Security News > 2022 > August > On-Demand Webinar: New CISO Survey Reveals Top Challenges for Small Cyber Security Teams

The only threat more persistent to organizations than cyber criminals? The cyber security skills crisis.
Survey Results: Top Threat Protection Product Pain Points Overlapping capabilities of disparate technologies: 44%. Being able to see the full picture of an attack: 42%. Deployment and maintenance of disparate technologies on one machine: 41%. Lack of forensic information: 40%. Missing reporting capabilities: 25%. Many of the issues smaller teams face with threat protection products are largely attributable to the fact that they're designed for larger organizations with bigger teams and budgets.
In an era when even security platforms get hacked and a compromised password can result in ransomware attacks triggering price surges at the gas pump, you'd think cyber security teams would scrutinize every single alert.
While CISOs can't train armies of new cyber security pros, they can reduce tech overwhelm.
Unpack key findings from the 2022 Survey of CISOs with Small Cyber Security Teams in this free webinar.
In just 30 minutes, you'll discover the top challenges smaller cyber security teams face in 2022 and how their CISOs plan to overcome them.
News URL
https://thehackernews.com/2022/08/on-demand-webinar-new-ciso-survey.html
Related news
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves) (source)
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it) (source)
- The CISO’s bookshelf: 10 must-reads for security leaders (source)
- Can AI-powered gamified simulations help cybersecurity teams keep up? (source)
- Webinar: Learn How ASPM Transforms Application Security from Reactive to Proactive (source)
- How remote work strengthens cybersecurity teams (source)
- Smart cybersecurity spending and how CISOs can invest where it matters (source)
- How healthcare CISOs can balance security and accessibility without compromising care (source)
- 53% of security teams lack continuous and up-to-date visibility (source)
- Spring clean your security data: The case for cybersecurity data hygiene (source)