the most reported type.More
Story image
A brief history of cyber-threats — from 2000 to 2020
Many significant cybersecurity events have occurred since the year 2000 — not every one of them ‘firsts’, but all of them correlating with a change in security behaviour or protection.More
Story image
Users pay with personal data - Kaspersky on WhatsApp move to share data with Facebook
"Nothing is truly free, and, unfortunately, the current business model for free services means that, essentially, we pay with our data."More
Story image
Cyberattacks on healthcare organisations "out of control" - Check Point
There has been a 45% increase in cyberattacks on healthcare organisations worldwide in the last two months, making healthcare the most targeted industry by cyber criminals.More